-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. International Journal of Computer and Telecommunications Networking - Elsevier, 38(4): 393-422, March 2002.
-
(2002)
International Journal of Computer and Telecommunications Networking - Elsevier
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In INFOCOM, pages 1917-1928, 2005.
-
(2005)
INFOCOM
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
6
-
-
25844457423
-
Gps-free coordinate assignment and routing in wireless sensor networks
-
A. Caruso, A. Urpi, S. Chessa, and S. De. Gps-free coordinate assignment and routing in wireless sensor networks. In Proceedings of IEEE INFOCOM '05, pages 150-160, 2005.
-
(2005)
Proceedings of IEEE INFOCOM '05
, pp. 150-160
-
-
Caruso, A.1
Urpi, A.2
Chessa, S.3
De, S.4
-
8
-
-
33746322177
-
Local leader election, signal strength aware flooding, and routeless routing
-
G. Chen, J. W. Branch, and B. K. Szymanski. Local leader election, signal strength aware flooding, and routeless routing. In 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005.
-
(2005)
19th International Parallel and Distributed Processing Symposium (IPDPS 2005)
-
-
Chen, G.1
Branch, J.W.2
Szymanski, B.K.3
-
11
-
-
33749984561
-
Ecce: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks
-
M. Conti, R. Di Pietro, and L. V. Mancini. Ecce: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks, 5(1):49-62, 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 49-62
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
-
12
-
-
34548126116
-
Requirements and open issues in distributed detection of node identity replicas in wsn
-
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei. Requirements and open issues in distributed detection of node identity replicas in wsn. In Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC '06), Special Session on Wireless Sensor Networks, page 66, 2006.
-
(2006)
Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC '06), Special Session on Wireless Sensor Networks
, pp. 66
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
15
-
-
33749625947
-
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
-
R. Di Pietro, L. V. Mancini, and A. Mei. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks, 12(6):709-721, 2006.
-
(2006)
Wireless Networks
, vol.12
, Issue.6
, pp. 709-721
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
16
-
-
14844295528
-
Connectivity properties of secure wireless sensor networks
-
R. Di Pietro, L. V. Mancini, A. Mei, A. Panconesi, and J. Radhakrishnan. Connectivity properties of secure wireless sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pages 53-58, 2004.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 53-58
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
Panconesi, A.4
Radhakrishnan, J.5
-
17
-
-
50049090165
-
Sensor networks that are provably resilient
-
to appear
-
R. Di Pietro, L. V. Mancini, A. Mei, A. Panconesi, and J. Radhakrishnan. Sensor networks that are provably resilient. In Proceedings of IEEE 2nd International Conference on Security and Privacy in Communication Networks (SecureComm 2006), to appear.
-
Proceedings of IEEE 2nd International Conference on Security and Privacy in Communication Networks (SecureComm 2006)
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
Panconesi, A.4
Radhakrishnan, J.5
-
20
-
-
84978422134
-
Fine-grained network time synchronization using reference broadcasts
-
J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. SIGOPS Operating Systems Review, 36(SI):147-163, 2002.
-
(2002)
SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 147-163
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
22
-
-
0013043106
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. SIGMOBILE Mobile Computing and Communications Review, 5(4):11-25, 2001.
-
(2001)
SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.4
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
25
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3):293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
27
-
-
0345755816
-
Adaptive Security for Multi-layer ad hoc Networks
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu. Adaptive Security for Multi-layer ad hoc Networks. Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002.
-
(2002)
Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
29
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of ACM IPSN'04, pages 259-268, 2004.
-
(2004)
Proceedings of ACM IPSN'04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
32
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag New York, Inc
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 47-53. Springer-Verlag New York, Inc., 1985.
-
(1985)
Proceedings of CRYPTO 84 on Advances in cryptology
, pp. 47-53
-
-
Shamir, A.1
-
33
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the Third Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM '05), pages 324-328, 2005.
-
(2005)
Proceedings of the Third Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM '05)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
34
-
-
33748089962
-
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap:: a secure hop-by-hop data aggregation protocol for sensor networks. In MobiHoc '06: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pages 356-367, 2006.
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap:: a secure hop-by-hop data aggregation protocol for sensor networks. In MobiHoc '06: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pages 356-367, 2006.
-
-
-
|