-
2
-
-
0003846064
-
-
European Organization for Nuclear Research (CERN). retrieved on June
-
European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
-
(2009)
The Large Hadron Collider
-
-
-
3
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Urbana-Champaign, USA
-
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46-57. Urbana-Champaign, USA (2005)
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
4
-
-
59649125973
-
Effects of denial-of-sleep attacks on wireless sensor network mac protocols
-
Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367-380 (2009)
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.1
, pp. 367-380
-
-
Raymond, D.R.1
Marchany, R.C.2
Brownfield, M.I.3
Midkiff, S.F.4
-
5
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
Law, Y.W., Palaniswami, M., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks 5(1), 6-1:6-38 (2009)
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.1
, pp. 6-38
-
-
Law, Y.W.1
Palaniswami, M.2
Van Hoesel, L.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
6
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74-81 (2008)
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
7
-
-
58449135149
-
Securing sensor nodes against side channel attacks
-
Nanjing China December 2008
-
Pongaliur, K., Abraham, Z., Liu, A.X., Xiao, L., Kempel, L.: Securing Sensor Nodes Against Side Channel Attacks. In: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE 2008), Nanjing, China, December 2008, pp. 353-361 (2008)
-
(2008)
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE 2008)
, pp. 353-361
-
-
Pongaliur, K.1
Abraham, Z.2
Liu, A.X.3
Xiao, L.4
Kempel, L.5
-
8
-
-
33745855808
-
Tampering with motes: Real-world physical attacks on wireless sensor networks
-
Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. Springer, Heidelberg
-
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.3934, pp. 104-118. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3934
, pp. 104-118
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
9
-
-
70349329143
-
Wireless sensor networks as an asset and a liability
-
Boston USA (March
-
Goodspeed, T.: Wireless Sensor Networks as an Asset and a Liability. In: Proceedings of the SOURCE Conference, Boston, USA (March 2009)
-
(2009)
Proceedings of the SOURCE Conference
-
-
Goodspeed, T.1
-
10
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
Alexandria USA October 2008
-
Francillon, A., Castelluccia, C.: Code Injection Attacks on Harvard-Architecture Devices. In: Proceedings of the 15th ACM conference on Computer and communications security (CCS 2008), Alexandria, USA, October 2008, pp. 15-26 (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
11
-
-
3042785862
-
The sybil attack in sensor networks: ASnalysis & defenses
-
Berkeley USA April 2004
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the IEEE 3rd International Workshop on Information Processing in Sensor Networks (IPSN 2004), Berkeley, USA, April 2004, pp. 259-268 (2004)
-
(2004)
Proceedings of the IEEE 3rd International Workshop on Information Processing in Sensor Networks (IPSN 2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasure
-
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure. Ad-Hoc Networks 1(2-3), 293-315 (2003)
-
(2003)
Ad-Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
13
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
Alexandria USA November 2005
-
Manzo, M., Roosta, T., Sastry, S.: Time Synchronization Attacks in Sensor Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, USA, November 2005, pp. 107-116 (2005)
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005)
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
14
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
Baltimore USA August 2004
-
Shnayder, V., Hempstead, M., Chen, B., Allen, G.W., Welsh, M.: Simulating the Power Consumption of Large-Scale Sensor Network Applications. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (Sen-Sys 2004), Baltimore, USA, August 2004, pp. 188-200 (2004)
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (Sen-Sys 2004)
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Allen, G.W.4
Welsh, M.5
-
15
-
-
34547322775
-
An application-driven perspective on wireless sensor network security
-
Torremolinos, Spain
-
Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-driven Perspective on Wireless Sensor Network Security. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Torremolinos, Spain, pp. 1-8 (2006)
-
(2006)
Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks
, pp. 1-8
-
-
Sabbah, E.1
Majeed, A.2
Kang, K.-D.3
Liu, K.4
Abu-Ghazaleh, N.5
-
16
-
-
80052424887
-
Comprehensible security synthesis for wireless sensor networks
-
Leuven, Belgium
-
Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible Security Synthesis for Wireless Sensor Networks. In: Proceedings of the 3rd international Workshop on Mid-dleware for Sensor Networks, Leuven, Belgium, pp. 19-24 (2008)
-
(2008)
Proceedings of the 3rd International Workshop on Mid-dleware for Sensor Networks
, pp. 19-24
-
-
Ransom, S.1
Pfisterer, D.2
Fischer, S.3
-
18
-
-
67649909548
-
Wireless sensor node hardware: A review
-
Lecce, Italy, October 2008
-
Healy, M., Newe, T., Lewis, E.: Wireless Sensor Node Hardware: A Review. In: Proceedings of IEEE SENSORS 2008, Lecce, Italy, October 2008, pp. 621-624 (2008)
-
(2008)
Proceedings of IEEE SENSORS 2008
, pp. 621-624
-
-
Healy, M.1
Newe, T.2
Lewis, E.3
-
19
-
-
84895207016
-
TinyOS: An operating system for sensor networks
-
Springer, Heidelberg
-
Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks. In: On Ambient Intelligence. Springer, Heidelberg (2005)
-
(2005)
On Ambient Intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
Culler, D.11
-
20
-
-
84866694731
-
A building block approach to sensornet systems
-
Raleigh USA November 2008
-
Dutta, P., Taneja, J., Jeong, J., Jiang, X., Culler, D.: A Building Block Approach to Sensornet Systems. In: Proceedings of the Sixth ACM Conference on Embedded Networked Sensor Systems (SenSys 2008), Raleigh, USA, November 2008, pp. 267-280 (2008)
-
(2008)
Proceedings of the Sixth ACM Conference on Embedded Networked Sensor Systems (SenSys 2008)
, pp. 267-280
-
-
Dutta, P.1
Taneja, J.2
Jeong, J.3
Jiang, X.4
Culler, D.5
-
21
-
-
70350769449
-
Wireless sensor networks powered by ambient energy harvesting (wsn-heap) - Survey and challenges
-
Aalborg Denmark May
-
Seah, W.K.G., Eu, Z.A., Tan, H.-P.: Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges. In: Proceedings of CTIF Wireless VITAE 2009, Aalborg, Denmark (May 2009)
-
(2009)
Proceedings of CTIF Wireless VITAE 2009
-
-
Seah, W.K.G.1
Eu, Z.A.2
Tan, H.-P.3
-
22
-
-
34648827192
-
A review of commercial energy harvesters for autonomous sensors
-
Warsaw Poland May 2007
-
Penella, M.T., Gasulla, M.: A Review of Commercial Energy Harvesters for Autonomous Sensors. In: Proceedings of IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC 2007), Warsaw, Poland, May 2007, pp. 1-5 (2007)
-
(2007)
Proceedings of IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC 2007)
, pp. 1-5
-
-
Penella, M.T.1
Gasulla, M.2
-
23
-
-
79951977576
-
-
Crossbow Technology. retrieved on June
-
Crossbow Technology, Inc. eKo Pro Precision Agriculture, http://www.xbow.com/eko/ (retrieved on June 2009)
-
(2009)
Inc. EKo Pro Precision Agriculture
-
-
-
24
-
-
58449131864
-
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Galindo, D., Roman, R., Lopez, J.: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.5339, pp. 120-132. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 120-132
-
-
Galindo, D.1
Roman, R.2
Lopez, J.3
-
26
-
-
45749092622
-
Steel, cast iron and concrete: Security engineering for real world wireless sensor networks
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Stajano, F., Cvrcek, D., Lewis, M.: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.5037, pp. 460-478. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 460-478
-
-
Stajano, F.1
Cvrcek, D.2
Lewis, M.3
-
27
-
-
57349193377
-
Applying key infrastructures for sensor networks in cip/ciip scenarios
-
López ,J. (ed.) CRITIS 2006. Springer, Heidelberg
-
Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol.4347, pp. 166-178. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4347
, pp. 166-178
-
-
Alcaraz, C.1
Roman, R.2
-
28
-
-
70349311163
-
-
the ECRYPT Stream Cipher Project. retrieved on June
-
ECRYPT Network of Excellence. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/ (retrieved on June 2009)
-
(2009)
ECRYPT Network of Excellence. ESTREAM
-
-
-
29
-
-
0003846064
-
-
European Organization for Nuclear Research (CERN). retrieved on June
