-
1
-
-
33746800200
-
A survey of application distribution in wireless sensor networks
-
M. Kuorilehto, M. Hännikäinen, and T. D. Hämäläinen, "A survey of application distribution in wireless sensor networks," EURASIP J. Wirel. Commun. Netw., vol. 5, no. 5, pp. 774-788, 2005.
-
(2005)
EURASIP J. Wirel. Commun. Netw
, vol.5
, Issue.5
, pp. 774-788
-
-
Kuorilehto, M.1
Hännikäinen, M.2
Hämäläinen, T.D.3
-
2
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA: ACM Press
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in Sen-Sys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2004, pp. 162-175.
-
(2004)
Sen-Sys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
3
-
-
78651554547
-
-
Axis, Axis cameras and axis camera station software, http:// www.axis.com/, 2007.
-
Axis, "Axis cameras and axis camera station software," http:// www.axis.com/, 2007.
-
-
-
-
5
-
-
84883065413
-
Senseye: A multi-tier camera sensor network
-
New York, NY, USA: ACM Press
-
P. Kulkarni, D. Ganesan, P. Shenoy, and Q. Lu, "Senseye: a multi-tier camera sensor network," in MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia. New York, NY, USA: ACM Press, 2005, pp. 229-238.
-
(2005)
MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
, pp. 229-238
-
-
Kulkarni, P.1
Ganesan, D.2
Shenoy, P.3
Lu, Q.4
-
6
-
-
0027617271
-
Increasing availability and security of an authentication service
-
June
-
L. Gong, "Increasing availability and security of an authentication service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657-662, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
7
-
-
0029513859
-
Key distribution without individual trusted authentication servers
-
IEEE Computer Society Press, June
-
L. Chen, D. Gollmann, and C. J. Mitchell, "Key distribution without individual trusted authentication servers," in 8th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1995, pp. 30-36.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 30-36
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.J.3
-
8
-
-
0029718780
-
A class of flexible and efficient key management protocols
-
Washington, DC, USA: IEEE Computer Society
-
C. Boyd, "A class of flexible and efficient key management protocols," in CSFW '96: Proceedings of the Ninth IEEE Computer Security Foundations Workshop. Washington, DC, USA: IEEE Computer Society, 1996, p. 2.
-
(1996)
CSFW '96: Proceedings of the Ninth IEEE Computer Security Foundations Workshop
, pp. 2
-
-
Boyd, C.1
-
9
-
-
47749148434
-
A minimal protocol for authenticated key distribution in wireless sensor networks
-
Bangalore, India: IEEE Press, December
-
K. Singh and V. Muthukkumarasamy, "A minimal protocol for authenticated key distribution in wireless sensor networks," in ICISIP '06: Proceedings of the 4th International Conference on intelligent Sensing and information Processing. Bangalore, India: IEEE Press, December 2006, pp. 78-83.
-
(2006)
ICISIP '06: Proceedings of the 4th International Conference on intelligent Sensing and information Processing
, pp. 78-83
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
10
-
-
47749104834
-
Introduction to wireless sensor networks
-
N. Bulusu and S. Jha, Eds. Artech House
-
N. Bulusu, "Introduction to wireless sensor networks," in Wireless Sensor Networks: A Systems Perspective, N. Bulusu and S. Jha, Eds. Artech House, 2005.
-
(2005)
Wireless Sensor Networks: A Systems Perspective
-
-
Bulusu, N.1
-
11
-
-
47749133330
-
-
Crossbow, "Crossbow," http://www.xbow.com/, 2006.
-
(2006)
Crossbow
-
-
Crossbow1
-
12
-
-
78651564788
-
-
GNOME
-
GNOME, "A controller node," http://cmlab.rice.edu/projects /sensors, 2006.
-
(2006)
A controller node
-
-
-
14
-
-
78651550800
-
-
MANTIS
-
MANTIS, "The mantis contoller node," http://mantis.cs. colorado.edu/, 2006.
-
(2006)
The mantis contoller node
-
-
-
15
-
-
78651547492
-
Sensor-network security, privacy, and fault tolerance
-
N. Bulusu and S. Jha, Eds. Artech House
-
J. Deng, R. Han, and S. Mishra, "Sensor-network security, privacy, and fault tolerance," in Wireless Sensor Networks: A Systems Perspective, N. Bulusu and S. Jha, Eds. Artech House, 2005.
-
(2005)
Wireless Sensor Networks: A Systems Perspective
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
16
-
-
34347217295
-
-
J. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," 2006, http://www.cs.wayne.edu/~weisong/ papers/walters05-wsn-security-survey.pdf.
-
(2006)
Wireless sensor network security: A survey
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
17
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
18
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
New York, NY, USA: ACM Press
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: securing sensor networks with public key technology," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 59-64.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
19
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA, USA: IEEE Computer Society Press, October
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in Proc. 1st IEEE Communications Society Conference on Sensor and Ah Hoc Communications and Networks (SECON '04). Santa Clara, CA, USA: IEEE Computer Society Press, October 2004, pp. 71-80.
