-
2
-
-
38349181460
-
Secure distributed cluster formation in wireless sensor networks
-
DOI 10.1109/ACSAC.2006.46, 4041161, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
K. Sun, P. Peng, P. Ning, and C. Wang, "Secure distributed cluster formation in wireless sensor networks," in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), 2006, pp. 131-140. (Pubitemid 351232909)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 131-140
-
-
Sun, K.1
Peng, P.2
Ning, P.3
Wang, C.4
-
3
-
-
33845869923
-
Analysis and evaluation of secos, a protocol for energy efficient and secure communication in sensor networks
-
I. Khalil, S. Bagchi, and N. Shroff, "Analysis and evaluation of secos, a protocol for energy efficient and secure communication in sensor networks," Ad Hoc Networks., vol.5, no.3, pp. 360-391, 2007.
-
(2007)
Ad Hoc Networks.
, vol.5
, Issue.3
, pp. 360-391
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.3
-
4
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, "Adaptive security design with malicious node detection in cluster-based sensor networks," Comput. Commun., vol.30, no.11-12, pp. 2385-2400, 2007.
-
(2007)
Comput. Commun.
, vol.30
, Issue.11-12
, pp. 2385-2400
-
-
Hsieh, M.-Y.1
Huang, Y.-M.2
Chao, H.-C.3
-
5
-
-
34547913472
-
Secleach-on the security of clustered sensor networks
-
L. B. Oliveira, A. Ferreira, M. A. Vilaça, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro, "Secleach-on the security of clustered sensor networks," Signal Process., vol.87, no.12, pp. 2882-2895, 2007.
-
(2007)
Signal Process.
, vol.87
, Issue.12
, pp. 2882-2895
-
-
Oliveira, L.B.1
Ferreira, A.2
Vilaça, M.A.3
Wong, H.C.4
Bern, M.5
Dahab, R.6
Loureiro, A.A.F.7
-
6
-
-
70449571153
-
Nonmanipulable aggregator node election for wireless sensor networks
-
Jan.
-
M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, "Nonmanipulable aggregator node election for wireless sensor networks," in ICST WiOpt, Jan. 2007.
-
(2007)
ICST WiOpt
-
-
Sirivianos, M.1
Westhoff, D.2
Armknecht, F.3
Girao, J.4
-
7
-
-
79952569372
-
Leader election algorithms for wireless ad hoc networks
-
S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley, "Leader election algorithms for wireless ad hoc networks," in Proceedings of DARPA Information Survivability Conference and Exposition, 2003, pp. 261- 272.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 261-272
-
-
Vasudevan, S.1
Decleene, B.2
Immerman, N.3
Kurose, J.4
Towsley, D.5
-
8
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol.35, no.10, pp. 54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
9
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr
-
J. Newsome, R. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," in Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN), Apr 2004.
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
10
-
-
0012575586
-
-
Department of Computer Science, Rice University, Tech. Rep. DEC-TR-506
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," Department of Computer Science, Rice University, Tech. Rep. DEC-TR-506, 2001.
-
(2001)
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
33745639957
-
-
U. Colorado at Boulder, Tech. Rep. CU-CS-990-1005, Jan.
-
C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: The need for secure systems," U. Colorado at Boulder, Tech. Rep. CU-CS-990-1005, Jan. 2005.
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
13
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, 1993, pp. 471-486.
-
(1993)
Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
14
-
-
0000886528
-
Algorithm 235: Random permutation
-
R. Durstenfeld, "Algorithm 235: Random permutation," Commun. ACM, vol.7, no.7, p. 420, 1964.
-
(1964)
Commun. ACM
, vol.7
, Issue.7
, pp. 420
-
-
Durstenfeld, R.1
-
15
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005, pp. 609-619.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
16
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wirel. Netw., vol.13, no.1, pp. 27-59, 2007.
-
(2007)
Wirel. Netw.
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
17
-
-
17544377081
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. S. J. Pister, "System architecture directions for networked sensors," in Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.S.J.6
-
18
-
-
84858246079
-
-
Crossbow Technology Inc.
-
Crossbow Technology Inc., "Wireless sensor networks," http://www.xbow.com/Products/productdetails.aspx?sid=156.
-
Wireless Sensor Networks
-
-
|