-
European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
-
(2009)
LHC - The Large Hadron Collider
-
-
-
30
-
-
4344668573
-
Overview of sensor networks
-
Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41-49 (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
31
-
-
13944252629
-
Underwater acoustic sensor networks: Research challenges
-
DOI 10.1016/j.adhoc.2005.01.004, PII S1570870505000168
-
Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257-279 (2005) (Pubitemid 40266052)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.3
, pp. 257-279
-
-
Akyildiz, I.F.1
Pompili, D.2
Melodia, T.3
-
32
-
-
34250365027
-
Research challenges and applications for underwater sensor networking
-
Las Vegas USA April 2006
-
Heidemann, J., Wei, Y., Wills, J., Syed, A., Yuan, L.: Research Challenges and Applications for Underwater Sensor Networking. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, USA, April 2006, vol.1, pp. 228-235 (2006)
-
(2006)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006)
, vol.1
, pp. 228-235
-
-
Heidemann, J.1
Wei, Y.2
Wills, J.3
Syed, A.4
Yuan, L.5
-
33
-
-
33747130666
-
Wireless underground sensor networks: Research challenges
-
Akyildiz, I.F., Stuntebeck, E.P.: Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Networks Journal 4(6), 669-686 (2006)
-
(2006)
Ad Hoc Networks Journal
, vol.4
, Issue.6
, pp. 669-686
-
-
Akyildiz, I.F.1
Stuntebeck, E.P.2
-
34
-
-
51349147226
-
Cross-layer packet size optimization for wireless terrestrial underwater and underground sensor networks
-
Phoenix USA April 2008
-
Vuran, M.C., Akyildiz, I.F.: Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 226-230 (2008)
-
(2008)
Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008)
, pp. 226-230
-
-
Vuran, M.C.1
Akyildiz, I.F.2
-
35
-
-
59849115600
-
Body area sensor networks: Challenges and opportunities
-
Hanson, M.A., Powell, H.C., Barth, A.T., Ringgenberg, K., Calhoun, B.H., Aylor, J.H., Lach, J.: Body Area Sensor Networks: Challenges and Opportunities. IEEE Computer 42(1), 58-65 (2009)
-
(2009)
IEEE Computer
, vol.42
, Issue.1
, pp. 58-65
-
-
Hanson, M.A.1
Powell, H.C.2
Barth, A.T.3
Ringgenberg, K.4
Calhoun, B.H.5
Aylor, J.H.6
Lach, J.7
-
36
-
-
47249147507
-
A study of implanted and wearable body sensor networks
-
Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. Springer, Heidelberg
-
Ullah, S., Higgin, H., Siddiqui, M.A., Kwak, K.S.: A Study of Implanted and Wearable Body Sensor Networks. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS, vol.4953, pp. 464-473. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4953
, pp. 464-473
-
-
Ullah, S.1
Higgin, H.2
Siddiqui, M.A.3
Kwak, K.S.4
-
37
-
-
37249066703
-
Wireless multimedia sensor networks: A survey
-
DOI 10.1109/MWC.2007.4407225
-
Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14(6), 32-39 (2007) (Pubitemid 350281212)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.6
, pp. 32-39
-
-
Akyildiz, I.F.1
Melodia, T.2
Chowdury, K.R.3
-
38
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
Hong Kong China March 2008
-
Di Pietro, R., Mancini, L.V., Spognardi, A., Soriente, C., Tsudik, G.: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Hong Kong, China, March 2008, pp. 185-194 (2008)
-
(2008)
Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008)
, pp. 185-194
-
-
Di Pietro, R.1
Mancini, L.V.2
Spognardi, A.3
Soriente, C.4
Tsudik, G.5
-
39
-
-
70349312281
-
Towards secure middleware for embedded peer-to-peer systems: Objectives & requirements
-
Innsbruck Austria September 2007
-
Albano, M., Brogi, A., Popescu, R., Diaz, M., Dianes, J.A.: Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements. In: Proceedings of the 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures (RSPSI 2007), Innsbruck, Austria, September 2007, pp. 1-6 (2007)
-
(2007)
Proceedings of the 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures (RSPSI 2007)
, pp. 1-6
-
-
Albano, M.1
Brogi, A.2
Popescu, R.3
Diaz, M.4
Dianes, J.A.5
-
40
-
-
77954290382
-
On the Hardware implementation e.ciency of cryptographic primitives
-
IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
Roman, R., Alcaraz, C., Sklavos, N.: On the Hardware Implementation E.ciency of Cryptographic Primitives. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
