-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz I., Su W., Sankarasubramaniam Y., and Cayirci E. A survey on sensor networks. IEEE Communications Magazine 40 8 (2002) 102-114
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
34547404724
-
-
Alarifi A, Du W. Diversify sensor nodes to improve resilience against node compromise. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
-
Alarifi A, Du W. Diversify sensor nodes to improve resilience against node compromise. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
-
-
-
-
4
-
-
48649094490
-
One-time sensors: a novel concept to mitigate node-capture attacks
-
Bicakci K., Gamage C., Crispo B., and Tanenbaum A.S. One-time sensors: a novel concept to mitigate node-capture attacks. ESAS (2005)
-
(2005)
ESAS
-
-
Bicakci, K.1
Gamage, C.2
Crispo, B.3
Tanenbaum, A.S.4
-
6
-
-
77956574096
-
-
Brutch P, Ko C. Challenges in intrusion detection for wireless ad-hoc networks. In: SAINT Workshop; 2003.
-
Brutch P, Ko C. Challenges in intrusion detection for wireless ad-hoc networks. In: SAINT Workshop; 2003.
-
-
-
-
8
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
Chan H., Gligor V.D., Perrig A., and Muralidharan G. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable Security Computing 2 3 (2005) 233-247
-
(2005)
IEEE Transactions on Dependable Security Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
9
-
-
37849004592
-
-
Conti M, Pietro RD, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc; 2007.
-
Conti M, Pietro RD, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc; 2007.
-
-
-
-
10
-
-
4544298056
-
-
Deng J, Han R, Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: DSN; 2004.
-
Deng J, Han R, Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: DSN; 2004.
-
-
-
-
11
-
-
33845938314
-
-
Dini G, Savino IM. An efficient key revocation protocol for wireless sensor networks. In: WOWMOM: international symposium on world of wireless, mobile and multimedia networks; 2006.
-
Dini G, Savino IM. An efficient key revocation protocol for wireless sensor networks. In: WOWMOM: international symposium on world of wireless, mobile and multimedia networks; 2006.
-
-
-
-
12
-
-
3042783638
-
-
Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS: conference on computer and communications security; 2003.
-
Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS: conference on computer and communications security; 2003.
-
-
-
-
13
-
-
34247376029
-
-
Dutta PK, Hui JW, Chu DC, Culler DE. Securing the deluge network programming system. In: IPSN: international conference on information processing in sensor networks; 2006.
-
Dutta PK, Hui JW, Chu DC, Culler DE. Securing the deluge network programming system. In: IPSN: international conference on information processing in sensor networks; 2006.
-
-
-
-
14
-
-
0038341106
-
-
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: CCS: conference on computer and communications security; 2002.
-
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: CCS: conference on computer and communications security; 2002.
-
-
-
-
15
-
-
14844315770
-
-
Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. In: SASN: workshop on security of ad hoc and sensor networks; 2004.
-
Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. In: SASN: workshop on security of ad hoc and sensor networks; 2004.
-
-
-
-
16
-
-
55749109862
-
-
Ganeriwal S, Ravi S, Raghunathan A. Trusted platform based key establishment and management for sensor networks. Unpublished.
-
Ganeriwal S, Ravi S, Raghunathan A. Trusted platform based key establishment and management for sensor networks. Unpublished.
-
-
-
-
17
-
-
33745639957
-
Node compromise in sensor networks: the need for secure systems
-
Department of Computer Science, University of Colorado, Boulder
-
Hartung C., Balasalle J., and Han R. Node compromise in sensor networks: the need for secure systems. Technical report CU-CS-990-05 (January 2005), Department of Computer Science, University of Colorado, Boulder
-
(2005)
Technical report CU-CS-990-05
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
18
-
-
22744432612
-
-
Hui JW, Culler D. The dynamic behavior of a data dissemination protocol for network programming at scale. In: SenSys: international conference on embedded networked sensor systems; 2004.
-
Hui JW, Culler D. The dynamic behavior of a data dissemination protocol for network programming at scale. In: SenSys: international conference on embedded networked sensor systems; 2004.
-
-
-
-
19
-
-
84942426861
-
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: Workshop on sensor network protocols and applications; 2003.
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: Workshop on sensor network protocols and applications; 2003.
-
-
-
-
20
-
-
55749083383
-
-
Kim DS, Sadi MG, Park JS. A key revocation scheme for mobile sensor networks. In: Frontiers of high performance computing and networking ISPA Workshops; 2007.
-
Kim DS, Sadi MG, Park JS. A key revocation scheme for mobile sensor networks. In: Frontiers of high performance computing and networking ISPA Workshops; 2007.
-
-
-
-
21
-
-
55749113007
-
A practical inter-sensor broadcast authentication scheme
-
Kim J.W., Kim Y.H., Lee H., and Lee D.H. A practical inter-sensor broadcast authentication scheme. HCI 5 (2007)
-
(2007)
HCI
, vol.5
-
-
Kim, J.W.1
Kim, Y.H.2
Lee, H.3
Lee, D.H.4
-
22
-
-
55749101585
-
-
Krauß C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: European workshop on security and privacy in ad hoc and sensor networks (ESAS); 2007.
