-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, Proceedings of IEEE INFOCOM, pp. 13-17, 2005.
-
(2005)
Proceedings of IEEE INFOCOM
, pp. 13-17
-
-
Chan, H.1
Perrig, A.2
-
4
-
-
34250659309
-
Key management for long-lived sensor networks in hostile environments
-
M. Chorzempa, J.-M. Park and M. Eltoweissy, Key management for long-lived sensor networks in hostile environments, Computer Communications, vol. 30, no. 9, pp. 1964-1979, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.9
, pp. 1964-1979
-
-
Chorzempa, M.1
Park, J.-M.2
Eltoweissy, M.3
-
5
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology, CRYPTO'98, pp. 13-25, 1998.
-
(1998)
Advances in Cryptology, CRYPTO'98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
6
-
-
46749158359
-
An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
-
A. K. Das, An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks, International Journal of Network Security, vol. 6, no. 2, pp. 129-139, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 129-139
-
-
Das, A.K.1
-
7
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.IT-22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
69949134676
-
Authenticated reliable and semi-reliable communication in wireless sensor networks
-
F. Dressier, Authenticated reliable and semi-reliable communication in wireless sensor networks, International Journal of Network Security, vol. 7, no. 1, pp. 62-69, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 62-69
-
-
Dressier, F.1
-
10
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
F. Hu and N. K. Sharma, Security considerations in ad hoc sensor networks, Ad Hoc Networks, vol. 3, no. 1, pp. 69-89, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.K.2
-
11
-
-
33749602100
-
Scalable security in wireless sensor and actuator networks (WSANs): Integration re-keying with routing
-
F. Hu, W. Siddiqui and K. Sankar, Scalable security in wireless sensor and actuator networks (WSANs): Integration re-keying with routing, Computer Networks, vol. 51, no. 1, pp. 285-308, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.1
, pp. 285-308
-
-
Hu, F.1
Siddiqui, W.2
Sankar, K.3
-
12
-
-
14844314204
-
Location aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi and H. Lein, Location aware key management scheme for wireless sensor networks, Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 29-42, 2004.
-
(2004)
Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Lein, H.4
-
13
-
-
33846354789
-
Threshold signatures: Current status and key issues
-
M.-S. Hwang and T.-Y. Chang, Threshold signatures: Current status and key issues, International Journal of Network Security, vol. 1, no. 3, pp. 123-137, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 123-137
-
-
Hwang, M.-S.1
Chang, T.-Y.2
-
14
-
-
63649138734
-
Localization of a moving sensor by particle filters
-
M. Ito and M. Tanaka, Localization of a moving sensor by particle filters, International Journal of Innovative Computing, Information and Control, vol. 4, no. 1, pp. 165-173, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.1
, pp. 165-173
-
-
Ito, M.1
Tanaka, M.2
-
15
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
-
Y. Jiang, C. Lin, M. Shi and X. Shen, Self-healing group key distribution with time-limited node revocation for wireless sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 14-23, 2007. (Pubitemid 44573003)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen X.(S.)4
-
16
-
-
33845869923
-
Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks
-
I. Khalil, S. Bagchi and N. Shroff, Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks, Ad Hoc Networks, vol. 5, no. 3, pp. 360-391, 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.3
, pp. 360-391
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.3
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
K. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, K.1
-
18
-
-
0348003132
-
Alfred menezes and scott vanstone, the state of elliptic curve cryptography
-
N. Koblitz, Alfred Menezes and Scott Vanstone, The state of elliptic curve cryptography, Designs, Codes and Cryptography, vol. 19, no. 2-3, pp. 173-193, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
-
19
-
-
34547877223
-
Secure communications for cluster-based ad hoc networks using node identities
-
J.-S. Lee and C.-C. Chang, Secure communications for cluster-based ad hoc networks using node identities, Journal of Network and Computer Applications, vol. 30, no. 4, pp. 1377-1396, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.4
, pp. 1377-1396
-
-
Lee, J.-S.1
Chang, C.-C.2
-
21
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Lecture Notes in Computer Science
-
V. S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology, CRYPTO'85, Lecture Notes in Computer Science, vol. 218, pp. 417-426, 1985.
-
(1985)
Advances in Cryptology, CRYPTO'85
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
22
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
California, USA
-
J. Newsome, E. Shi, D. Song and A. Perrig, The sybil attack in sensor networks: analysis & defenses, The 3rd International Symposium on Information Processing in Sensor Networks, California, USA, pp. 259-268, 2004.