On Wireless Sensor Network Security
-
-
Roman, R.1
Alcaraz, C.2
Sklavos, N.3
-
41
-
-
84898619345
-
Optimizing aes for embedded devices andwireless sensor networks
-
Innsbruck Austria March
-
Didla, S., Ault, A., Bagchi, S.: Optimizing AES for Embedded Devices andWireless Sensor Networks. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Austria (March 2008)
-
(2008)
Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008)
-
-
Didla, S.1
Ault, A.2
Bagchi, S.3
-
43
-
-
2942557845
-
Analysis of the stream cipher RC4
-
Master's Thesis
-
Mantin, I.: Analysis of the Stream Cipher RC4. Master's Thesis, Weizmann Institute of Science (2001)
-
(2001)
Weizmann Institute of Science
-
-
Mantin, I.1
-
44
-
-
51549093359
-
E.cient implementation of estream ciphers on 8-bit avr microcontrollers
-
Montpellier France June 2008
-
Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: E.cient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: Proceedings of the International Symposium on Industrial Embedded Systems (SIES 2008), Montpellier, France, June 2008, pp. 58-66 (2008)
-
(2008)
Proceedings of the International Symposium on Industrial Embedded Systems (SIES 2008)
, pp. 58-66
-
-
Meiser, G.1
Eisenbarth, T.2
Lemke-Rust, K.3
Paar, C.4
-
45
-
-
51249087814
-
TinyECC: A con.gurable library for elliptic curve cryptography in wireless sensor networks
-
SPOTS Track, St. Louis, USA, April 2008
-
Liu, A., Ning, P.: TinyECC: A Con.gurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, St. Louis, USA, April 2008, pp. 245-256 (2008)
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
46
-
-
68149165367
-
TinyECCK: E.cient elliptic curve cryptography implementation over GF(2m) on 8-bit MICAz Mote
-
Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: E.cient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IEICE Transactions on Info and Systems E91-D(5), 1338-1347 (2008)
-
(2008)
IEICE Transactions on Info and Systems
, vol.E91-D
, Issue.5
, pp. 1338-1347
-
-
Seo, S.C.1
Han, D.-G.2
Kim, H.C.3
Hong, S.4
-
47
-
-
70349154616
-
On the application of pairing based cryptography towireless sensor networks
-
Zurich Switzerland March 2009
-
Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing based Cryptography toWireless Sensor Networks. In: Proceedings of the 2nd ACM conference onWireless Network Security (WiSec 2009), Zurich, Switzerland, March 2009, pp. 1-12 (2009)
-
(2009)
Proceedings of the 2nd ACM Conference OnWireless Network Security (WiSec 2009)
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
-
48
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
San Diego USA September 2003
-
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In: Proceedings of the 2nd ACM International Conference onWireless Sensor Networks and Applications (WSNA 2003), San Diego, USA, September 2003, pp. 151-159 (2003)
-
(2003)
Proceedings of the 2nd ACM International Conference OnWireless Sensor Networks and Applications (WSNA 2003)
, pp. 151-159
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
50
-
-
70349327286
-
-
retrieved on June
-
NIST hash function competition, http://www.nist.gov/hash-competition (retrieved on June 2009)
-
(2009)
NIST Hash Function Competition
-
-
-
51
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington DC USA November 2002
-
Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), Washington, DC, USA, November 2002, pp. 41-47 (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
52
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 8(2), 228-258 (2005) (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
53
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2), 346-358 (2007)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.A.1
Yener, B.2
-
54
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41-77 (2005) (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
55
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Berlin Germany October 2004
-
Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October 2004, pp. 206-215 (2004)
-
(2004)
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004)
, pp. 206-215
-
-
Anderson, R.J.1
Chan, H.2
Perrig, A.3
-
56
-
-
45849124595
-
SAKE: Software attestation for key establishment in sensor networks
-
Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. Springer, Heidelberg
-
Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol.5067, pp. 372-385. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5067
, pp. 372-385
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
57
-
-
33845444069
-
Energy and communication e.cient group key management protocol for hierarchical sensor networks
-
Taichung Taiwan June
-
Panja, B., Madria, S., Bhargava, B.: Energy and Communication E.cient Group Key Management Protocol for Hierarchical Sensor Networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), Taichung, Taiwan (June 2006)
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing (SUTC 2006)
-
-
Panja, B.1
Madria, S.2
Bhargava, B.3
-
58
-
-
70349312266
-
Secure routing in wireless sensor networks
-
IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
Acs, G., Buttyan, L.: Secure Routing in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
On Wireless Sensor Network Security
-
-
Acs, G.1
Buttyan, L.2
-
59
-
-
50949122471
-
-
Routing Over Low power and Lossy networks (ROLL) Working Group. retrieved on June
-
Routing Over Low power and Lossy networks (ROLL) Working Group. Internet Engineering Task Force (IETF), http://www.ietf.org/html.charters/roll-charter. html (retrieved on June 2009)
-
(2009)
Internet Engineering Task Force
-
-
-
60
-
-
84871210733
-
Secure data aggregation in wireless sensor network: A survey
-
Wollongong, NSW, Australia, March 2008
-
Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a Survey. In: Proceedings of the Australasian Information Security Conference 2008: Conferences in Research and Practice in Information Technology (CRPIT), Wollongong, NSW, Australia, March 2008, pp. 93-105 (2008)
-
(2008)
Proceedings of the Australasian Information Security Conference 2008 Conferences in Research and Practice in Information Technology (CRPIT)
, pp. 93-105
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.G.3
-
61
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
Article in press
-
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.comnet.2009.02.023
-
(2009)
Computer Networks (Elsevier)
-
-
Ozdemir, S.1
Xiao, Y.2
-
62
-
-
36849045793
-
Secure time synchronization protocols for wireless sensor networks
-
DOI 10.1109/MWC.2007.4396944
-
Boukerche, A., Turgut, D.: Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14(5), 64-69 (2007) (Pubitemid 350231655)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 64-69
-
-
Boukerche, A.1
Turgut, D.2
-
63
-
-
67249114800
-
Securing time-synchronization protocols in sensor networks: Attack detection and Self-healing
-
Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008
-
Yang, Y., Sun, Y.: Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing. In: Proceedings of the IEEE 2008 Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008, pp. 1-6 (2008)
-
(2008)
Proceedings of the IEEE 2008
, pp. 1-6
-
-
Yang, Y.1
Sun, Y.2
-
64
-
-
49449093129
-
Secure time synchronization in sensor networks
-
July
-
Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 11(4) (July 2008)
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, Issue.4
, pp. 11
-
-
Ganeriwal, S.1
Popper, C.2
Capkun, S.3
Srivastava, M.B.4
-
65
-
-
70349306146
-
Intrusion detection in wireless sensor networks
-
Auerbach Publications, CRC Press, ISBN: 978-1420068-399
-
Giannetsos, T., Krontiris, I., Dimitriou, T., Freiling, F.C.: Intrusion Detection in Wireless Sensor Networks. In: On Security in RFID and Sensor Networks. Auerbach Publications, CRC Press (2009) ISBN: 978-1420068-399
-
(2009)
On Security in RFID and Sensor Networks
-
-
Giannetsos, T.1
Krontiris, I.2
Dimitriou, T.3
Freiling, F.C.4
-
66
-
-
42649108774
-
Situation awareness mechanisms for wireless sensor networks
-
Roman, R., Lopez, J., Gritzalis, S.: Situation Awareness Mechanisms for Wireless Sensor Networks. IEEE Communications Magazine 46(4), 102-107 (2008)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 102-107
-
-
Roman, R.1
Lopez, J.2
Gritzalis, S.3
-
67
-
-
4544367290
-
Source-location privacy for networks of energy-constrained sensors
-
Vienna, Austria May
-
Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-Location Privacy for Networks of Energy-Constrained Sensors. In: Proceedings of the 2004 IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004), Vienna, Austria (May 2004)
-
(2004)
