-
1
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable coordination in sensor networks," in Proc. International Conf. Mobile Computing Networking, 1999, pp. 263-270.
-
(1999)
Proc. International Conf. Mobile Computing Networking
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
3
-
-
0034445661
-
System architecture directions for network sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for network sensors," in Proc. ASPLOS-IX, 2000.
-
(2000)
Proc. ASPLOS-IX
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
4
-
-
85116610435
-
Next century challenges: Mobile networking for smart dust
-
J. M. Kahn, R. H. Katz, and K. S. J. Pister, "Next century challenges: Mobile networking for "smart dust," in Proc. International Conf. Mobile Computing Networking, 1999, pp. 271-278.
-
(1999)
Proc. International Conf. Mobile Computing Networking
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
5
-
-
0036688074
-
A survey on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, pp. 102-114, 2002.
-
(2002)
IEEE Commun. Mag
, vol.40
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Commun. Mag., vol. 11, pp. 38-43, 2004.
-
(2004)
IEEE Commun. Mag
, vol.11
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
7
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
D. Djenouri, L. Khelladi, and N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Commun. Surveys Tutorials, vol. 7, pp. 2-28, 2005.
-
(2005)
IEEE Commun. Surveys Tutorials
, vol.7
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
8
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tutorials, vol. 8, pp. 2-23, 2006.
-
(2006)
IEEE Commun. Surveys Tutorials
, vol.8
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
11
-
-
0010461175
-
Constraints and approaches. for distributed sensor network security,
-
00-010, 2000
-
D. W. Carman, P. S. Kruus, and B. J. Matt, "Constraints and approaches. for distributed sensor network security," NAI Labs Technical Report 00-010, 2000.
-
NAI Labs Technical Report
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
12
-
-
4243082091
-
-
A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor. networks, Commun. ACM, Special Issue: Wireless sensor networks, 47, pp. 53-57, 2004.
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor. networks," Commun. ACM, Special Issue: Wireless sensor networks, vol. 47, pp. 53-57, 2004.
-
-
-
-
13
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
14
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
H. Song, L. Xie, S. Zhu, and G. Cao, "Sensor node compromise detection: The location perspective," in Proc. International Conf. Wireless Commun. Mobile Computing, 2007, pp. 242-247.
-
(2007)
Proc. International Conf. Wireless Commun. Mobile Computing
, pp. 242-247
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
15
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. 3rd International Symposium on Information Processing in Sensor Networks, 2004, pp. 259-268.
-
(2004)
Proc. 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
16
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symposium Security Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symposium Security Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
1542317077
-
Information assurance in sensor networks
-
B. Deb, S. Bhatnagar, and B. Nath, "Information assurance in sensor networks," in Proc. 2nd ACM International Conference on Wireless Sensor Networks and Applications, 2003, pp. 160-168.
-
(2003)
Proc. 2nd ACM International Conference on Wireless Sensor Networks and Applications
, pp. 160-168
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
18
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, pp. 293-315, 2003.
-
(2003)
Elsevier's AdHoc Networks Journal
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
19
-
-
1542376949
-
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, 2003, pp. 151-159.
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, 2003, pp. 151-159.
-
-
-
-
20
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Springer Netherlands Wireless Networks, vol. 8, pp. 521-534, 2002.
-
(2002)
Springer Netherlands Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
21
-
-
20344392154
-
Benchmarking block ciphers for wireless sensor networks
-
Y. W. Law, J. Doumen, and P. Hartel, "Benchmarking block ciphers for wireless sensor networks," in Proc. IEEE International Conf. Mobile Ad-hoc Sensor Systems, 2004, pp. 447-456.
-
(2004)
Proc. IEEE International Conf. Mobile Ad-hoc Sensor Systems
, pp. 447-456
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
22
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Y. W. Law, J. Doumen, and P. Hartel,"Survey and benchmark of block ciphers for wireless sensor networks," ACM Trans. Sensor Networks, vol. 2, pp. 65-93, 2006.
-
(2006)
ACM Trans. Sensor Networks
, vol.2
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
24
-
-
33646812572
-
State of the art in public-key cryptography for wireless sensor networks
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar, "State of the art in public-key cryptography for wireless sensor networks," in Proc. 3rd IEEE International Conf. Pervasive Computing Commun. Workshops (PERCOMW), 2005, pp. 146-150.
