-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38(4): 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0036375244
-
Impact of network density on data aggregation in wireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCS, Washington, DC, USA, 2002; 457. IEEE Computer Society.
-
(2002)
Proceedings of IEEE ICDCS
, pp. 457
-
-
Intanagonwiwat, C.1
Estrin, D.2
Govindan, R.3
Heidemann, J.4
-
3
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Krishnamachari B, Estrin D, Wicker SB. The impact of data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCSW, Washington, DC, USA, 2002; 575-578. IEEE Computer Society.
-
(2002)
Proceedings of IEEE ICDCSW
, pp. 575-578
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.B.3
-
4
-
-
84978428047
-
Tag: A tiny aggregation service for ad-hoc sensor networks
-
New York, NY, USA, ACM Press
-
Madden S, Frankli MJ, Hellerstein JM, Hong W. Tag: a tiny aggregation service for ad-hoc sensor networks. In Proceedings of ACMOSDI, New York, NY, USA, 2002;131-146. ACM Press.
-
(2002)
Proceedings of ACMOSDI
, pp. 131-146
-
-
Madden, S.1
Frankli, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
5
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Washington, DC, USA, IEEE Computer Society
-
Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In Proceedings of IEEE ICNP, Washington, DC, USA, 2004; 206-215. IEEE Computer Society.
-
(2004)
Proceedings of IEEE ICNP
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
6
-
-
33845808851
-
Sia: Secure information aggregation in sensor networks
-
Chan H, Perrig A, Przydatek B, Song D. Sia: secure information aggregation in sensor networks. Journal of Computer Security 2007; 15(1): 69-102.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 69-102
-
-
Chan, H.1
Perrig, A.2
Przydatek, B.3
Song, D.4
-
7
-
-
33749625947
-
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
-
Di Pietro R, Mancini LV, Mei A. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 2006; 12(6): 709-721.
-
(2006)
Wireless Networks
, vol.12
, Issue.6
, pp. 709-721
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
8
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
San Diego, CA, USA
-
Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of ACM/IEEE Mobiquitous, San Diego, CA, USA, 2005; 109-117.
-
(2005)
Proceedings of ACM/IEEE Mobiquitous
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
10
-
-
0036375244
-
Impact of network density on data aggregation in wireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCS, Washington, DC, USA, 2002; 457. IEEE Computer Society.
-
(2002)
Proceedings of IEEE ICDCS
, pp. 457
-
-
Intanagonwiwat, C.1
Estrin, D.2
Govindan, R.3
Heidemann, J.4
-
11
-
-
84943753034
-
Secure aggregation for wireless networks
-
Washington, DC, USA, IEEE Computer Society
-
Hu L, Evans D. Secure aggregation for wireless networks. In Proceedings of SAINT, Washington, DC, USA, 2003; 384. IEEE Computer Society.
-
(2003)
Proceedings of SAINT
, pp. 384
-
-
Hu, L.1
Evans, D.2
-
12
-
-
14844300164
-
Resilient aggregation in sensor networks
-
New York, NY, USA, ACM Press
-
Wagner D. Resilient aggregation in sensor networks. In Proceedings of ACM SASN, New York, NY, USA, 2004; 78-87. ACM Press.
-
(2004)
Proceedings of ACM SASN
, pp. 78-87
-
-
Wagner, D.1
-
13
-
-
84947614937
-
-
Girao J, Schneider M, Westhoff D. Cda: concealed data aggregation in wireless sensor networks. In Proceedings of ACM WISE, Philadelphia, USA, October 2004. WiSe 2004. Poster presentation.
-
Girao J, Schneider M, Westhoff D. Cda: concealed data aggregation in wireless sensor networks. In Proceedings of ACM WISE, Philadelphia, USA, October 2004. WiSe 2004. Poster presentation.
-
-
-
-
14
-
-
24144459865
-
Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
Seoul, Korea, May, ICC2005
-
Girao J, Westhoff D, Schneider M. Cda: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In Proceedings of IEEE ICC, Seoul, Korea, May 2005. ICC2005.
-
(2005)
Proceedings of IEEE ICC
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
15
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 2006; 5(10): 1417-1431.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
16
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
New York, NY, USA, ACM Press
-
Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM CCS, New York, NY, USA, 2006; 278-287. ACM Press.
-
(2006)
Proceedings of ACM CCS
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
56749178915
-
An efficient integrity-preserving scheme for hierarchical sensor aggregation
-
New York, NY, USA, ACM Press
-
Frikken KB, Dougherty JA, IV. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of ACMWiSec '08, New York, NY, USA, 2008; 68-76. ACM Press.
-
(2008)
Proceedings of ACMWiSec '08
, pp. 68-76
-
-
Frikken, K.B.1
Dougherty, J.I.2
-
18
-
-
34547471023
-
Ranbar: Ransac-based resilient aggregation in sensor networks
-
New York, NY, USA, ACM Press
-
Buttyán L, Schaffer P, Vajda I. Ranbar: ransac-based resilient aggregation in sensor networks. In Proceedings of ACM SASN, New York, NY, USA, 2006; 83-90. ACM Press.
-
(2006)
Proceedings of ACM SASN
, pp. 83-90
-
-
Buttyán, L.1
Schaffer, P.2
Vajda, I.3
-
20
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press
-
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In Proceedings of the ACM CCS, 2002; 41-47. ACM Press.
-
(2002)
Proceedings of the ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
21
-
-
41549165648
-
Redoubtable sensor networks
-
Di Pietro R, Mancini LV, Mei A, Panconesi A, Radhakrishnan J. Redoubtable sensor networks. ACM Transactions on Information and System Security 2008; 11(3): 1-22.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.3
, pp. 1-22
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
Panconesi, A.4
Radhakrishnan, J.5
-
22
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of ACM CCS, 2003; 62-72.