Proceedings of the 2004 IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004)
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
Ott, M.4
-
68
-
-
70349305011
-
Trust establishment in sensor networks: Behaviour-based, certi.cate-based and a combinational approach
-
Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: Behaviour-based, certi.cate-based and a combinational approach. International Journal System of Systems Engineering 1(1/2), 128-148 (2008)
-
(2008)
International Journal System of Systems Engineering
, vol.1
, Issue.1-2
, pp. 128-148
-
-
Aivaloglou, E.1
Gritzalis, S.2
Skianis, C.3
-
69
-
-
84883055822
-
Trust and reputation systems for wireless sensor networks
-
Troubador Publishing Ltd. ISBN: 978-1905886-906
-
Roman, R., Fernandez-Gago, M.C., Lopez, J., Chen, H.-H.: Trust and Reputation Systems for Wireless Sensor Networks. In: On Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd. (2009) ISBN: 978-1905886-906
-
(2009)
On Security and Privacy in Mobile and Wireless Networking
-
-
Roman, R.1
Fernandez-Gago, M.C.2
Lopez, J.3
Chen, H.-H.4
-
70
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
Article in press
-
Na, L., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey. Ad Hoc Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.adhoc.2009.04.009
-
(2009)
Ad Hoc Networks (Elsevier)
-
-
Na, L.1
Zhang, N.2
Das, S.K.3
Thuraisingham, B.4
-
71
-
-
70349306156
-
Remote attestation - Identi.cation
-
IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
Yasinsac, A.: Remote Attestation - Identi.cation. On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
-
On Wireless Sensor Network Security
-
-
Yasinsac, A.1
-
72
-
-
51349150828
-
Spatial signatures for lightweight security in wireless sensor networks
-
Phoenix USA April 2008
-
Sang, L., Arora, A.: Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 2137-2145 (2008)
-
(2008)
Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008)
, pp. 2137-2145
-
-
Sang, L.1
Arora, A.2
-
73
-
-
69949163899
-
Physical-layer identi.cation of wireless sensor nodes
-
ETH Zürich System Security Group D-INFK August
-
Danev, B., Capkun, S.: Physical-layer Identi.cation of Wireless Sensor Nodes. Technical Reports 604, ETH Zürich, System Security Group D-INFK (August 2008)
-
(2008)
Technical Reports 604
-
-
Danev, B.1
Capkun, S.2
-
74
-
-
39749142098
-
Analyzing cross-sector interdependencies
-
Hawaii, USA
-
Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), Hawaii, USA, pp. 112-119 (2007)
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007)
, pp. 112-119
-
-
Peerenboom, J.P.1
Fisher, R.E.2
-
75
-
-
70349303101
-
-
retrieved on June
-
ZigBee Alliance, http://www.zigbee.org/ (retrieved on June 2009)
-
(2009)
-
-
-
76
-
-
70349319262
-
-
retrieved on June
-
HART Communication, http://www.hartcomm2.org (retrieved on June 2009)
-
(2009)
-
-
-
79
-
-
70349338509
-
Secure management of scada networks
-
Cepis UPGRADE
-
Alcaraz, C., Fernandez, G., Roman, R., Balastegui, A., Lopez, J.: Secure Management of SCADA Networks. New Trends in Network Management, Cepis UPGRADE 9(6), 22-28 (2008)
-
(2008)
New Trends in Network Management
, vol.9
, Issue.6
, pp. 22-28
-
-
Alcaraz, C.1
Fernandez, G.2
Roman, R.3
Balastegui, A.4
Lopez, J.5
-
81
-
-
70349319264
-
-
DNP Users Group. retrieved on June
-
DNP3. DNP Users Group, http://www.dnp.org (retrieved on June 2009)
-
(2009)
-
-
-
83
-
-
70349308100
-
-
retrieved on June
-
PI Pro.bus - Pro.net, http://www.profibus.com (retrieved on June 2009)
-
(2009)
-
-
-
84
-
-
70349311176
-
-
retrieved on June
-
Fieldbus Foundation, http://www.fieldbus.org (retrieved on June 2009)
-
(2009)
-
-
-
85
-
-
33746690237
-
-
Request for Comments September
-
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Request for Comments (September 2007)
-
(2007)
RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
86
-
-
33646771783
-
The Internet of Things
-
International Telecommunication Union
-
International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)
-
(2005)
ITU Internet Reports
-
-
-
87
-
-
67649560482
-
Integrating wireless sensor networks and the internet: A security analysis
-
Roman, R., Lopez, J.: Integrating Wireless Sensor Networks and the Internet: A Security Analysis. Internet Research 19(2), 246-259 (2009)
-
(2009)
Internet Research
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
|