-
(2005)
Proc. 3rd IEEE International Conf. Pervasive Computing Commun. Workshops (PERCOMW)
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
25
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography," in Proc. 1st IEEE International Conf. Sensor Ad Hoc Commun. Networks SECON, 2004, pp. 71-80.
-
(2004)
Proc. 1st IEEE International Conf. Sensor Ad Hoc Commun. Networks SECON
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
26
-
-
67650874311
-
-
G. Gaubatz, J.-P. Kaps, and B. Sunar, Public key cryptography in sensor networks-revisited, in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
-
G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public key cryptography in sensor networks-revisited," in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
-
-
-
-
27
-
-
1542317846
-
An authentication framework for hierarchical ad hoc sensor networks
-
M. Bohge and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks," in Proc. ACM Workshop Wireless Security, 2003, pp. 79-87
-
(2003)
Proc. ACM Workshop Wireless Security
, pp. 79-87
-
-
Bohge, M.1
Trappe, W.2
-
28
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175
-
(2004)
Proc. 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
29
-
-
33745963889
-
A security architecture for mobile wireless sensor networks
-
S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks," in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
-
(2004)
Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS)
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
31
-
-
67650919170
-
-
I. C. Technology, MICA2: Wireless Measurement System.
-
I. C. Technology, "MICA2: Wireless Measurement System."
-
-
-
-
32
-
-
67650919171
-
-
S. A. Camtepe and B. Yener, Key distribution mechanisms for wireless sensor networks: A survey, Computer Science Department at RPI Tech, Rep. TR-05-07, 2005.
-
S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: A survey," Computer Science Department at RPI Tech, Rep. TR-05-07, 2005.
-
-
-
-
34
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inform. System Security (TISSEC), vol. 8, pp. 228-258, 2005.
-
(2005)
ACM Trans. Inform. System Security (TISSEC)
, vol.8
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
35
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Inform. System Security (TISSEC), vol. 8, pp. 41-77, 2005.
-
(2005)
ACM Trans. Inform. System Security (TISSEC)
, vol.8
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
36
-
-
39049083533
-
Threshold key-establishment in distributed sensor networks using a multivariate scheme
-
F. Delgosha and F. Fekri, "Threshold key-establishment in distributed sensor networks using a multivariate scheme," in Proc. IEEE INFO-COM, 2006.
-
(2006)
Proc. IEEE INFO-COM
-
-
Delgosha, F.1
Fekri, F.2
-
37
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. 11th IEEE International Conf. Network Protocols Center Secure Inf. Syst., 2003, pp. 326-335.
-
(2003)
Proc. 11th IEEE International Conf. Network Protocols Center Secure Inf. Syst
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
38
-
-
4544301464
-
Random key assignment for secure wireless sensor networks
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Random key assignment for secure wireless sensor networks," in Proc. 1st ACM Workshop Security Ad hoc Sensor Networks, 2003, pp. 62-71
-
(2003)
Proc. 1st ACM Workshop Security Ad hoc Sensor Networks
, pp. 62-71
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
39
-
-
34247388513
-
Location dependent key management using random key-predistribution in sensor networks
-
F. Anjum, "Location dependent key management using random key-predistribution in sensor networks," in Proc. 5th ACM Workshop on Wireless Security, 2006, pp. 21-30
-
(2006)
Proc. 5th ACM Workshop on Wireless Security
, pp. 21-30
-
-
Anjum, F.1
-
40
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proc. IEEE INFOCOM, 2004
-
(2004)
Proc. IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
41
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware key management scheme for wireless sensor networks," in Proc. 2nd ACM Sorkshop on Security of Ad hoc and Sensor Networks, 2004, pp. 29-42
-
(2004)
Proc. 2nd ACM Sorkshop on Security of Ad hoc and Sensor Networks
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
43
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks," in Proc. 6th ACM International Symposium Mobile Ad hoc Networking Computing (MOBIHOC), 2005, pp. 34-45
-
(2005)
Proc. 6th ACM International Symposium Mobile Ad hoc Networking Computing (MOBIHOC)
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
44
-
-
41449118287
-
PIKE: Peer intermediaries for key establishment
-
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment," in Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
46
-
-
39049087772
-
Supporting secure communication and data collection in mobile sensor networks
-
L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
-
48
-
-
24944550584
-
A combinatorial approach to key predistribu-tion for distributed sensor networks
-
J. Lee and D. R. Stinson, "A combinatorial approach to key predistribu-tion for distributed sensor networks," in Proc. IEEE Wireless Commun. Networking Conf., 2005, vol. 2, pp. 1200-1205.