-
(2003)
Proceedings of ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
23
-
-
3142707201
-
Power-conserving computation of order-statistics over sensor networks
-
New York, NY, USA, ACM Press
-
Greenwald MB, Khanna S. Power-conserving computation of order-statistics over sensor networks. In Proceedings of ACM SIGMOD-SIGACT-SIGART PODS, New York, NY, USA, 2004; 275-285. ACM Press.
-
(2004)
Proceedings of ACM SIGMOD-SIGACT-SIGART PODS
, pp. 275-285
-
-
Greenwald, M.B.1
Khanna, S.2
-
24
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
ACM press
-
Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, 2003; 52-61. ACM press.
-
(2003)
Proceedings of ACM CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
26
-
-
2342599620
-
Query processing insensor networks
-
Gehrke J, Madden S. Query processing insensor networks. IEEE Pervasive Computing 2004; 3(1): 46-55.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.1
, pp. 46-55
-
-
Gehrke, J.1
Madden, S.2
-
27
-
-
67749125921
-
Optimizing tree reconfigurationtotrack mobile targets in sensor networks
-
Zhang W, Cao G. Optimizing tree reconfigurationtotrack mobile targets in sensor networks. SIGMOBILE Mobile Computing and Communications Review 2003; 7(3): 39-40.
-
(2003)
SIGMOBILE Mobile Computing and Communications Review
, vol.7
, Issue.3
, pp. 39-40
-
-
Zhang, W.1
Cao, G.2
-
28
-
-
3142728212
-
Wireless sensor networks: A new regime for time synchronization
-
Elson J, Römer K. Wireless sensor networks: a new regime for time synchronization. ACM SIGCOMM CCR 2003; 33(1): 149-154.
-
(2003)
ACM SIGCOMM CCR
, vol.33
, Issue.1
, pp. 149-154
-
-
Elson, J.1
Römer, K.2
-
29
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
New York, NY, USA, ACM Press
-
Ganeriwal S, Capkun S, Han C-C, Srivastava MB. Secure time synchronization service for sensor networks. In Proceedings of ACM WISE, New York, NY, USA, 2005; 97-106. ACM Press.
-
(2005)
Proceedings of ACM WISE
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
30
-
-
33244467496
-
Rate-adaptive time synchronization for long-lived sensor networks
-
New York, NY, USA, ACM Press
-
Ganeriwal S, Ganesanl D, Hansen M, Srivastava MB, Estrin D. Rate-adaptive time synchronization for long-lived sensor networks. In Proceedings of ACM SIGMETRICS, New York, NY, USA, 2005; 374-375. ACM Press.
-
(2005)
Proceedings of ACM SIGMETRICS
, pp. 374-375
-
-
Ganeriwal, S.1
Ganesanl, D.2
Hansen, M.3
Srivastava, M.B.4
Estrin, D.5
-
31
-
-
1542543737
-
Lightweight time synchronization for sensor networks
-
New York, NY, USA, ACM Press
-
van Greunen J, Rabaey J. Lightweight time synchronization for sensor networks. In Proceedings of ACM WSNA, New York, NY, USA, 2003; 11-19. ACM Press.
-
(2003)
Proceedings of ACM WSNA
, pp. 11-19
-
-
van Greunen, J.1
Rabaey, J.2
-
32
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD. SPINS: security protocols for sensor networks. In Proceedings of ACM MOBICOM, 2001; 189-199.
-
(2001)
Proceedings of ACM MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
33
-
-
33144487909
-
Connected sensor cover: Selforganization of sensor networks for efficient query execution
-
Gupta H, Zhou Z, Das SR, Gu Q. Connected sensor cover: selforganization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking 2006; 14(1): 55-67.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.1
, pp. 55-67
-
-
Gupta, H.1
Zhou, Z.2
Das, S.R.3
Gu, Q.4
-
35
-
-
51249107485
-
Topology control for reliable sensor-to-sink data transport in sensor networks
-
Wang J, Medidi S. Topology control for reliable sensor-to-sink data transport in sensor networks. In Proceedings of IEEE ICC, 2008; 3215-3219.
-
(2008)
Proceedings of IEEE ICC
, pp. 3215-3219
-
-
Wang, J.1
Medidi, S.2
-
36
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
Domingo-Ferrer J. A provably secure additive and multiplicative privacy homomorphism. In Proceedings of IFIP SEC, 2002; 471-483.
-
(2002)
Proceedings of IFIP SEC
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
39
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Washington, DC, USA
-
Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE S&P, Washington, DC, USA, 2005; 49-63.
-
(2005)
Proceedings of IEEE S&P
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
40
-
-
34548126116
-
Requirements and open issues in distributed detection of node identity replicas in wsn
-
Conti M, Di Pietro R, Mancini LV, Mei A. Requirements and open issues in distributed detection of node identity replicas in wsn. In Proceedings of IEEE SMC, 2006; 1468-1473.
-
(2006)
Proceedings of IEEE SMC
, pp. 1468-1473
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
41
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
New York, NY, USA, ACM Press
-
Conti M, Di Pietro R, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of MobiHoc '07, New York, NY, USA, 2007; 80-89. ACM Press.
-
(2007)
Proceedings of MobiHoc '07
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
43
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE PERCOM, Washington, DC, USA, 2005; 324-328. IEEE Computer Society.
-
(2005)
Proceedings of IEEE PERCOM
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
44
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Law YW, Doumen J, Hartel P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks 2006; 2(1): 65-93.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
|