-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. A survey on sensor networks. IEEE Communications Magazine 40 8 (2002) 102-114
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0036375244
-
-
C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann, Impact of network density on data aggregation in wireless sensor networks, in: Proc. of the 22nd International Conference on Distributed Computing Systems, 2002, pp. 575-578.
-
C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann, Impact of network density on data aggregation in wireless sensor networks, in: Proc. of the 22nd International Conference on Distributed Computing Systems, 2002, pp. 575-578.
-
-
-
-
4
-
-
54949146535
-
-
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Scalable coordination in sensor networks, in: Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 263-270.
-
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Scalable coordination in sensor networks, in: Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 263-270.
-
-
-
-
5
-
-
84978428047
-
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong, TAG: a Tiny AGgregation service for ad-hoc sensor networks, in: Proc. of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), 2002, pp. 131-146.
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong, TAG: a Tiny AGgregation service for ad-hoc sensor networks, in: Proc. of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), 2002, pp. 131-146.
-
-
-
-
6
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan H., and Perrig A. Security and privacy in sensor networks. IEEE Computer Magazine (2003) 103-105
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar D., Wen V., and Culler D. SPINS: security protocols for sensor networks. Wireless Networks Journal (WINE) 8 5 (2002) 521-534
-
(2002)
Wireless Networks Journal (WINE)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, D.3
Wen, V.4
Culler, D.5
-
9
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proc. of the Second ACM Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proc. of the Second ACM Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
-
-
-
-
10
-
-
84943753034
-
-
L. Hu, D. Evans, Secure aggregation for wireless networks, in: Proc. of Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 384-391.
-
L. Hu, D. Evans, Secure aggregation for wireless networks, in: Proc. of Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 384-391.
-
-
-
-
12
-
-
32644435647
-
-
H. Çam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli, Energy-efficient and secure pattern based data aggregation for wireless sensor networks, Special Issue of Computer Communications on Sensor Networks, 2006, pp. 446-455.
-
H. Çam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli, Energy-efficient and secure pattern based data aggregation for wireless sensor networks, Special Issue of Computer Communications on Sensor Networks, 2006, pp. 446-455.
-
-
-
-
13
-
-
85163689857
-
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, in: Proc. of IEEE Global Telecommunications Conference, 2003, pp. 1435-1439.
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, in: Proc. of IEEE Global Telecommunications Conference, 2003, pp. 1435-1439.
-
-
-
-
14
-
-
33749986533
-
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
-
Wu K., Dreef D., Sun B., and Xiao Y. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks 5 1 (2007) 100-111
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 100-111
-
-
Wu, K.1
Dreef, D.2
Sun, B.3
Xiao, Y.4
-
15
-
-
14844315770
-
-
S. Ganeriwal, M. Srivastava, Reputation based framework for high integrity sensor networks, in: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 66-77.
-
S. Ganeriwal, M. Srivastava, Reputation based framework for high integrity sensor networks, in: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 66-77.
-
-
-
-
17
-
-
36949013183
-
-
A. Srinivasan, J. Teitelbaum, J. Wu, DRBTS: distributed reputationbased beacon trust system, in: Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006, pp. 277-283.
-
A. Srinivasan, J. Teitelbaum, J. Wu, DRBTS: distributed reputationbased beacon trust system, in: Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006, pp. 277-283.
-
-
-
-
18
-
-
54949146534
-
-
Boukerche A. (Ed), Wiley and Sons
-
Srinivasan A., Teitelbaum J., Liang H., Wu J., and Cardei M. In: Boukerche A. (Ed). Reputation and Trust-Based Systems for Ad Hoc and Sensor Networks, Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks (2008), Wiley and Sons
-
(2008)
Reputation and Trust-Based Systems for Ad Hoc and Sensor Networks, Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
19
-
-
54949124268
-
-
A. Josang, R. Ismail, The beta reputation system, in: Proc. of the 15th Bled Conf. Electronic Commerce, 2002, p. 41.
-
A. Josang, R. Ismail, The beta reputation system, in: Proc. of the 15th Bled Conf. Electronic Commerce, 2002, p. 41.
-
-
-
-
21
-
-
85176182819
-
-
P. Resnick, R. Zeckhauser, Trust among strangers in Internet transactions: empirical analysis of eBays reputation system, in: M.R. Baye (Ed.), Advances in Applied Microeconomics, vol. 11, Elsevier Science, 2003.
-
P. Resnick, R. Zeckhauser, Trust among strangers in Internet transactions: empirical analysis of eBays reputation system, in: M.R. Baye (Ed.), Advances in Applied Microeconomics, vol. 11, Elsevier Science, 2003.
-
-
-
-
22
-
-
54949153442
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, RFC2704 - The KeyNote Trust Management System, 1999.
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, RFC2704 - The KeyNote Trust Management System, 1999.
-
-
-
-
23
-
-
54949111380
-
-
S. Buchegger, J.L. Boudec, Performance analysis of the CONFIDANT protocol, in: Proc. of ACM Mobihoc, 2002, pp. 226-236.
-
S. Buchegger, J.L. Boudec, Performance analysis of the CONFIDANT protocol, in: Proc. of ACM Mobihoc, 2002, pp. 226-236.
-
-
-
-
24
-
-
54949096644
-
-
P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proc. of Communication and Multimedia Security, 2002, pp. 107-121.
-
P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proc. of Communication and Multimedia Security, 2002, pp. 107-121.
-
-
-
-
25
-
-
84944078503
-
-
L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: Proc. of IEEE Conference on Ecommerce, 2003, p. 275.