-
(2005)
Proc. IEEE Wireless Commun. Networking Conf
, vol.2
, pp. 1200-1205
-
-
Lee, J.1
Stinson, D.R.2
-
49
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, "Fast authenticated key establishment protocols for self-organizing sensor networks," in Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, 2003, pp. 141-150.
-
(2003)
Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
50
-
-
3142656746
-
A decentralized approach to secure group membership testing in distributed sensor networks
-
J. Zachary, "A decentralized approach to secure group membership testing in distributed sensor networks," in Proc. IEEE Military Commun. Conf., 2003.
-
(2003)
Proc. IEEE Military Commun. Conf
-
-
Zachary, J.1
-
51
-
-
36349017874
-
Improved self-healing key distribution with revocation in wireless sensor network
-
R. Dutta and S. Mukhopadhyay, "Improved self-healing key distribution with revocation in wireless sensor network," in Proc. IEEE Wireless Commun. Networking Con.(WCNC), 2007, pp. 2963-2968.
-
(2007)
Proc. IEEE Wireless Commun. Networking Con.(WCNC)
, pp. 2963-2968
-
-
Dutta, R.1
Mukhopadhyay, S.2
-
53
-
-
25844530844
-
New constructions on broadcast encryption and key pre-distribution schemes
-
C.-H. Huang and D. Du, "New constructions on broadcast encryption and key pre-distribution schemes," in Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Huang, C.-H.1
Du, D.2
-
54
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach," in Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
56
-
-
39049089652
-
Leveraging channel diversity for key establishment in wireless sensor networks
-
M. J. Miller and N. H. Vaidya, "Leveraging channel diversity for key establishment in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Miller, M.J.1
Vaidya, N.H.2
-
57
-
-
28444454523
-
SECK: Survivable and efficient keying in wireless sensor networks
-
M. Chorzempa, J. M. Park, and M. Eltoweissy, "SECK: Survivable and efficient keying in wireless sensor networks," in Proc. IEEE Workshop Information Assurance Wireless Sensor Networks, (WSNIA), 2005.
-
(2005)
Proc. IEEE Workshop Information Assurance Wireless Sensor Networks, (WSNIA)
-
-
Chorzempa, M.1
Park, J.M.2
Eltoweissy, M.3
-
58
-
-
2442478355
-
Lightweight key management for wireless sensor networks
-
M. Eltoweissy, M. Younis, and K. Ghumman, "Lightweight key management for wireless sensor networks," in Proc. IEEE International Conf. Performance, Computing, Commun., 2004, pp. 813-818.
-
(2004)
Proc. IEEE International Conf. Performance, Computing, Commun
, pp. 813-818
-
-
Eltoweissy, M.1
Younis, M.2
Ghumman, K.3
-
59
-
-
34547376528
-
An efficient key management scheme for secure sensor networks
-
Y.-S. Jeong, B.-K. Lee, and S.-H. Lee, "An efficient key management scheme for secure sensor networks," in Proc. 6th IEEE International Conf. Computer Inform. Technol. (CIT), 2006, p. 228.
-
(2006)
Proc. 6th IEEE International Conf. Computer Inform. Technol. (CIT)
, pp. 228
-
-
Jeong, Y.-S.1
Lee, B.-K.2
Lee, S.-H.3
-
60
-
-
84883897746
-
A low-energy key nanagement protocol for wireless sensor networks
-
G. Jolly, M. Kuscu, P. Kokate, and M. Youni, "A low-energy key nanagement protocol for wireless sensor networks," in Proc. 8th International Symposium Computers Commun. (ISCC), 2003, vol. 1, pp. 335-340.
-
(2003)
Proc. 8th International Symposium Computers Commun. (ISCC)
, vol.1
, pp. 335-340
-
-
Jolly, G.1
Kuscu, M.2
Kokate, P.3
Youni, M.4
-
61
-
-
33646921841
-
Location-aware combinatorial key management scheme for clustered sensor networks
-
M. F. Younis, K. Ghumman, and M. Eltoweissy, "Location-aware combinatorial key management scheme for clustered sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 17, pp. 865-882, 2006.
