-
1
-
-
0036688074
-
A survery on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survery on sensor networks", IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-116, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-116
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
5444275208
-
Wireless sensor and actor networks: Research challenges
-
I. Akyildiz and I. Kasimoglu, "Wireless sensor and actor networks: research challenges", Ad Hoc Networks, Vol. 2, No. 4, pp. 351-367, 2004.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.4
, pp. 351-367
-
-
Akyildiz, I.1
Kasimoglu, I.2
-
3
-
-
33747130666
-
Wireless underground sensor networks: Research challenges
-
I. Akyildiz and E. Stuntebeck, "Wireless underground sensor networks: research challenges", Ad Hoc Networks, Vol. 4, No. 6, pp. 669-686, 2006.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.6
, pp. 669-686
-
-
Akyildiz, I.1
Stuntebeck, E.2
-
4
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler "SPINS: security protocols for sensor networks", Wireless Networks, Vol. 8, No. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
-
5
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge", IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 1, pp. 62-77, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
6
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks", Communications of the ACM, Vol. 47, No. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
7
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, " Random key predistribution schemes for sensor networks", in Proc. Symposium on Security and Privacy 2003, May 2003, pp. 197-213.
-
(2003)
Proc. Symposium on Security and Privacy 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks", in Proc. ACM CCS 2003, October 2003, pp. 62-72.
-
(2003)
Proc. ACM CCS 2003
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
9
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
November
-
B. Przydatek, D. Song, and A. Perrig, "SIA: secure information aggregation in sensor networks", in Proc. Conference on Embedded Networked Sensor System 2003, November 2003, pp. 255-265.
-
(2003)
Proc. Conference on Embedded Networked Sensor System 2003
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
10
-
-
50949094048
-
A novel voting mechanism for compromised node revocation in wireless ad hoc networks
-
San Francisco, Nov. 27-Dec. 1
-
X. Lin, H. Zhu, B. Lin, P.-H. Ho, and X. Shen, " A novel voting mechanism for compromised node revocation in wireless ad hoc networks", in IEEE Global Communications Conference (GLOBECOM'06), San Francisco, Nov. 27-Dec. 1, 2006.
-
(2006)
IEEE Global Communications Conference (GLOBECOM'06)
-
-
Lin, X.1
Zhu, H.2
Lin, B.3
Ho, P.-H.4
Shen, X.5
-
11
-
-
51249102091
-
Towards compromise-resilient localized authentication architecture for wireless mesh networks
-
Vancouver, British Columbia, August 14-17
-
X. Lin, P.-H. Ho, and X. Shen, "Towards compromise-resilient localized authentication architecture for wireless mesh networks", in Proc. of QShine 2007, Vancouver, British Columbia, August 14-17, 2007.
-
(2007)
Proc. of QShine 2007
-
-
Lin, X.1
Ho, P.-H.2
Shen, X.3
-
12
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
May
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 34-45.
-
(2005)
Proc. ACM Mobihoc 2005
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
13
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
March
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks", in Proc. IEEE Infocom 2004, March 2004, pp. 2446-2457.
-
(2004)
Proc. IEEE Infocom 2004
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
14
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
May
-
W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 58-67.
-
(2005)
Proc. ACM Mobihoc 2005
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
15
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 378-389.
-
(2005)
Proc. ACM Mobihoc 2005
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
16
-
-
33845479472
-
Secure cooperative mobile ad hoc networks against injecting traffic attacks
-
September
-
W. Yu and K. Liu, "Secure cooperative mobile ad hoc networks against injecting traffic attacks", in Proc. IEEE SECON 2005, September 2005, pp. 55-64.
-
(2005)
Proc. IEEE SECON 2005
, pp. 55-64
-
-
Yu, W.1
Liu, K.2
-
17
-
-
43849098907
-
A trust based framework for secure data aggregation in wireless sensor networks
-
September
-
W. Zhang, S. Das, and Y. Liu, " A trust based framework for secure data aggregation in wireless sensor networks", in Proc. IEEE SECON 2006, September 2006.
-
(2006)
Proc. IEEE SECON 2006
-
-
Zhang, W.1
Das, S.2
Liu, Y.3
-
18
-
-
39049083533
-
Threshold key-establishment in distributed sensor networks using a multivariate scheme
-
April
-
F. Delgosha and F. Fekri, " Threshold key-establishment in distributed sensor networks using a multivariate scheme", in Proc. IEEE Infocom 2006, April 2006.
-
(2006)
Proc. IEEE Infocom 2006
-
-
Delgosha, F.1
Fekri, F.2
-
19
-
-
39049089652
-
Leveraging channel diversity for key establishment in wireless sensor networks
-
April
-
M. Miller and N. Vaidya, " Leveraging channel diversity for key establishment in wireless sensor networks ", in Proc. IEEE Infocom 2006, April 2006.
-
(2006)
Proc. IEEE Infocom 2006
-
-
Miller, M.1
Vaidya, N.2
-
20
-
-
38549121414
-
SRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
-
June
-
X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen and Z. Cao, "SRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks", in Proc. IEEE ICC 2007, June 2007.
-
(2007)
Proc. IEEE ICC 2007
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
21
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
April
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: providing location-aware end-to-end data security in wireless sensor networks ", in Proc. IEEE Infocom 2006, April 2006, pp. 1-12.
-
(2006)
Proc. IEEE Infocom 2006
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
22
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
June
-
K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", in Proc. IEEE SECON 2007, June 2007.
-
(2007)
Proc. IEEE SECON 2007
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
23
-
-
34548332598
-
Decentralized intrusion detection in wireless sensor networks
-
A. P. da Silva, M. Martins, B. Roacha, A. Loureiro, L. Ruiz, and H. Wong, "Decentralized intrusion detection in wireless sensor networks", in ACM Q2SWinet'05, 2005.
-
(2005)
ACM Q2SWinet'05
-
-
da Silva, A.P.1
Martins, M.2
Roacha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.6
-
24
-
-
34548365467
-
A cooperative intrusion detection system for ad hoc networks
-
October
-
Y. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks", in ACM SASN'03, October 2003.
-
(2003)
ACM SASN'03
-
-
Huang, Y.1
Lee, W.2
|