-
2
-
-
84961572484
-
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu Y.-C., Johnson D.B., and Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. WMCSA (2002) 3-13
-
(2002)
WMCSA
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
3
-
-
0036957315
-
Ariadne: a secure on-demand routing protocol for ad hoc networks
-
Hu Y.-C., Perrig A., and Johnson D.B. Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCOM (2002) 12-23
-
(2002)
MobiCOM
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0034539015
-
Directed diffusion: a scalable and robust communication paradigm for sensor networks
-
Intanagonwiwat C., Govindan R., and Estrin D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. MobiCOM (2000) 56-67
-
(2000)
MobiCOM
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
6
-
-
0034547115
-
GPSR: greedy perimeter stateless routing for wireless networks
-
Karp B., and Kung H.T. GPSR: greedy perimeter stateless routing for wireless networks. MobiCOM (2000) 243-254
-
(2000)
MobiCOM
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
7
-
-
0013043106
-
Highly-resilient energy-efficient multipath routing in wireless sensor networks
-
Ganesan D., Govindan R., Shenker S., and Estrin D. Highly-resilient energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review 4 5 (2001) 11-25
-
(2001)
Mobile Computing and Communications Review
, vol.4
, Issue.5
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
8
-
-
84904578657
-
A scalable solution to minimum cost forwarding in large sensor networks
-
Ye F., Chen A., Lu S., and Zhang L. A scalable solution to minimum cost forwarding in large sensor networks. ICCCN (2001) 304-309
-
(2001)
ICCCN
, pp. 304-309
-
-
Ye, F.1
Chen, A.2
Lu, S.3
Zhang, L.4
-
9
-
-
0033877788
-
Energy efficient communication protocol for wireless micro sensor networks
-
Heinzelman W.R., Chandrakasan A., and Balakrishnan H. Energy efficient communication protocol for wireless micro sensor networks. HICSS (2000) 3005-3014
-
(2000)
HICSS
, pp. 3005-3014
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
10
-
-
0036986248
-
Rumor routing algorithm for sensor networks
-
Braginsky D., and Estrin D. Rumor routing algorithm for sensor networks. WSNA (2002) 22-31
-
(2002)
WSNA
, pp. 22-31
-
-
Braginsky, D.1
Estrin, D.2
-
11
-
-
3042785862
-
The Sybil attack in sensor networks: analysis and defenses
-
Newsome J., Shi E., Song D., and Perrig A. The Sybil attack in sensor networks: analysis and defenses. IPSN (2004) 259-268
-
(2004)
IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
0029530159
-
A routing protocol for finding two node-disjoint paths in computer networks
-
Ishida K., Kakuda Y., and Kikuno T. A routing protocol for finding two node-disjoint paths in computer networks. ICNP (1992) 340-347
-
(1992)
ICNP
, pp. 340-347
-
-
Ishida, K.1
Kakuda, Y.2
Kikuno, T.3
-
13
-
-
0034772133
-
Geography-informed energy conservation for ad hoc routing
-
Xu Y., Heidemann J., and Estrin D. Geography-informed energy conservation for ad hoc routing. MobiCOM (2001) 70-84
-
(2001)
MobiCOM
, pp. 70-84
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
14
-
-
84942426861
-
Secure routing in sensor networks: attacks and countermeasures
-
Karlof C., and Wagner D. Secure routing in sensor networks: attacks and countermeasures. SNPA (2003) 113-127
-
(2003)
SNPA
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti S., Giuli T.J., Lai K., and Baker M. Mitigating routing misbehavior in mobile ad hoc networks. MobiCOM (2000) 255-265
-
(2000)
MobiCOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
0041973497
-
Packet leashes: a defense against wormhole attacks in wireless networks
-
Hu Y.C., Perrig A., and Johnson D.B. Packet leashes: a defense against wormhole attacks in wireless networks. IEEE INFOCOM (2003) 1976-1986
-
(2003)
IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
Hu L., and Evans D. Using directional antennas to prevent wormhole attacks. NDSS (2004) 131-141
-
(2004)
NDSS
, pp. 131-141
-
-
Hu, L.1
Evans, D.2
-
18
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Hu Y.C., Perrig A., and Johnson D. Rushing attacks and defense in wireless ad hoc network routing protocols. WiSe (2003) 30-40
-
(2003)
WiSe
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
19
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Sanzgiri K., Dahill B., Levine B.N., Shields C., and Belding-Royer E. A secure routing protocol for ad hoc networks. ICNP (2002) 78-87
-
(2002)
ICNP
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
20
-
-
51949089156
-
PEGASIS: power-efficient gathering in sensor information systems
-
Lindsey S., and Raghavendra C. PEGASIS: power-efficient gathering in sensor information systems. IEEE Aerospace Conference 3 (2002) 1125-1130
-
(2002)
IEEE Aerospace Conference
, vol.3
, pp. 1125-1130
-
-
Lindsey, S.1
Raghavendra, C.2
-
21
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J.D., Wen V., and Culler D.E. SPINS: security protocols for sensor networks. Wireless Networks 8 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
22
-
-
3042822764
-
Establishing pair-wise keys in distributed sensor networks
-
Liu D., and Ning P. Establishing pair-wise keys in distributed sensor networks. CCS (2003) 52-61
-
(2003)
CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
24
-
-
1542287664
-
Secure message transmission in mobile ad hoc networks
-
Papadimitratos P., and Haas Z.J. Secure message transmission in mobile ad hoc networks. WiSe (2003) 41-50