-
(2006)
IEEE Trans. Parallel Distrib. Syst
, vol.17
, pp. 865-882
-
-
Younis, M.F.1
Ghumman, K.2
Eltoweissy, M.3
-
62
-
-
33748959977
-
Establishing pair-wise keys in heterogeneous sensor networks
-
P. Traynor, H. Choi, G. Cao, S. Zhu, and T. L. Porta, "Establishing pair-wise keys in heterogeneous sensor networks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Traynor, P.1
Choi, H.2
Cao, G.3
Zhu, S.4
Porta, T.L.5
-
63
-
-
36348971223
-
Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks
-
I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, "Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks," in Proc. IEEE Wireless Commun. Networking Conf. (WCNC), 2007, pp. 4145-4150.
-
(2007)
Proc. IEEE Wireless Commun. Networking Conf. (WCNC)
, pp. 4145-4150
-
-
Chuang, I.-H.1
Su, W.-T.2
Wu, C.-Y.3
Hsu, J.-P.4
Kuo, Y.-H.5
-
64
-
-
0035789267
-
Secure pebblenets
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, "Secure pebblenets," in Proc. 2nd ACM International Symposium on Mobile Ad hoc Networking Computing, 2001, pp. 156-163.
-
(2001)
Proc. 2nd ACM International Symposium on Mobile Ad hoc Networking Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
65
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. International Conf. Parallel Processing Workshops, 2003, pp. 397-406.
-
(2003)
Proc. International Conf. Parallel Processing Workshops
, pp. 397-406
-
-
Pietro, R.D.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.J.M.5
-
67
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
New York: Springer-Verlag
-
R. Blom, "An optimal class of symmetric key generation systems," in Proc. EUROCRYPT 84 Workshop Advances Cryptology. New York: Springer-Verlag 1985, pp. 335-338.
-
(1985)
Proc. EUROCRYPT 84 Workshop Advances Cryptology
, pp. 335-338
-
-
Blom, R.1
-
69
-
-
48049122627
-
Node compromise modeling and its applications in sensor networks
-
X. Chen, K. Makki, K. Yen, and N. Pissinou, "Node compromise modeling and its applications in sensor networks," in Procqqqqqqq. IEEE Symposium Computers Communications (ISCC), 2007.
-
(2007)
Procqqqqqqq. IEEE Symposium Computers Communications (ISCC)
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
70
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFO-COM, 2003.
-
(2003)
Proc. IEEE INFO-COM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
72
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symposium Security and Privacy, 2005, pp. 49-63.
-
(2005)
Proc. IEEE Symposium Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
73
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1307-1315.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
74
-
-
0034865628
-
Diagnosis of sensor networks
-
C. Jaikaeo, C. Srisathapornphat, and C.-C. Shen, "Diagnosis of sensor networks," in Proc. IEEE International Conf. Commun., 2001, vol. 5, pp. 1627-1632.
-
(2001)
Proc. IEEE International Conf. Commun
, vol.5
, pp. 1627-1632
-
-
Jaikaeo, C.1
Srisathapornphat, C.2
Shen, C.-C.3
-
75
-
-
0036986435
-
Efficient tracing of failed nodes in sensor networks
-
J. Staddon, D. Balfanz, and G. Durfee, "Efficient tracing of failed nodes in sensor networks," in Proc. 1st ACM International Workshop Wireless Sensor Networks Applications, 2002, pp. 122-130
-
(2002)
Proc. 1st ACM International Workshop Wireless Sensor Networks Applications
, pp. 122-130
-
-
Staddon, J.1
Balfanz, D.2
Durfee, G.3
-
76
-
-
3142751481
-
On supporting distributed collaboration in sensor networks
-
G. Wang, W. Zhang, and G. Cao, "On supporting distributed collaboration in sensor networks," in Proc. IEEE Military Communi. Conf., 2003, vol. 2, pp. 752-757.
