-
1
-
-
0010461175
-
Constraints and Approaches for Distributed Sensor Network Security,
-
Technical Report 00010, NAI Labs
-
D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Network Security," Technical Report 00010, NAI Labs, 2000.
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
2
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," Computer, Oct. 2002.
-
(2002)
Computer
-
-
Wood, A.1
Stankovic, J.2
-
3
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, no. 2, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security Protocols for Sensor Networks," Proc. MobiCom, July 2001.
-
(2001)
Proc. MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
5
-
-
11144340927
-
Designing Secure Sensor Networks
-
Dec
-
E. Shi and A. Perrig, "Designing Secure Sensor Networks," Wireless Comm. Magazine, vol. 11, no. 6, Dec. 2004.
-
(2004)
Wireless Comm. Magazine
, vol.11
, Issue.6
-
-
Shi, E.1
Perrig, A.2
-
7
-
-
0142103313
-
Security and Privacy in Sensor Networks
-
Oct
-
H. Chan and A. Perrig, "Security and Privacy in Sensor Networks," Computer, pp. 103-105, Oct. 2003.
-
(2003)
Computer
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
12
-
-
23244467182
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
May
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
13
-
-
32844459414
-
-
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE Trans. Dependable and Secure Computing, 3, no. 2, pp. 62-77, Jan.-Mar. 2006.
-
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 2, pp. 62-77, Jan.-Mar. 2006.
-
-
-
-
14
-
-
84943553152
-
Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
-
Nov
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Proc. IEEE Int'l Conf. Network Protocols (ICNP '03), Nov. 2003.
-
(2003)
Proc. IEEE Int'l Conf. Network Protocols (ICNP '03)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
15
-
-
41449118287
-
PIKE: Peer Intermediaries for Key Establishment
-
Mar
-
H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment," Proc. IEEE INFOCOM, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
16
-
-
33144454801
-
-
S. Capkun and J.P. Hubaux, Secure Positioning in Wireless Networks, IEEE J. Selected Areas in Comm., Feb. 2006.
-
S. Capkun and J.P. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., Feb. 2006.
-
-
-
-
17
-
-
25844439422
-
Secure Positioning of Wireless Devices with Application to Sensor Networks
-
Mar
-
S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Capkun, S.1
Hubaux, J.2
-
18
-
-
3543056512
-
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
-
May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
19
-
-
3543100577
-
Statistical En-Route Filtering of Injected False Data in Sensor Networks
-
Mar
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, Mar. 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
20
-
-
2442529460
-
Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM/Baltzer J
-
Mar
-
F. Ye, S. Lu, and L. Zhang, Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM/Baltzer J. Wireless Networks, Mar. 2005.
-
(2005)
Wireless Networks
-
-
Ye, F.1
Lu, S.2
Zhang, L.3
-
21
-
-
29844441128
-
Toward Resilient Security in Wireless Sensor Networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
22
-
-
41449087752
-
-
TinyOS Operation System
-
TinyOS Operation System, http://millennium.berkeley.edu, 2005.
-
(2005)
-
-
-
24
-
-
0034445661
-
System Architecture Directions for Networked Sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System Architecture Directions for Networked Sensors," Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS '00), 2000.
-
(2000)
Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS '00)
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
25
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
14044255819
-
A Forwarding Scheme for Reliable and Energy-Efficient Data Delivery in Cluster-Based Sensor Networks
-
Feb
-
J. Jung, T. Park, and C. Kim, "A Forwarding Scheme for Reliable and Energy-Efficient Data Delivery in Cluster-Based Sensor Networks," IEEE Comm. Letters, vol. 9, no. 2, pp. 112-114, Feb. 2005.
-
(2005)
IEEE Comm. Letters
, vol.9
, Issue.2
, pp. 112-114
-
-
Jung, J.1
Park, T.2
Kim, C.3
-
28
-
-
29844438193
-
Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
-
May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, May 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
29
-
-
25844473466
-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
-
W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
30
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
-
Feb
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
-
(2006)
IEEE J. Selected Areas in Comm
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
31
-
-
33947309703
-
Secure Localization and Authentication in Ultra-Wideband Sensor Networks
-
Apr
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure Localization and Authentication in Ultra-Wideband Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 4, pp. 829-835, Apr. 2006.
-
(2006)
IEEE J. Selected Areas in Comm
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
34
-
-
41449087351
-
-
CENS Research
-
CENS Research: Systems Infrastructure, http://research.cens.ucla. edu/areas/2006/Systems_Infrastructure/default.htm, 2008.
-
(2008)
Systems Infrastructure
-
-
-
35
-
-
36248933437
-
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
-
Apr
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
36
-
-
33646834914
-
A New Approach for Random Key Pre-Distribution in Large Scale Wireless Sensor Networks
-
K. Ren, K. Zeng, and W. Lou, "A New Approach for Random Key Pre-Distribution in Large Scale Wireless Sensor Networks," Wiley J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.
-
(2006)
Wiley J. Wireless Comm. and Mobile Computing
, vol.6
, Issue.3
, pp. 307-318
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
37
-
-
38349177828
-
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
-
Jan
-
K. Ren, K. Zeng, and W. Lou, "Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 7, no. 1, Jan. 2008.
-
(2008)
IEEE Trans. Wireless Comm
, vol.7
, Issue.1
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
38
-
-
36248988077
-
On Broadcast Authentication in Wireless Sensor Networks
-
Nov
-
K. Ren, W. Lou, K. Zeng, and P. Moran, "On Broadcast Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
-
(2007)
IEEE Trans. Wireless Comm
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.4
|