-
1
-
-
33746103289
-
Trust beyond Security: An Expanded Trust Model
-
July
-
L.J. Hoffman, K. Lawson-Jenkins, and J. Blum, "Trust beyond Security: An Expanded Trust Model," Comm. ACM, vol. 49, no. 7, pp. 95-101, July 2006.
-
(2006)
Comm. ACM
, vol.49
, Issue.7
, pp. 95-101
-
-
Hoffman, L.J.1
Lawson-Jenkins, K.2
Blum, J.3
-
2
-
-
11144340927
-
Designing Secure Sensor Networks
-
E. Shi and A. Perrig, "Designing Secure Sensor Networks," IEEE Wireless Comm., vol. 11, no. 6, pp. 38-43, 2004.
-
(2004)
IEEE Wireless Comm
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
3
-
-
33745853759
-
Security Issues of Wireless Sensor Networks in Healthcare Applications
-
Apr
-
H.S. Ng, M.L. Sim, and C.M. Tan, "Security Issues of Wireless Sensor Networks in Healthcare Applications," BT Technology J., vol. 24, no. 2, pp. 138-144, Apr. 2006.
-
(2006)
BT Technology J
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
5
-
-
33144465932
-
Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks
-
Feb
-
Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEE J. Selected Areas in Comm
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
6
-
-
34547321367
-
Trust Management Problem in Distributed Wireless Sensor Networks
-
Aug
-
R.A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y.J. Song, "Trust Management Problem in Distributed Wireless Sensor Networks," Proc. 12th IEEE Int'l Conf. Embedded Real-Time Computing Systems and Applications (RTCSA '06), pp. 411-414, Aug. 2006.
-
(2006)
Proc. 12th IEEE Int'l Conf. Embedded Real-Time Computing Systems and Applications (RTCSA '06)
, pp. 411-414
-
-
Shaikh, R.A.1
Jameel, H.2
Lee, S.3
Rajput, S.4
Song, Y.J.5
-
7
-
-
84875347958
-
-
M. Momani, S. Challa, and K. Aboura, Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective, Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm., T.S. et al., ed., pp. 317-321, Springer, 2007.
-
M. Momani, S. Challa, and K. Aboura, "Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective," Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm., T.S. et al., ed., pp. 317-321, Springer, 2007.
-
-
-
-
8
-
-
85037175440
-
: Wireless Sensor Network Security: A Survey
-
Y. Xiao, ed, pp, CRC Press
-
J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Chapter 16: Wireless Sensor Network Security: A Survey," Security in Distributed, Grid, and Pervasive Computing, Y. Xiao, ed., pp. 367-410, CRC Press, 2006.
-
(2006)
Security in Distributed, Grid, and Pervasive Computing
, pp. 367-410
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
9
-
-
5044222209
-
A Dynamic Trust Model for Mobile Ad Hoc Networks
-
May
-
Z. Liu, A.W. Joy, and R.A. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp. 80-85, May 2004.
-
(2004)
Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04)
, pp. 80-85
-
-
Liu, Z.1
Joy, A.W.2
Thompson, R.A.3
-
10
-
-
24744432675
-
Self-Policing Mobile Ad Hoc Networks by Reputation Systems
-
July
-
S. Buchegger and J.-Y.L. Boudec, "Self-Policing Mobile Ad Hoc Networks by Reputation Systems," IEEE Comm. Magazine, vol. 43, no. 7, pp. 101-107, July 2005.
-
(2005)
IEEE Comm. Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
12
-
-
33646589837
-
An Application-Specific Protocol Architecture for Wireless Microsensor Networks
-
Oct
-
W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
-
(2002)
IEEE Trans. Wireless Comm
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
13
-
-
51949089156
-
PEGASIS - Power-Efficient Gathering in Sensor Information Systems
-
S. Lindsey, C. Raghavendra, and S. Raghavendra, "PEGASIS - Power-Efficient Gathering in Sensor Information Systems," Proc. IEEE Aerospace Conf., vol. 3, pp. 1125-1130, 2002.
-
(2002)
Proc. IEEE Aerospace Conf
, vol.3
, pp. 1125-1130
-
-
Lindsey, S.1
Raghavendra, C.2
Raghavendra, S.3
-
15
-
-
10944266504
-
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-Hoc Sensor Networks
-
Oct
-
O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-Hoc Sensor Networks," IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 366-379, Oct. 2004.
-
(2004)
IEEE Trans. Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
16
-
-
32844459414
-
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
-
Jan.-Mar
-
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, Jan.-Mar. 2006.
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
17
-
-
33845500536
-
Efficient Hierarchical Key Generation and Key Diffusion for Sensor Networks
-
Sept
-
M. Shehab, E. Bertino, and A. Ghafoor, "Efficient Hierarchical Key Generation and Key Diffusion for Sensor Networks," Proc. Second Ann. IEEE Conf. Sensor and Ad Hoc Comm. and Networks (SECON '05), pp. 197-213, Sept. 2005.
-
(2005)
Proc. Second Ann. IEEE Conf. Sensor and Ad Hoc Comm. and Networks (SECON '05)
, pp. 197-213
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
18
-
-
0242334164
-
Minimizing Communication Costs in Hierarchically-Clustered Networks of Wireless Sensors
-
S. Bandyopadhyay and E.J. Coyle, "Minimizing Communication Costs in Hierarchically-Clustered Networks of Wireless Sensors," Computer Networks, vol. 44, no. 1, pp. 1-16, 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.1
, pp. 1-16
-
-
Bandyopadhyay, S.1
Coyle, E.J.2
-
19
-
-
0038717615
-
A Reputation System for Peer-to-Peer Networks
-
June
-
M. Gupta, P. Judge, and M. Ammar, "A Reputation System for Peer-to-Peer Networks," Proc. 13th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '03), pp. 144-152, June 2003.
