-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad hoc wireless networks
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in ad hoc wireless networks. In NDSS, 2002.
-
(2002)
NDSS
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
2
-
-
3042778324
-
Stochastic properties of the random waypoint mobility model
-
C. Bettstetter, H. Hartenstein, and X. P. Costa. Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5):555-567, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.5
, pp. 555-567
-
-
Bettstetter, C.1
Hartenstein, H.2
Costa, X.P.3
-
4
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
6
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
-
(2004)
INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
7
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
8
-
-
39049106180
-
-
Erdos and Renyi. On random graphs. In I. Publ. Math. Debrecen, 1959.
-
Erdos and Renyi. On random graphs. In I. Publ. Math. Debrecen, 1959.
-
-
-
-
9
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenaer and V.D.Gligor. A key-management scheme for distributed sensor networks. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Eschenaer, L.1
Gligor, V.D.2
-
10
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
12
-
-
14844314204
-
Location-aware key manageent scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key manageent scheme for wireless sensor networks. In ACM Workshop SASN, 2004.
-
(2004)
ACM Workshop SASN
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
13
-
-
14844335004
-
Revisiting random key pre-distribution schemes for wireless sensor networks
-
J. Hwang and Y. Kim. Revisiting random key pre-distribution schemes for wireless sensor networks. In ACM Workshop SASN, 2004.
-
(2004)
ACM Workshop SASN
-
-
Hwang, J.1
Kim, Y.2
-
14
-
-
4544231245
-
Intelligent fluid infrastructure for embedded networks
-
A. Kansal, A. A. Somasundara, D. D. Jea, M. B. Srivastava, and D. Estrin. Intelligent fluid infrastructure for embedded networks. In MobiSys, 2004.
-
(2004)
MobiSys
-
-
Kansal, A.1
Somasundara, A.A.2
Jea, D.D.3
Srivastava, M.B.4
Estrin, D.5
-
15
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In MobiCom, 2000.
-
(2000)
MobiCom
-
-
Karp, B.1
Kung, H.T.2
-
16
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In ICNP, 2001.
-
(2001)
ICNP
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
17
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
18
-
-
4544293215
-
Location-based pairwise key establishments of static sensor networks
-
D. Liu and P. Ning. Location-based pairwise key establishments of static sensor networks. In ACM Workshop SASN, 2003.
-
(2003)
ACM Workshop SASN
-
-
Liu, D.1
Ning, P.2
-
20
-
-
20344381294
-
A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In SECON, 2004.
-
(2004)
SECON
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
21
-
-
39049105693
-
-
UC Berkey The EECS department
-
UC Berkey The EECS department. Cotbots: The mobile mote-based robots, http://www-bsac.eecs.berkeley.edu/projects/cotbots/.
-
Cotbots: The mobile mote-based robots
-
-
-
22
-
-
0036983290
-
GHT: A geographic hash table for data-centric storage
-
S. Ratnasamy, B. Karp, L. Yin, D. Estrin, R. Govindan, and S. Shenker. GHT: a geographic hash table for data-centric storage. In ACM Workshop WSNA, 2002.
-
(2002)
ACM Workshop WSNA
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Estrin, D.4
Govindan, R.5
Shenker, S.6
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. In Comm. of the ACM, 1978.
-
(1978)
Comm. of the ACM
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
3042557080
-
Robomote: A Tiny Mobile Robot Platform for Large-Scale Sensor Networks
-
G. T. Sibley, M. H. Rahimi, and G. S. Sukhatme. Robomote: A Tiny Mobile Robot Platform for Large-Scale Sensor Networks. In IEEE ICRA, 2002.
-
(2002)
IEEE ICRA
-
-
Sibley, G.T.1
Rahimi, M.H.2
Sukhatme, G.S.3
-
25
-
-
39049118016
-
-
I. C. Technology. MICA2: Wireless Measurement System. http://www.xbow.com/Product/pdf/files/wireless_pdf/6020-0042-0_MICA2.pd%f.
-
I. C. Technology. MICA2: Wireless Measurement System. http://www.xbow.com/Product/pdf/files/wireless_pdf/6020-0042-0_MICA2.pd%f.
-
-
-
-
27
-
-
17444417505
-
Efficient collection of sensor data in remote fields using mobile collectors
-
Y. Tirta, Z. Li, Y Lu, and S. Bagchi. Efficient collection of sensor data in remote fields using mobile collectors. In ICCCN, 2004.
-
(2004)
ICCCN
-
-
Tirta, Y.1
Li, Z.2
Lu, Y.3
Bagchi, S.4
-
28
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y Yuan, S. Lu, and W Arbaugh. Toward resilient security in wireless sensor networks. In MobiHoc, 2005.
-
(2005)
MobiHoc
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
29
-
-
0036949025
-
A two-tier data dissemination model for large-scale wireless sensor networks
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang. A two-tier data dissemination model for large-scale wireless sensor networks. In MobiCom, 2002.
-
(2002)
MobiCom
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
30
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In INFOCOM, 2004.
-
(2004)
INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
31
-
-
84943517831
-
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
-
W Zhang, G. Cao, and T. L. Porta. Data Dissemination with Ring-Based Index for Wireless Sensor Networks. In ICNP, 2003.
-
(2003)
ICNP
-
-
Zhang, W.1
Cao, G.2
Porta, T.L.3
-
32
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MobiHoc, 2005.
-
(2005)
MobiHoc
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
33
-
-
39049118984
-
-
L. Zhou, J. Ni, and C.V.Ravishankar. Supporting secure communication and data collection in mobile sensor networks. Technical report, Dept. of Computer Science and Engineering, UC, Riverside, June 2005.
-
L. Zhou, J. Ni, and C.V.Ravishankar. Supporting secure communication and data collection in mobile sensor networks. Technical report, Dept. of Computer Science and Engineering, UC, Riverside, June 2005.
-
-
-
-
34
-
-
33646400365
-
Efficient Key Establishment for Group-Based Wireless Sensor Deployments
-
L. Zhou, J. Ni, and C. Ravishankar. Efficient Key Establishment for Group-Based Wireless Sensor Deployments. In ACM Workshop WiSe, 2005.
-
(2005)
ACM Workshop WiSe
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.3
-
35
-
-
33847249032
-
(SHORT PAPER) GKE: Efficient Group-based Key Establishment for Large Sensor Networks
-
L. Zhou, J. Ni, and C. Ravishankar. (SHORT PAPER) GKE: Efficient Group-based Key Establishment for Large Sensor Networks. In SecureComm, 2005.
-
(2005)
SecureComm
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.3
-
36
-
-
39049083059
-
A Fault Localized Scheme for False Report Filtering in Sensor Networks
-
L. Zhou and C. Ravishankar. A Fault Localized Scheme for False Report Filtering in Sensor Networks. In IEEE ICPS, 2005.
-
(2005)
IEEE ICPS
-
-
Zhou, L.1
Ravishankar, C.2
-
37
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In IEEE Symposium on Security and Privacy, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|