-
(2003)
Proc. IEEE Military Communi. Conf
, vol.2
, pp. 752-757
-
-
Wang, G.1
Zhang, W.2
Cao, G.3
-
77
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annual International Conference Mobile Computing Networking, 2000, pp. 255-265
-
(2000)
Proc. 6th Annual International Conference Mobile Computing Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
78
-
-
25844521520
-
Localized fault-tolerant event boundary detection in sensor networks
-
M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks," in Proc. IEEE INFO-COM, 2005, vol. 2, pp. 902-913
-
(2005)
Proc. IEEE INFO-COM
, vol.2
, pp. 902-913
-
-
Ding, M.1
Chen, D.2
Xing, K.3
Cheng, X.4
-
79
-
-
1842478856
-
Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks
-
B. Krishnamachari and S. Iyengar, "Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks," IEEE Trans. Comput., vol. 53, pp. 241-250, 2004.
-
(2004)
IEEE Trans. Comput
, vol.53
, pp. 241-250
-
-
Krishnamachari, B.1
Iyengar, S.2
-
80
-
-
14344259796
-
Distributed deviation detection in sensor networks
-
T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed deviation detection in sensor networks," ACM SIGMOD Record, vol. 32, pp. 77-82, 2003.
-
(2003)
ACM SIGMOD Record
, vol.32
, pp. 77-82
-
-
Palpanas, T.1
Papadopoulos, D.2
Kalogeraki, V.3
Gunopulos, D.4
-
81
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1937-1945.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
82
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Advanced Commun. Multimedia Security, 2002, pp. 107-121.
-
(2002)
Proc. Advanced Commun. Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
83
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger and J.-Y. L. Boudec, "Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks," in Proc. 10th Euromicro Workshop Parallel, Distributed Network-Based Processing, 2002, pp. 403-410.
-
(2002)
Proc. 10th Euromicro Workshop Parallel, Distributed Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
85
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, and J.-Y. L. Boudec, "Self-organization in mobile ad hoc networks: The approach of terminodes," IEEE Commun. Mag., vol. 39, pp. 166-174, 2001.
-
(2001)
IEEE Commun. Mag
, vol.39
, pp. 166-174
-
-
Blazevic, L.1
Buttyan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Boudec, J.-Y.L.6
-
87
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks," in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1987-1997
-
(2003)
Proc. IEEE INFOCOM
, vol.3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
88
-
-
3042738543
-
SWATT: SoftWare-based ATTestation for embedded devices
-
A. Seshadri, A. Perrig, L. v. Doorn, and P. Khosla, "SWATT: SoftWare-based ATTestation for embedded devices," in Proc. IEEE Symposium Security Privacy, 2004, pp. 272-282.
-
(2004)
Proc. IEEE Symposium Security Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.4
-
89
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
A. Seshadri, M. Luk, A. Perrig, L. v. Doorn, and P. Khosla, "SCUBA: Secure code update by attestation in sensor networks," in Proc. 5th ACM Workshop Wireless Security, 2006, pp. 85-94.
-
(2006)
Proc. 5th ACM Workshop Wireless Security
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Doorn, L.V.4
Khosla, P.5
-
90
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
IBM T. J. Watson Research Center
-
R. Sailer, X. Zhang, T. Jaeger, and L. v. Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. 13th USENIX Security Symposium, vol. 13, IBM T. J. Watson Research Center, 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
, vol.13
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doorn, L.V.4
-
91
-
-
50249183144
-
Detecting node compromise in hybrid wireless sensor networks Using attestation techniques
-
Springer: Berlin/Heidelberg
-
C. Krauss, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks Using attestation techniques," in Proc. Security and Privacy in Ad-hoc and Sensor Networks, vol. 4572/2007. Springer: Berlin/Heidelberg, 2007.
-
(2007)
Proc. Security and Privacy in Ad-hoc and Sensor Networks
, vol.4572
-
-
Krauss, C.1
Stumpf, F.2
Eckert, C.3
-
92
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, "Denial-of-service attacks on battery-powered mobile computers," in Proc. 2nd IEEE Annual Conf. Pervasive Computing Commun. (PerCom), 2004, pp. 309-318.
-
(2004)
Proc. 2nd IEEE Annual Conf. Pervasive Computing Commun. (PerCom)
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
93
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter, "Detection of denial-of-message attacks on sensor network broadcasts," in Proc. IEEE Symposium Security Privacy, 2005, pp. 64-78.