-
(2003)
Proc. 13th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '03)
, pp. 144-152
-
-
Gupta, M.1
Judge, P.2
Ammar, M.3
-
20
-
-
24944562088
-
An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks
-
May
-
D. Ingram, "An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks," Proc. Third Int'l Conf. Trust Management, pp. 273-288, May 2005.
-
(2005)
Proc. Third Int'l Conf. Trust Management
, pp. 273-288
-
-
Ingram, D.1
-
21
-
-
3142738238
-
Peer Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
-
July
-
L. Xiong and L. Liu, "Peer Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
22
-
-
33144465377
-
On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks
-
Feb
-
G. Theodorakopoulos and J.S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
-
(2006)
IEEE J. Selected Areas in Comm
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
25
-
-
34548043694
-
Trust-Based Security for Wireless Ad Hoc and Sensor Networks
-
Sept
-
A. Boukerche, X. Li, and K. EL-Khatib, "Trust-Based Security for Wireless Ad Hoc and Sensor Networks," Computer Comm., vol. 30, pp. 2413-2427, Sept. 2007.
-
(2007)
Computer Comm
, vol.30
, pp. 2413-2427
-
-
Boukerche, A.1
Li, X.2
EL-Khatib, K.3
-
26
-
-
39049103908
-
PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security
-
Oct
-
Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security," Proc. Third IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS '06), pp. 437-446, Oct. 2006.
-
(2006)
Proc. Third IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS '06)
, pp. 437-446
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
27
-
-
33845715578
-
Location Verification and Trust Management for Resilient Geographic Routing
-
K. Liu, N. Abu-Ghazaleh, and K.-D. Kang, "Location Verification and Trust Management for Resilient Geographic Routing," J. Parallel and Distributed Computing, vol. 67, no. 2, pp. 215-228, 2007.
-
(2007)
J. Parallel and Distributed Computing
, vol.67
, Issue.2
, pp. 215-228
-
-
Liu, K.1
Abu-Ghazaleh, N.2
Kang, K.-D.3
-
28
-
-
37349084148
-
Reputation-Based Trust in Wireless Sensor Networks
-
Apr
-
H. Chen, H. Wu, X. Zhou, and C. Gao, "Reputation-Based Trust in Wireless Sensor Networks," Proc. Int'l Conf. Multimedia and Ubiquitous Eng. (MUE '07), pp. 603-607, Apr. 2007.
-
(2007)
Proc. Int'l Conf. Multimedia and Ubiquitous Eng. (MUE '07)
, pp. 603-607
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
29
-
-
33846267322
-
A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values
-
Dec
-
H. Jameel, L.X. Hung, U. Kalim, A. Sajjad, S. Lee, and Y.-K. Lee, "A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values," Proc. Third IEEE Int'l Security in Storage Workshop (SISW '05), pp. 674-679, Dec. 2005.
-
(2005)
Proc. Third IEEE Int'l Security in Storage Workshop (SISW '05)
, pp. 674-679
-
-
Jameel, H.1
Hung, L.X.2
Kalim, U.3
Sajjad, A.4
Lee, S.5
Lee, Y.-K.6
-
30
-
-
33750300697
-
LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network
-
Sept
-
R.A. Shaikh, S. Lee, M.A.U. Khan, and Y.J. Song, "LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network," Proc. 11th IFIP Int'l Conf. Personal Wireless Comm. (PWC '06), pp. 367-377, Sept. 2006.
-
(2006)
Proc. 11th IFIP Int'l Conf. Personal Wireless Comm. (PWC '06)
, pp. 367-377
-
-
Shaikh, R.A.1
Lee, S.2
Khan, M.A.U.3
Song, Y.J.4
-
33
-
-
17744376200
-
A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks
-
S. Muruganathan, D. Ma, R. Bhasin, and A. Fapojuwo, "A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks," IEEE Comm. Magazine, vol. 43, no. 3, pp. 8-13, 2005.
-
(2005)
IEEE Comm. Magazine
, vol.43
, Issue.3
, pp. 8-13
-
-
Muruganathan, S.1
Ma, D.2
Bhasin, R.3
Fapojuwo, A.4
-
34
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
35
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 62-72, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
36
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
37
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Nov
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, Nov. 2004.
-
(2004)
Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
41
-
-
70350077301
-
Protecting the Communication Structure in Sensor Networks
-
S. Olariu, Q. Xu, M. Eltoweissy, A. Wadaa, and A.Y. Zomaya, "Protecting the Communication Structure in Sensor Networks," Int'l J. Distributed Sensor Networks, vol. 1, pp. 187-203, 2005.
-
(2005)
Int'l J. Distributed Sensor Networks
, vol.1
, pp. 187-203
-
-
Olariu, S.1
Xu, Q.2
Eltoweissy, M.3
Wadaa, A.4
Zomaya, A.Y.5
-
42
-
-
52249120873
-
Efficient Anonymity Schemes for Clustered Wireless Sensor Networks
-
S. Misra and G. Xue, "Efficient Anonymity Schemes for Clustered Wireless Sensor Networks," Int'l J. Sensor Networks, vol. 1, nos. 1/2, pp. 50-63, 2006.
-
(2006)
Int'l J. Sensor Networks
, vol.1
, Issue.1-2
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
|