-
2
-
-
0038487088
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
-
-
-
3
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
SecureComm, September
-
H. Choi, S. Zhu, T.F La Porta, SET: detecting node clones in sensor networks, in: IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), September 2007, pp. 341-350.
-
(2007)
IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks
, pp. 341-350
-
-
Choi, H.1
Zhu, S.2
La Porta, T.F.3
-
4
-
-
37849004592
-
A Randomized, Efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
September
-
M. Conti, R.D. Pietro, L.V. Mancini, A. Mei. A Randomized, Efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, in: ACM Mobihoc, September 2007, pp. 80-89.
-
(2007)
ACM Mobihoc
, pp. 80-89
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
5
-
-
39049083533
-
-
F. Delgosha, F. Fekri, Threshold key-establishment in distributed sensor networks using a multivariate scheme, in: IEEE INFOCOM, April 2006, pp. 1-12.
-
F. Delgosha, F. Fekri, Threshold key-establishment in distributed sensor networks using a multivariate scheme, in: IEEE INFOCOM, April 2006, pp. 1-12.
-
-
-
-
6
-
-
8344262333
-
-
W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE INFOCOM, March 2004, pp. 586-597.
-
W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE INFOCOM, March 2004, pp. 586-597.
-
-
-
-
7
-
-
67650385906
-
-
W. Du, L. Fang, P. Ning, LAD: localization anomaly detection for wireless sensor networks. in: IEEE IPDPS, April 2005.
-
W. Du, L. Fang, P. Ning, LAD: localization anomaly detection for wireless sensor networks. in: IEEE IPDPS, April 2005.
-
-
-
-
8
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
May
-
W. Du, R. Wang, P. Ning, An efficient scheme for authenticating public keys in sensor networks, in: ACM MobiHoc, May 2005, pp. 58-67.
-
(2005)
ACM MobiHoc
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
9
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
September
-
S. Ganeriwal, S. Čapkun, C.C. Han, M.B. Srivastava, Secure time synchronization service for sensor networks, in: ACM WiSe, September 2005, pp. 97-106.
-
(2005)
ACM WiSe
, pp. 97-106
-
-
Ganeriwal, S.1
Čapkun, S.2
Han, C.C.3
Srivastava, M.B.4
-
10
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
PerCom, March
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, S. Eberle, H. Chang, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2005, pp. 247-256.
-
(2005)
IEEE International Conference on Pervasive Computing and Communications
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, S.6
Chang, H.7
-
11
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder, January
-
C. Hartung, J. Balasalle, R. Han, Node compromise in sensor networks: the need for secure systems, in: Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder, January 2005.
-
(2005)
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
12
-
-
33144467507
-
-
Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 91-98.
-
Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 91-98.
-
-
-
-
13
-
-
51249087814
-
-
A. Liu, P. Ning. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), SPOTS Track, April 2008, pp. 245-256.
-
A. Liu, P. Ning. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), SPOTS Track, April 2008, pp. 245-256.
-
-
-
-
14
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pariwise keys in distributed sensor networks, in: ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 52-61.
-
D. Liu, P. Ning, Establishing pariwise keys in distributed sensor networks, in: ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 52-61.
-
-
-
-
15
-
-
33144467903
-
-
D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 99-106.
-
D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 99-106.
-
-
-
-
16
-
-
33749033368
-
Group-based key pre-distribution in wireless sensor networks
-
WiSe, September
-
D. Liu, P. Ning, W. Du, Group-based key pre-distribution in wireless sensor networks, in: ACM Workshop on Wireless Security (WiSe), September 2005, pp. 11-20.
-
(2005)
ACM Workshop on Wireless Security
, pp. 11-20
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
17
-
-
27544460282
-
-
B. Parno, A. Perrig, V.D. Gligor, Distributed detection of node replication attacks in sensor networks, in: IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
-
B. Parno, A. Perrig, V.D. Gligor, Distributed detection of node replication attacks in sensor networks, in: IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
-
-
-
-
18
-
-
33749987832
-
Attack-resilient time synchronization for wireless sensor networks
-
Song H., Zhu S., and Cao G. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5 1 (2007) 112-125
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 112-125
-
-
Song, H.1
Zhu, S.2
Cao, G.3
-
19
-
-
34547282118
-
-
K. Sun, P. Ning, C. Wang, A. Liu, Y. Zhou, TinySeRSync: secure and resilient time synchronization in wireless sensor networks, in: ACM CCS, October 2006, pp. 264-277.
-
K. Sun, P. Ning, C. Wang, A. Liu, Y. Zhou, TinySeRSync: secure and resilient time synchronization in wireless sensor networks, in: ACM CCS, October 2006, pp. 264-277.
-
-
-
-
20
-
-
51849154205
-
-
H. Wang, B. Sheng, C.C. Tan, Q. Li, Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control, in: IEEE ICDCS, 2008, pp. 11-18.
-
H. Wang, B. Sheng, C.C. Tan, Q. Li, Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control, in: IEEE ICDCS, 2008, pp. 11-18.
-
-
-
-
21
-
-
37849028668
-
A random perturbation-based scheme for pairwise key establishment in sensor networks
-
September
-
W. Zhang, M. Tran, S. Zhu, G. Cao, A random perturbation-based scheme for pairwise key establishment in sensor networks, in: ACM Mobihoc, September 2007, pp. 90-99.
-
(2007)
ACM Mobihoc
, pp. 90-99
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
-
22
-
-
48649109631
-
-
B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in: ACSAC, December 2007, pp. 257-267.
-
B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in: ACSAC, December 2007, pp. 257-267.
-
-
-
|