-
2
-
-
34047126869
-
-
P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, and Y. F. Hu, Wireless sensor networks : A survey on the atate of the art and the 802.15.4 and ZigBee standards, Computer Communications, 30, pp. 1655-1695, 2007.
-
P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, and Y. F. Hu, "Wireless sensor networks : A survey on the atate of the art and the 802.15.4 and ZigBee standards," Computer Communications, vol. 30, pp. 1655-1695, 2007.
-
-
-
-
3
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
4
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M, Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, pp. 2314-2341, 2007.
-
(2007)
Computer Communications
, vol.30
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
5
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key pre-distribution schemes for sensor networks," IEEE Symposium on Security and Privacy, pp. 197-213, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
33744899346
-
An efficient key pre-distribution scheme for secure distributed sensor network
-
S. J. Choi and H. Y. Youn, "An efficient key pre-distribution scheme for secure distributed sensor network," Lecture Notes in Computer Science, vol. 3823, pp. 197-213, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3823
, pp. 197-213
-
-
Choi, S.J.1
Youn, H.Y.2
-
8
-
-
33646840476
-
A novel key pre-distribution scheme with LU matrix for secure wireless sensor networks
-
C. W. Park, S. J. Choi, and H. Y. Youn, "A novel key pre-distribution scheme with LU matrix for secure wireless sensor networks," Lecture Notes in Artificial Intelligence, vol. 3801, pp. 494-499, 2005.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3801
, pp. 494-499
-
-
Park, C.W.1
Choi, S.J.2
Youn, H.Y.3
-
9
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," IEEE Symposium on Security and Privacy, pp. 49-63, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
10
-
-
0041973497
-
A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. B. Johnson, "A defense against wormhole attacks in wireless networks," IEEE INFOCOM'03, vol. 3, pp. 1976-1986, 2003.
-
(2003)
IEEE INFOCOM'03
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
33750012404
-
Access control in wireless sensor networks
-
Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, vol. 5, pp. 3-13, 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
12
-
-
55849115257
-
A novel access control protocol for secure sensor networks
-
H. F. Huang, "A novel access control protocol for secure sensor networks," Computer Standards & Interfaces, vol. 31, pp. 272-276, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 272-276
-
-
Huang, H.F.1
|