-
(2005)
Proc. IEEE Symposium Security Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
96
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Networking, vol. 12, pp. 1049-1063, 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
97
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. 10th IEEE International Confe. Network Protocols, 2002, pp. 78-87.
-
(2002)
Proc. 10th IEEE International Confe. Network Protocols
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
99
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in Proc. ACM Workshop on Wireless Security, 2002, pp. 21-30.
-
(2002)
Proc. ACM Workshop on Wireless Security
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
100
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
A. Woo, T. Tong, and D. Culler, "Taming the underlying challenges of reliable multihop routing in sensor networks," in Proc. 1st International Conf. Embedded Networked Sensor Systems, 2003, pp. 14-27.
-
(2003)
Proc. 1st International Conf. Embedded Networked Sensor Systems
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
101
-
-
30344482882
-
INSENS: Intrusion-tolerant routing in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "INSENS: Intrusion-tolerant routing in wireless sensor networks," Computer Commun., vol. 29, pp. 216-230 2006.
-
(2006)
Computer Commun
, vol.29
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
102
-
-
67650861194
-
Enhancing base station security in wireless sensor networks,
-
CU-CS-951-03, 2003
-
J. Deng, R. Han, and S. Mishra, "Enhancing base station security in wireless sensor networks," University of Colorado Technical Report, CU-CS-951-03, 2003.
-
University of Colorado Technical Report
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
103
-
-
35248846963
-
A performance evaluation of intrusion tolerant routing in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "A performance evaluation of intrusion tolerant routing in wireless sensor networks," in Proc. 2nd International Workshop Information Processing Sensor Networks (IPSN), 2003, pp. 349-363.
-
(2003)
Proc. 2nd International Workshop Information Processing Sensor Networks (IPSN)
, pp. 349-363
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
104
-
-
27644599432
-
-
Technical Report UCB/CSD-03-1233, University of California at Berkeley
-
C. Karlof, Y. Li, and J. Polastre, "ARRIVE: Algorithm for robust routing in volatile environments," Technical Report UCB/CSD-03-1233, University of California at Berkeley, 2002.
-
(2002)
ARRIVE: Algorithm for robust routing in volatile environments
-
-
Karlof, C.1
Li, Y.2
Polastre, J.3
-
105
-
-
34547477757
-
SIGF: A family of configurable, secure routing protocols for wireless sensor networks
-
A. D. Wood, L. Fang, J. A. Stankovic, and T. He, "SIGF: A family of configurable, secure routing protocols for wireless sensor networks," in Proc. 4th ACM Workshop Security of Ad hoc Sensor Networks, 2006, pp. 35-48
-
(2006)
Proc. 4th ACM Workshop Security of Ad hoc Sensor Networks
, pp. 35-48
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
106
-
-
33751074195
-
Feedback: Towards dynamic behavior and secure routing for wireless sensor networks
-
Z. Cao, J. Hu, Z. Chen, M. Xu, and X. Zhou, "Feedback: Towards dynamic behavior and secure routing for wireless sensor networks," in Proc. 20th International Conf. Advanced Information Networking Applications (AINA), 2006, vol. 2, pp. 160-164.
-
(2006)
Proc. 20th International Conf. Advanced Information Networking Applications (AINA)
, vol.2
, pp. 160-164
-
-
Cao, Z.1
Hu, J.2
Chen, Z.3
Xu, M.4
Zhou, X.5
-
107
-
-
36348971281
-
A trust-based geographical routing scheme in sensor networks
-
K.-S. Hung, K.-S. Lui, and Y.-K. Kwok, "A trust-based geographical routing scheme in sensor networks," in Proc. IEEE Wireless Commun. Networking Conf. (WCNC), 2007, pp. 3123-3127.
-
(2007)
Proc. IEEE Wireless Commun. Networking Conf. (WCNC)
, pp. 3123-3127
-
-
Hung, K.-S.1
Lui, K.-S.2
Kwok, Y.-K.3
-
108
-
-
14344254253
-
A secure hierarchical model for sensor network
-
M. Tubaishat, J. Yin, B. Panja, and S. Madria, "A secure hierarchical model for sensor network," ACM SIGMOD Record, vol. 33, pp. 7-13, 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, pp. 7-13
-
-
Tubaishat, M.1
Yin, J.2
Panja, B.3
Madria, S.4
-
109
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. 10th Annual Network Distributed System Security Symposium (NDSS), 2003, pp. 263-276.