-
(2004)
Proc. 1st IEEE Communications Society Conference on Sensor and Ah Hoc Communications and Networks (SECON '04)
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
20
-
-
47749111952
-
Protecting small keys in authentication protocols for wireless sensor networks
-
Melbourne, Australia, December
-
K. Singh, K. Bhatt, and V. Muthukkumarasamy, "Protecting small keys in authentication protocols for wireless sensor networks," in Proceedings of the Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, December 2006, pp. 31-35.
-
(2006)
Proceedings of the Australian Telecommunication Networks and Applications Conference
, pp. 31-35
-
-
Singh, K.1
Bhatt, K.2
Muthukkumarasamy, V.3
-
21
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington, DC, USA: IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2003, p. 197.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
22
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences,
-
Online, Available
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Lecture Notes in Computer Science, vol. 740, pp. 471-486, 1993. [Online]. Available: citeseer.ist.psu.edu /blundo95perfectlysecure.html
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
24
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
IEEE Computer Society Press, Mar
-
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom. IEEE Computer Society Press, Mar. 2005.
-
(2005)
Proceedings of IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
25
-
-
18844457825
-
Sia: Secure information aggregation in sensor networks
-
New York, NY, USA: ACM Press
-
B. Przydatek, D. Song, and A. Perrig, "Sia: secure information aggregation in sensor networks," in SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2003, pp. 255-265.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
26
-
-
14844300164
-
Resilient aggregation in sensor networks
-
New York, NY, USA: ACM Press
-
D. Wagner, "Resilient aggregation in sensor networks," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 78-87.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 78-87
-
-
Wagner, D.1
-
27
-
-
18844407590
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA: ACM Press
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2003, pp. 308-309.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 308-309
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
28
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks
-
IEEE, June
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks," in Dependable Systems and Networks, 2004 International Conference on. IEEE, June 2004, pp. 637-646.
-
(2004)
Dependable Systems and Networks, 2004 International Conference on
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
84976731140
-
A key distribution protocol using event markers
-
R. K. Bauer, T. A. Berson, and R. J. Feiertag, "A key distribution protocol using event markers," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 249-255, 1983.
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 249-255
-
-
Bauer, R.K.1
Berson, T.A.2
Feiertag, R.J.3
-
32
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway and O. Rees, "Efficient and timely mutual authentication," SIGOPS Oper. Syst. Rev., vol. 21, no. 1, pp. 8-10, 1987.
-
(1987)
SIGOPS Oper. Syst. Rev
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
33
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," Proceedings of the Royal Society of London, vol. A426, pp. 233-271, 1989.
-
(1989)
Proceedings of the Royal Society of London
, vol.A426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
34
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
New York, NY, USA: ACM Press
-
M. Bellare and P. Rogaway, "Provably secure session key distribution: the three party case," in STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. New York, NY, USA: ACM Press, 1995, pp. 57-66.
-
(1995)
STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
35
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. Softw. Eng., vol. 22, no. 1, pp. 6-15, 1996.
-
(1996)
IEEE Trans. Softw. Eng
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
36
-
-
78651545696
-
-
ISO11770-2, Information technology - security techniques - key management - part 2: Mechanisms using symmetric techniques iso/iec 11770-2, 1996.
-
ISO11770-2, "Information technology - security techniques - key management - part 2: Mechanisms using symmetric techniques iso/iec 11770-2," 1996.
-
-
-
-
37
-
-
84945119254
-
Entity authentication and key distribution
-
New York, NY, USA: Springer-Verlag New York, Inc
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1994, pp. 232-249.
-
(1994)
CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
38
-
-
0029368205
-
Secure and minimal protocols for authenticated key distribution
-
September
-
P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, no. 9, pp. 645-653, September 1995.
-
(1995)
Computer Communications
, vol.18
, Issue.9
, pp. 645-653
-
-
Janson, P.1
Tsudik, G.2
-
39
-
-
33646180371
-
On session key construction in provably-secure key establishment protocols
-
Springer
-
K.-K. R. Choo, C. Boyd, and Y. Hitchcock, "On session key construction in provably-secure key establishment protocols." in Mycrypt. Springer, 2005, pp. 116-131.
-
(2005)
Mycrypt
, pp. 116-131
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
40
-
-
33746687870
-
Security in wireless sensor networks: Considerations and experiments
-
P. Hämäläinen, M. Kuorilehto, T. Alho, M. Hännikäinen, and T. D. Hämäläinen, "Security in wireless sensor networks: Considerations and experiments." in SAMOS, 2006, pp. 167-177.
-
(2006)
SAMOS
, pp. 167-177
-
-
Hämäläinen, P.1
Kuorilehto, M.2
Alho, T.3
Hännikäinen, M.4
Hämäläinen, T.D.5
-
43
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
New York, NY, USA: ACM Press
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 66-77.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
|