-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
AKYILDIZ, I., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIRCI, E. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4, 393-422.
-
(2002)
Comput. Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
AKYILDIZ, I.1
SU, W.2
SANKARASUBRAMANIAM, Y.3
CAYIRCI, E.4
-
3
-
-
0035789267
-
Secure pebblenets
-
BASAGNI, S., HERRIN, K., BRUSCHI, D., AND ROSTI, E. 2001. Secure pebblenets. In Proceedings of the ACM International Symposium on Mobile ad hoc Networking and Computing. 156-163.
-
(2001)
Proceedings of the ACM International Symposium on Mobile ad hoc Networking and Computing
, pp. 156-163
-
-
BASAGNI, S.1
HERRIN, K.2
BRUSCHI, D.3
ROSTI, E.4
-
4
-
-
85028765277
-
-
BLUNDO, C., DE SANTIS, A., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology-CRYPTO '92. Lecture Notes in Computer Science, 740. Springer Berlin, Germany. 471-486.
-
BLUNDO, C., DE SANTIS, A., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology-CRYPTO '92. Lecture Notes in Computer Science, vol. 740. Springer Berlin, Germany. 471-486.
-
-
-
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
CAPKUN, S. AND HUBAUX, J. 2005. Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE InfoCom'05.
-
(2005)
Proceedings of IEEE InfoCom
, vol.5
-
-
CAPKUN, S.1
HUBAUX, J.2
-
6
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
Tech. rep. 00-010. NAI Labs, Glenwood, MD
-
CARMAN, D., KRUUS, P., AND MATT, B. J. 2000. Constrains and approaches for distributed sensor network security. Tech. rep. 00-010. NAI Labs, Glenwood, MD.
-
(2000)
-
-
CARMAN, D.1
KRUUS, P.2
MATT, B.J.3
-
7
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
CHAN, H. AND PERRIG, A. 2005. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of IEEE Infocom.
-
(2005)
Proceedings of IEEE Infocom
-
-
CHAN, H.1
PERRIG, A.2
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
DU, W., DENG, J., HAN, Y. S., CHEN, S., AND VARSHNEY, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04.
-
(2004)
Proceedings of IEEE INFOCOM
, vol.4
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
CHEN, S.4
VARSHNEY, P.5
-
11
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.4
-
13
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
GAY, D., LEVIS, P., VON BEHREN, R., WELSH, M., BREWER, E., AND CULLER, D. 2003. The nesC language: A holistic approach to networked embedded systems. In Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2003).
-
(2003)
Proceedings of the Conference on Programming Language Design and Implementation (PLDI 2003)
-
-
GAY, D.1
LEVIS, P.2
VON BEHREN, R.3
WELSH, M.4
BREWER, E.5
CULLER, D.6
-
14
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
Tech. Rep. CU-CS-990-05. University of Colorado at Boulder, Boulder, CO
-
HARTUNG, C., BALASALLE, J., AND HAN, R. 2005. Node compromise in sensor networks: The need for secure systems. Tech. Rep. CU-CS-990-05. University of Colorado at Boulder, Boulder, CO.
-
(2005)
-
-
HARTUNG, C.1
BALASALLE, J.2
HAN, R.3
-
15
-
-
0034445661
-
System architecture directions for networked sensors
-
HILL, J., SZEWCZYK, R., WOO, A., HOLLAR, S., CULLER, D., AND PISTER, K. S. J. 2000. System architecture directions for networked sensors. In Proceedings of the Conference Architectural Support for Programming Languages and Operating Systems. 93-104.
-
(2000)
Proceedings of the Conference Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
HILL, J.1
SZEWCZYK, R.2
WOO, A.3
HOLLAR, S.4
CULLER, D.5
PISTER, K.S.J.6
-
17
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
HUANG, D., MEHTA, M., MEDHI, D., AND HARN, L. 2004. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks (SASN '04). 29-42.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks (SASN '04)
, pp. 29-42
-
-
HUANG, D.1
MEHTA, M.2
MEDHI, D.3
HARN, L.4
-
21
-
-
11244264140
-
Serloc: Secure range-independent localization for wireless sensor networks
-
WiSe, Philadelphia, PA
-
LAZOS, L. AND POOVENDRAN, R. 2004. Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2004, Philadelphia, PA).
-
(2004)
Proceedings of the ACM Workshop on Wireless Security
-
-
LAZOS, L.1
POOVENDRAN, R.2
-
22
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
LI, Z., TRAPPE, W., ZHANG, Y., AND NATH, B. 2005. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the Fourth International Conference on Information Processing in Sensor Networks (IPSN '05).
-
(2005)
Proceedings of the Fourth International Conference on Information Processing in Sensor Networks (IPSN '05)
-
-
LI, Z.1
TRAPPE, W.2
ZHANG, Y.3
NATH, B.4
-
25
-
-
84866860550
-
-
LIU, D. AND NING, P. 2005. Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sensor Netw. 1, 2, 204-239.
-
LIU, D. AND NING, P. 2005. Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sensor Netw. 1, 2, 204-239.
-
-
-
-
28
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D., AND TYGAR, D. 2001. SPINS: Security protocols for sensor networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networks.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networks
-
-
PERRIG, A.1
SZEWCZYK, R.2
WEN, V.3
CULLER, D.4
TYGAR, D.5
-
31
-
-
0041939727
-
Robust location detection in emergency sensor networks
-
RAY, S., UNGRANGSI, R., PELLEGRINI, F. D., TRACHTENBERG, A., AND STAROBINSKI, D. 2003. Robust location detection in emergency sensor networks. In Proceedings of IEEE INFOCOM 2003.
-
(2003)
Proceedings of IEEE INFOCOM 2003
-
-
RAY, S.1
UNGRANGSI, R.2
PELLEGRINI, F.D.3
TRACHTENBERG, A.4
STAROBINSKI, D.5
-
32
-
-
0036793924
-
Denial of service in sensor networks
-
WOOD, A. D. AND STANKOVIC, J. A. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54-62.
-
(2002)
IEEE Comput
, vol.35
, Issue.10
, pp. 54-62
-
-
WOOD, A.D.1
STANKOVIC, J.A.2
|