-
(2003)
Proc. 10th Annual Network Distributed System Security Symposium (NDSS)
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
111
-
-
36348949279
-
Route recovery with one-hop broadcast to bypass compromised nodes in wireless sensor networks
-
D. An and H. Cam, "Route recovery with one-hop broadcast to bypass compromised nodes in wireless sensor networks," in Proc. IEEE Wireless Commun. Networking Conf. (WCNC), 2007, pp. 2495-2500.
-
(2007)
Proc. IEEE Wireless Commun. Networking Conf. (WCNC)
, pp. 2495-2500
-
-
An, D.1
Cam, H.2
-
112
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1955-1963.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
114
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. INFOCOM, 2005, vol. 3, pp. 1917-1928
-
(2005)
Proc. INFOCOM
, vol.3
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
115
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proc. 3rd ACM Workshop Wireless Security, 2004, pp. 21-30.
-
(2004)
Proc. 3rd ACM Workshop Wireless Security
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
116
-
-
1542317849
-
Secure verification of location claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in Proc. 2nd ACM Workshop Wireless Security, 2003, pp. 1-10.
-
(2003)
Proc. 2nd ACM Workshop Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
117
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proc. 4th International Symposium Information Processing in Sensor Networks, 2005.
-
(2005)
Proc. 4th International Symposium Information Processing in Sensor Networks
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
120
-
-
34548329877
-
Detecting phantom nodes in wireless sensor networks
-
J. Hwang, T. He, and Y. Kim, "Detecting phantom nodes in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 2391-2395.
-
(2007)
Proc. IEEE INFOCOM
, pp. 2391-2395
-
-
Hwang, J.1
He, T.2
Kim, Y.3
-
121
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proc. 25th International Conf. Distributed Computing Systems (ICDCS), 2005, pp. 609-619.
-
(2005)
Proc. 25th International Conf. Distributed Computing Systems (ICDCS)
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
123
-
-
25844493197
-
A beacon-less location discovery scheme for wireless sensor networks
-
L. Fang, W. Du, and P. Ning, "A beacon-less location discovery scheme for wireless sensor networks," in Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Fang, L.1
Du, W.2
Ning, P.3
-
125
-
-
84976295016
-
Distance-bounding protocols
-
Springer Berlin, Heidelberg
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Proc. Adv. Cryptology - EUROCRYPT '93: Workshop Theory Application Cryptographic Techniques, vol. 765/1994. Springer Berlin / Heidelberg, 1994, pp. 344-359.
-
(1994)
Proc. Adv. Cryptology - EUROCRYPT '93: Workshop Theory Application Cryptographic Techniques
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
127
-
-
4544340566
-
Security support for in-network processing in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "Security support for in-network processing in wireless sensor networks," in Proc. 1st ACM Workshop Security Ad hoc Sensor Networks, 2003, pp. 83-93.
-
(2003)
Proc. 1st ACM Workshop Security Ad hoc Sensor Networks
, pp. 83-93
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
128
-
-
0842332407
-
A witness-based approach for data fusion assurance in wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A witness-based approach for data fusion assurance in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., 2003, vol. 3, pp. 1435-1439
-
(2003)
Proc. IEEE Global Telecommun. Conf
, vol.3
, pp. 1435-1439
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
129
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. 1st International Conf. Embedded Networked Sensor Systems, 2003, pp. 255-265.
-
(2003)
Proc. 1st International Conf. Embedded Networked Sensor Systems
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
130
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in Proc. IEEE Symposium Security Privacy, 2004, pp. 259-271.
-
(2004)
Proc. IEEE Symposium Security Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
132
-
-
38549177436
-
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
-
Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data injection in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Guan, Y.2
-
133
-
-
17144429277
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE J. Select. Areas Commun., vol. 23, pp. 839-850, 2005.
-
(2005)
IEEE J. Select. Areas Commun
, vol.23
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
135
-
-
34547354244
-
CDA: Concealed data aggregation in wireless sensor networks
-
J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed data aggregation in wireless sensor networks," in Proc. ACM WiSe, 2004.