-
(2004)
The 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
23
-
-
63649097318
-
An energy-aware routing scheme with node relay willingness in wireless sensor networks
-
Y. Obashi, H. Chen, H. Mineno and T. Mizuno, An energy-aware routing scheme with node relay willingness in wireless sensor networks, International Journal of Innovative Computing, Information and Control, vol. 3, no. 3, pp. 565-574, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 565-574
-
-
Obashi, Y.1
Chen, H.2
Mineno, H.3
Mizuno, T.4
-
24
-
-
34547913472
-
SecLEACH - On the security of cluster sensor networks
-
L. B. Oliveira, A. Ferreira, M. A. Vilaça, H. C. Wong, M. Bern, R. Dahab and A. A. F. Loureiro, SecLEACH - on the security of cluster sensor networks, Signal Processing, vol. 87, no. 12, pp. 2882-2895, 2007.
-
(2007)
Signal Processing
, vol.87
, Issue.12
, pp. 2882-2895
-
-
Oliveira, L.B.1
Ferreira, A.2
Vilaça, M.A.3
Wong, H.C.4
Bern, M.5
Dahab, R.6
Loureiro, A.A.F.7
-
25
-
-
51149111739
-
Fault classification based upon self organizing feature maps and dynamic principal component analysis for inertial sensor drift
-
H. B. Perez, F. Garcia-Nocetti and H. Thompson, Fault classification based upon self organizing feature maps and dynamic principal component analysis for inertial sensor drift, International Journal of Innovative Computing, Information and Control, vol. 3, no. 2, pp. 257-276, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.2
, pp. 257-276
-
-
Perez, H.B.1
Garcia-Nocetti, F.2
Thompson, H.3
-
26
-
-
37349060385
-
Detecting and evading wormholes in mobile ad-hoc wireless networks
-
A. A. Pirzada and C. McDonald, Detecting and evading wormholes in mobile ad-hoc wireless networks, International Journal of Network Security, vol. 3, no. 2, pp. 191-202, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 191-202
-
-
Pirzada, A.A.1
McDonald, C.2
-
27
-
-
0003851399
-
-
John Wiley and Sons Inc., second edition
-
B. Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley and Sons Inc., second edition, 1996.
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
28
-
-
34548043438
-
Pair-wise path key establishment in wireless sensor networks
-
J.-P. Sheu and J.-C. Cheng, Pair-wise path key establishment in wireless sensor networks, Computer Communications, vol. 30, no. 11-12, pp. 2365-2374, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2365-2374
-
-
Sheu, J.-P.1
Cheng, J.-C.2
-
29
-
-
33845719807
-
EHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
-
W.-T. Su, K.-M. Chang and Y.-H. Kuo, eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks, Computer Networks, vol. 51, no. 4, pp. 1151-1168, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.4
, pp. 1151-1168
-
-
Su, W.-T.1
Chang, K.-M.2
Kuo, Y.-H.3
-
30
-
-
48249105311
-
A new method of noise removal for body vibration signals in wireless sensor networks
-
Q. Tian and N. Yamauchi, A new method of noise removal for body vibration signals in wireless sensor networks, International Journal of Innovative Computing, Information and Control, vol. 2, no. 6, pp. 1259-1270, 2006.
-
(2006)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.6
, pp. 1259-1270
-
-
Tian, Q.1
Yamauchi, N.2
-
31
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
C.-S. Tsai, C.-C. Lee and M.-S. Hwang, Password authentication schemes: Current status and key issues, International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.-S.1
Lee, C.-C.2
Hwang, M.-S.3
-
32
-
-
1342306709
-
Security for cluster based ad hoc networks
-
V. Varadharajan, R. Shankaran and M. Hitchens, Security for cluster based ad hoc networks, Computer Communications, vol. 27, no. 5, pp. 488-501, 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.5
, pp. 488-501
-
-
Varadharajan, V.1
Shankaran, R.2
Hitchens, M.3
-
33
-
-
34547743395
-
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
-
N.-C. Wang and S.-Z. Fang, A hierarchical key management scheme for secure group communications in mobile ad hoc networks, Journal of Systems and Software, vol. 80, no. 10, pp. 1667-1677, 2007.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.10
, pp. 1667-1677
-
-
Wang, N.-C.1
Fang, S.-Z.2
-
34
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, A survey of key management schemes in wireless sensor networks, Computer Communications, vol. 30, no. 11-12, pp. 2314-2341, 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
35
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Y. Zhou, Y. Zhang and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 3-13, 2007. (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
|