-
Krauß C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: European workshop on security and privacy in ad hoc and sensor networks (ESAS); 2007.
-
-
-
-
23
-
-
56749170948
-
-
Krauß C, Schneider M, Eckert C. Defending against false-endorsement-based DoS attacks in wireless sensor networks. In: WiSec: conference on Wireless Network Security; 2008.
-
Krauß C, Schneider M, Eckert C. Defending against false-endorsement-based DoS attacks in wireless sensor networks. In: WiSec: conference on Wireless Network Security; 2008.
-
-
-
-
25
-
-
33751183522
-
A secure alternate path routing in sensor networks
-
Lee S.-B., and Choi Y.-H. A secure alternate path routing in sensor networks. Computer Communications 30 1 (2006) 153-165
-
(2006)
Computer Communications
, vol.30
, Issue.1
, pp. 153-165
-
-
Lee, S.-B.1
Choi, Y.-H.2
-
26
-
-
85000276942
-
Multilevel μTESLA: broadcast authentication for distributed sensor networks
-
Liu D., and Ning P. Multilevel μTESLA: broadcast authentication for distributed sensor networks. Transactions on Embedded Computing Systems 3 4 (2004) 800-836
-
(2004)
Transactions on Embedded Computing Systems
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
27
-
-
34547466172
-
-
Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
-
Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
-
-
-
-
28
-
-
55749111384
-
-
Maeng Y, Mohaisen A, Nyang D. Secret key revocation in sensor networks. In: International conference ubiquitous intelligence and computing (UIC); 2007.
-
Maeng Y, Mohaisen A, Nyang D. Secret key revocation in sensor networks. In: International conference ubiquitous intelligence and computing (UIC); 2007.
-
-
-
-
29
-
-
85177500160
-
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom: international conference on mobile computing and networking; 2000.
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom: international conference on mobile computing and networking; 2000.
-
-
-
-
30
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
Ning P., Liu A., and Du W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Transactions on Sensor Networks 4 1 (2008) 1-35
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
31
-
-
27544460282
-
-
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 2005.
-
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 2005.
-
-
-
-
32
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J.D., Wen V., and Culler D.E. SPINS: security protocols for sensor networks. Wireless Networks 8 5 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
33
-
-
18844457825
-
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. In: SenSys: international conference on embedded networked sensor systems; 2003.
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. In: SenSys: international conference on embedded networked sensor systems; 2003.
-
-
-
-
34
-
-
0017983255
-
Reliability issues in computing system design
-
Randell B., Lee P., and Treleaven P.C. Reliability issues in computing system design. ACM Computing Surveys 10 2 (1978) 123-165
-
(1978)
ACM Computing Surveys
, vol.10
, Issue.2
, pp. 123-165
-
-
Randell, B.1
Lee, P.2
Treleaven, P.C.3
-
35
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Ren K., Lou W., Zeng K., and Moran P.J. On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 6 11 (2007) 4136-4144
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
36
-
-
33749041485
-
-
Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. In: IEEE consumer communications and networking conference (CCNC); 2006.
-
Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. In: IEEE consumer communications and networking conference (CCNC); 2006.
-
-
-
-
37
-
-
3042738543
-
-
Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: SoftWare-based ATTestation for embedded devices. In: IEEE symposium on security and privacy; 2004.
-
Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: SoftWare-based ATTestation for embedded devices. In: IEEE symposium on security and privacy; 2004.
-
-
-
-
38
-
-
34247361254
-
-
Seshadri A, Luk M, Perrig A, van Doorn L, Khosla P. SCUBA: secure code update by attestation in sensor networks. In: WiSe: workshop on wireless security; 2006.
-
Seshadri A, Luk M, Perrig A, van Doorn L, Khosla P. SCUBA: secure code update by attestation in sensor networks. In: WiSe: workshop on wireless security; 2006.
-
-
-
-
39
-
-
55749096383
-
-
Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report, Available from: ; 2006.
-
Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report, Available from: ; 2006.
-
-
-
-
40
-
-
85084160265
-
-
Wu T, Malkin M, Boneh D. Building intrusion tolerant applications. In: SSYM: conference on USENIX security symposium; 1999.
-
Wu T, Malkin M, Boneh D. Building intrusion tolerant applications. In: SSYM: conference on USENIX security symposium; 1999.
-
-
-
-
41
-
-
3543100577
-
-
Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks. In: IEEE INFOCOM; 2004.
-
Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks. In: IEEE INFOCOM; 2004.
-
-
-
-
42
-
-
25844473466
-
-
Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: IEEE INFOCOM; 2005.
-
Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: IEEE INFOCOM; 2005.
-
-
-
-
43
-
-
10044284351
-
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS: conference on computer and communications security; 2003.
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS: conference on computer and communications security; 2003.
-
-
-
-
44
-
-
3543056512
-
-
Zhu S, Setia S, Jajodia S, Ning P. An interleaved hop-by hop authentication scheme for filtering false data in sensor networks. In: IEEE symposium on security and privacy; 2004.
-
Zhu S, Setia S, Jajodia S, Ning P. An interleaved hop-by hop authentication scheme for filtering false data in sensor networks. In: IEEE symposium on security and privacy; 2004.
-
-
-
|