-
(2004)
Proc. ACM WiSe
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
136
-
-
36348942851
-
On concealed data aggregation for WSNs
-
S. Peter, K. Piotrowski, and P. Langendoerfer, "On concealed data aggregation for WSNs," in Proc. 4th IEEE Consumer Communi. Networking Conf. (CCNC), 2007, pp. 192-196.
-
(2007)
Proc. 4th IEEE Consumer Communi. Networking Conf. (CCNC)
, pp. 192-196
-
-
Peter, S.1
Piotrowski, K.2
Langendoerfer, P.3
-
137
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism" in Proc. Information Security Conf., 2002, pp. 471-483.
-
(2002)
Proc. Information Security Conf
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
138
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," in Proc. Foundations Secure Computation, 1978, pp. 169-179.
-
(1978)
Proc. Foundations Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
140
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
MobiQuitous
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in Proc. 2nd International Conf. Mobile Ubiquitous Systems: Networking Services (MobiQuitous), 2005, pp. 109-117.
-
(2005)
Proc. 2nd International Conf. Mobile Ubiquitous Systems: Networking Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
141
-
-
84904326629
-
Assessing security in energy-efficient sensor networks
-
Y. W. Law, S. Etalle, and P. H. Hartel, "Assessing security in energy-efficient sensor networks," in Proc. 18th IFIP TC11 Int. Conf. Information Security Privacy Age Uncertainty (SEC), 2003, pp. 459-463.
-
(2003)
Proc. 18th IFIP TC11 Int. Conf. Information Security Privacy Age Uncertainty (SEC)
, pp. 459-463
-
-
Law, Y.W.1
Etalle, S.2
Hartel, P.H.3
-
142
-
-
1542267055
-
-
Univ. of Twente, The Netherlands, Tech. Rep. TR-CTIT-02-18
-
Y. W. Law, S. Dulman, S. Etalle, and P. Havinga, "Assessing security-critical energy-efficient sensor networks," Univ. of Twente, The Netherlands, Tech. Rep. TR-CTIT-02-18 2002.
-
(2002)
Assessing security-critical energy-efficient sensor networks
-
-
Law, Y.W.1
Dulman, S.2
Etalle, S.3
Havinga, P.4
-
144
-
-
33750959044
-
A framework of survivability model for wireless sensor network
-
D. S. Kim, S. KM, and J. S. Park, "A framework of survivability model for wireless sensor network," in Proc. 1st International Conf. Availability, Reliability Security (ARES), 2006, pp. 515-522.
-
(2006)
Proc. 1st International Conf. Availability, Reliability Security (ARES)
, pp. 515-522
-
-
Kim, D.S.1
KM, S.2
Park, J.S.3
-
145
-
-
33750958893
-
Survivability evaluation of wireless sensor network under DDoS attack
-
S. Kumar, R. Valdez, O. Gomez, and S. Bose, "Survivability evaluation of wireless sensor network under DDoS attack," in Proc. International Conf. Networking; International Conf. Systems; International Conf. Mobile Commun. Learning Technologies (ICN/ICONS/MCL), 2006, pp. 23-29.
-
(2006)
Proc. International Conf. Networking; International Conf. Systems; International Conf. Mobile Commun. Learning Technologies (ICN/ICONS/MCL)
, pp. 23-29
-
-
Kumar, S.1
Valdez, R.2
Gomez, O.3
Bose, S.4
-
146
-
-
33751075757
-
Survivability in wireless sensor networks
-
G. W. Skelton and A. Holton, "Survivability in wireless sensor networks," in Proc. IEEE SoutheastCon, 2006, pp. 341-341.
-
(2006)
Proc. IEEE SoutheastCon
, pp. 341-341
-
-
Skelton, G.W.1
Holton, A.2
-
147
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
149
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
150
-
-
34548302064
-
pDCS: Security and privacy support for data-centric sensor networks
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1298-1306.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
151
-
-
0041165532
-
Euclidean steiner minimum trees: An improved exact algorithm
-
P. Winter and M. Zachariasen, "Euclidean steiner minimum trees: An improved exact algorithm," Networks, vol. 30, pp. 149-166, 1997.
-
(1997)
Networks
, vol.30
, pp. 149-166
-
-
Winter, P.1
Zachariasen, M.2
-
152
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
|