-
(2003)
WiSe
, pp. 41-50
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
25
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
Lee S.J., and Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. ICC (2001) 3201-3205
-
(2001)
ICC
, pp. 3201-3205
-
-
Lee, S.J.1
Gerla, M.2
-
26
-
-
0035425905
-
Performance of multipath routing for on-demand protocols in mobile ad hoc networks
-
Nasipuri A., Castaneda R., and Das S.R. Performance of multipath routing for on-demand protocols in mobile ad hoc networks. ACM Mobile Networks and Applications (MONET) 6 4 (2001) 339-349
-
(2001)
ACM Mobile Networks and Applications (MONET)
, vol.6
, Issue.4
, pp. 339-349
-
-
Nasipuri, A.1
Castaneda, R.2
Das, S.R.3
-
27
-
-
0042475197
-
A framework for reliable routing in mobile ad hoc networks
-
Ye Z., Krishnamurthy S.V., and Tripathi S.K. A framework for reliable routing in mobile ad hoc networks. IEEE INFOCOM 1 (2003) 270-280
-
(2003)
IEEE INFOCOM
, vol.1
, pp. 270-280
-
-
Ye, Z.1
Krishnamurthy, S.V.2
Tripathi, S.K.3
-
28
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Bianchi G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18 3 (2000) 535-547
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
31
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks
-
Buchegger S., and Le Boudec J.-Y. Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. MobiHoc (2002) 80-91
-
(2002)
MobiHoc
, pp. 80-91
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
32
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
Huang Y., and Lee W. A cooperative intrusion detection system for ad hoc networks. SASN (2003) 135-147
-
(2003)
SASN
, pp. 135-147
-
-
Huang, Y.1
Lee, W.2
-
34
-
-
27544433189
-
Tibfit: trust index based fault tolerance for arbitrary data faults in sensor networks
-
Krasniewski M., Varadharajan P., Rabeler B., Bagchi S., and Hu Y.C. Tibfit: trust index based fault tolerance for arbitrary data faults in sensor networks. DSN (2005) 672-681
-
(2005)
DSN
, pp. 672-681
-
-
Krasniewski, M.1
Varadharajan, P.2
Rabeler, B.3
Bagchi, S.4
Hu, Y.C.5
-
36
-
-
27544468419
-
LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks
-
Khalil I., Bagchi S., and Shroff N.B. LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks. DSN (2005) 612-621
-
(2005)
DSN
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
37
-
-
33847326821
-
DICAS: detection, diagnosis and isolation of control attacks in sensor networks
-
Khalil I., Bagchi S., and Nita-Rotaru C. DICAS: detection, diagnosis and isolation of control attacks in sensor networks. SecureComm (2005)
-
(2005)
SecureComm
-
-
Khalil, I.1
Bagchi, S.2
Nita-Rotaru, C.3
-
38
-
-
85116427082
-
Defending against Sybil attacks in sensor networks
-
Zhang Q., Wang P., Reeves D.S., and Ning P. Defending against Sybil attacks in sensor networks. SDCS (2005) 185-191
-
(2005)
SDCS
, pp. 185-191
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
-
39
-
-
27544510780
-
Neutralization of errors and attacks in wireless ad hoc networks
-
Basile C., Kalbarczyk Z., and Iyer R.K. Neutralization of errors and attacks in wireless ad hoc networks. DSN (2005) 518-527
-
(2005)
DSN
, pp. 518-527
-
-
Basile, C.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
40
-
-
84866469313
-
SeRLoc: Robust localization for wireless sensor networks, The ACM Transactions on Sensor
-
L. Lazos, R. Poovendran, SeRLoc: robust localization for wireless sensor networks, The ACM Transactions on Sensor Networks (TOSN) 1(1) (2005) 73-100.
-
(2005)
Networks (TOSN)
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
41
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
R. Poovendran, L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, ACM Journal on Wireless Networks (WINET), 13 (1) (2007) 27-59.
-
(2007)
ACM Journal on Wireless Networks (WINET)
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
42
-
-
11244309425
-
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
-
Carbunar B., Ioannidis I., and Nita-Rotaru C. JANUS: towards robust and malicious resilient routing in hybrid wireless networks. WiSe (2004) 11-20
-
(2004)
WiSe
, pp. 11-20
-
-
Carbunar, B.1
Ioannidis, I.2
Nita-Rotaru, C.3
-
43
-
-
33847279913
-
On the survivability of routing protocols in ad hoc wireless networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, On the survivability of routing protocols in ad hoc wireless networks, SecureComm, 2005.
-
(2005)
SecureComm
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
44
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, Password authentication with insecure communication, Communications of the ACM, 24(11) (1981) 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
47
-
-
33745736659
-
Statistical wormhole detection in sensor networks, ESAS 2005
-
R. Molva, G. Tsudik, D. Westhoff Eds
-
R. Molva, G. Tsudik, D. Westhoff (Eds.), Statistical wormhole detection in sensor networks, ESAS 2005, LNCS 3813, 2005, pp. 128-141.
-
(2005)
LNCS
, vol.3813
, pp. 128-141
-
-
-
48
-
-
70349749681
-
-
.
-
-
-
-
49
-
-
36048983204
-
SLAM: Sleep-wake aware local monitoring in sensor networks
-
I. Khalil, S. Bagchi, N.B. Shroff, SLAM: sleep-wake aware local monitoring in sensor networks, in: The 37th IEEE Dependable Systems and Networks Conference (DSN'07), 2007, pp. 565-574.
-
(2007)
The 37th IEEE Dependable Systems and Networks Conference (DSN'07)
, pp. 565-574
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
|