-
1
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs Tech. Report #00-010
-
D. Carman, P. Kruus, B. Matt, "Constraints and approaches for distributed sensor network security," NAI Labs Tech. Report #00-010, 2000
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
2
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, Oct. 2002.
-
(2002)
IEEE Computer
-
-
Wood, A.1
Stankovic, J.2
-
3
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Ad Hoc Networks, 1(2), 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security Protocols for Sensor Networks," In Proc. of Mobicom 2001.
-
(2001)
Proc. of Mobicom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
6
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," In Proc. of the 9th ACM CCS, Washington, 2002
-
(2002)
Proc. of the 9th ACM CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
7
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct
-
H. Chan, A. Perrig, "Security and privacy in sensor networks," IEEE Computer, pp. 103-105, Oct 2003
-
(2003)
IEEE Computer
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
28444433009
-
Random Key Predistribution Schemes for Sensor Networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," In Proc. of IEEE S&P, 2003
-
(2003)
Proc. of IEEE S&P
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Washington, Oct
-
D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," In Proc. of the 10th ACM CCS, Washington, Oct., 2003
-
(2003)
Proc. of the 10th ACM CCS
-
-
Liu, D.1
Ning, P.2
-
10
-
-
3042783638
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
Washington, Oct
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," In Proc. of the 10th ACM CCS, Washington, Oct., 2003.
-
(2003)
Proc. of the 10th ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
11
-
-
8344262333
-
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
-
Hongkong
-
W. Du, J. Deng, Y. Han, S. Chen and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," IEEE INFOCOM04, Hongkong, 2004.
-
(2004)
IEEE INFOCOM04
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
12
-
-
84943553152
-
Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach
-
Atlanta, Nov
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach," In Proc. of ICNP03, Atlanta, Nov., 2003.
-
(2003)
Proc. of ICNP03
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
14
-
-
58049185983
-
An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
-
Oakland, CA, May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," IEEE S&P, Oakland, CA, May 2004.
-
(2004)
IEEE S&P
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
15
-
-
3543100577
-
Statiscal Enroute Filtering of Injected False Data in Sensor Networks
-
Mar
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statiscal Enroute Filtering of Injected False Data in Sensor Networks," IEEE Infocom, Mar. 2004.
-
(2004)
IEEE Infocom
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
16
-
-
29844441128
-
Toward Resilient Security in Wireless Sensor Networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," In Proc. of ACM MOBIHOC'05, 2005.
-
(2005)
Proc. of ACM MOBIHOC'05
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
17
-
-
39049140255
-
Location based security mechanisms in wireless sensor networks
-
to appear in
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location based security mechanisms in wireless sensor networks," to appear in IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks.
-
IEEE JSAC
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
18
-
-
39049118419
-
-
TinyOS Operation System
-
"TinyOS Operation System," http://millennium.berkeley.edu.
-
-
-
-
19
-
-
41449098086
-
Exploring Message Authentication in Sensor Networks
-
Springer-Verlag, Aug
-
Harald Vogt, "Exploring Message Authentication in Sensor Networks'," Proceedings of ESAS 2004, Springer-Verlag, Aug. 2004.
-
(2004)
Proceedings of ESAS
-
-
Vogt, H.1
-
20
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," In Proc. of ASPLOS IX, 2000.
-
(2000)
Proc. of ASPLOS
, vol.9
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
21
-
-
8344222870
-
TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks
-
X. Cheng, A. Thaeler, G. Xue, D. Chen, "TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks," IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Cheng, X.1
Thaeler, A.2
Xue, G.3
Chen, D.4
-
22
-
-
11244273945
-
Localization for Mobile Sensor Networks
-
L. Hu, D. Evans, "Localization for Mobile Sensor Networks," In Proc. of ACM MOBICOM, 2004.
-
(2004)
Proc. of ACM MOBICOM
-
-
Hu, L.1
Evans, D.2
-
23
-
-
39049157386
-
Secure localization and authentication in ultra-wideband sensor networks
-
to appear in
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," to appear in IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications.
-
IEEE JSAC
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
24
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir, How to Share a Secret, Communications of the ACM, 22(11):612-613, Nov 1979
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
14044255819
-
A Forwarding Scheme for Reliable and Energy-efficient Data Delivery in Cluster-based Sensor Networks
-
Feb
-
J. Jung, T. Park and C. Kim, "A Forwarding Scheme for Reliable and Energy-efficient Data Delivery in Cluster-based Sensor Networks," IEEE Communication Letters, Vol.9, No.2: 112-114, Feb. 2005.
-
(2005)
IEEE Communication Letters
, vol.9
, Issue.2
, pp. 112-114
-
-
Jung, J.1
Park, T.2
Kim, C.3
|