-
1
-
-
0036688074
-
A survey on sensor networks
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine IEEE, Vol. 40, issue. 8, pp. 102-114, August 2002.
-
(2002)
Communications Magazine IEEE
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
33847130828
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu and Arbaugh, "Toward resilient security in wireless sensor networks," Proc. of ACM MobiHoc, pp. 89-96, 2005.
-
(2005)
Proc. of ACM MobiHoc
, pp. 89-96
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh5
-
3
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," Proc. 7th annual ACM International Conference on Mobile Computing and Networks, July 2001.
-
(2001)
Proc. 7th annual ACM International Conference on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
4
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Sept
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, 1(2-3), Sept, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
-
-
Karlof, C.1
Wagner, D.2
-
5
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," Proc. 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
-
(2004)
Proc. 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," Proc. 2003 ACM Workshop on Wireless Security, pp. 30-40, 2003.
-
(2003)
Proc. 2003 ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
8
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
July
-
J. Deng, R. Han, and S. Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks," Computer Communications, Vol. 29, issue. 2, pp. 216-230, July 2005.
-
(2005)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," Proc. 2nd International Conference on Embedded Networked Sensor Systems, pp. 162-175, 2004.
-
(2004)
Proc. 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
|