-
L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: Proc. of IEEE Conference on Ecommerce, 2003, p. 275.
-
-
-
-
27
-
-
48049097061
-
-
M.J. Probst, S.K. Kasera, Statistical trust establishment in wireless sensor networks, in: Proc. of 13th Int. Conference on Parallel and Distributed Systems, vol. 1, 2007, pp. 1-8.
-
M.J. Probst, S.K. Kasera, Statistical trust establishment in wireless sensor networks, in: Proc. of 13th Int. Conference on Parallel and Distributed Systems, vol. 1, 2007, pp. 1-8.
-
-
-
-
28
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Sun Y., Yu W., Han Z., and Ray Liu K.J. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 2 (2006) 305-317
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Ray Liu, K.J.4
-
29
-
-
51349155690
-
-
M. Raya, P. Papadimitratos, V.D. Gligor, J.P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in: Proc. of INFOCOM 2008, April 2008.
-
M. Raya, P. Papadimitratos, V.D. Gligor, J.P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in: Proc. of INFOCOM 2008, April 2008.
-
-
-
-
30
-
-
54949128325
-
-
Crossbow Technologies Inc., 2008. Available from: .
-
Crossbow Technologies Inc., 2008. Available from: .
-
-
-
-
31
-
-
85177504856
-
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of the 6th ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of the 6th ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
-
-
-
32
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 52-61.
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 52-61.
-
-
-
-
33
-
-
3042783638
-
-
W. Du, J. Deng, Y. S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 42-51.
-
W. Du, J. Deng, Y. S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 42-51.
-
-
-
-
35
-
-
3042785862
-
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis and defenses, in: Proc. of 3rd IEEE/ACM Information Processing in Sensor Networks, 2004, pp. 259-268.
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis and defenses, in: Proc. of 3rd IEEE/ACM Information Processing in Sensor Networks, 2004, pp. 259-268.
-
-
-
-
36
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1 2-3 (2003) 293-315
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
38
-
-
33749041485
-
-
R. Roman, J. Zhou, J. Lopez, Applying intrusion detection systems to wireless sensor networks, in: Proc. of Consumer Communications and Networking Conference, 2006, pp. 640-644.
-
R. Roman, J. Zhou, J. Lopez, Applying intrusion detection systems to wireless sensor networks, in: Proc. of Consumer Communications and Networking Conference, 2006, pp. 640-644.
-
-
-
-
39
-
-
54949101209
-
-
H. Cam, S. Ozdemir, in: Yang Xiao (Ed.), False Data Detection and Secure Data Aggregation in Wireless Sensor Networks, Security in Distributed, Grid, Mobile and Pervasive Computing, Auerbach Publications, 2007.
-
H. Cam, S. Ozdemir, in: Yang Xiao (Ed.), False Data Detection and Secure Data Aggregation in Wireless Sensor Networks, Security in Distributed, Grid, Mobile and Pervasive Computing, Auerbach Publications, 2007.
-
-
-
-
40
-
-
33751067753
-
-
S. Ozdemir, H. Cam, Key establishment with source coding and reconciliation for wireless sensor networks, in: Proc. of IEEE IPCCC, 2006, pp. 55-63.
-
S. Ozdemir, H. Cam, Key establishment with source coding and reconciliation for wireless sensor networks, in: Proc. of IEEE IPCCC, 2006, pp. 55-63.
-
-
-
-
41
-
-
54949151552
-
-
J. Han, M. Kamber, Data Mining: Concepts and Techniques, second ed., The Morgan Kaufmann Series in Data Management Systems, 2007, pp. 455-456.
-
J. Han, M. Kamber, Data Mining: Concepts and Techniques, second ed., The Morgan Kaufmann Series in Data Management Systems, 2007, pp. 455-456.
-
-
-
-
42
-
-
54949102446
-
-
S. Buchegger, J.Y.L. Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proc. of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003.
-
S. Buchegger, J.Y.L. Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proc. of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003.
-
-
-
-
43
-
-
54949125392
-
-
C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in: Proc. of the second ACM Conference on Electronic Commerce, 2000, pp. 150-157.
-
C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in: Proc. of the second ACM Conference on Electronic Commerce, 2000, pp. 150-157.
-
-
-
-
44
-
-
50249148413
-
-
O. Garcia, H. Baldus, Distributed node revocation based on cooperative security, in: Proc. of IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007, pp.1-7.
-
O. Garcia, H. Baldus, Distributed node revocation based on cooperative security, in: Proc. of IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007, pp.1-7.
-
-
-
-
45
-
-
2342588224
-
Analysis of multipath routing. Part I: The effect on the packet delivery ratio
-
Tsirigos A., and Haas Z.J. Analysis of multipath routing. Part I: The effect on the packet delivery ratio. IEEE Transactions on Wireless Communications 3 1 (2004) 138-146
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.1
, pp. 138-146
-
-
Tsirigos, A.1
Haas, Z.J.2
-
46
-
-
54949134916
-
-
TinyOS Simulator, 2008. Available from: .
-
TinyOS Simulator, 2008. Available from: .
-
-
-
-
47
-
-
26644435250
-
-
V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, M. Welsh, Simulating the power consumption of large-scale sensor network applications, in: Proc. of the 2nd International Conference on Embedded Networked Sensor System, 2004, pp. 188-200.
-
V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, M. Welsh, Simulating the power consumption of large-scale sensor network applications, in: Proc. of the 2nd International Conference on Embedded Networked Sensor System, 2004, pp. 188-200.
-
-
-
|