-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E Cayirci, "Wireless sensor networks: a survey," Computer Networks, Vol. 38, No. 4, pp. 393-422, March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
August
-
C-Y. Chong and S.P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247-1256, August 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.-Y.1
Kumar, S.P.2
-
4
-
-
13944283393
-
A Survey on Routing Protocols for Wireless Sensor Networks
-
May
-
K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Elsevier Journal of Ad Hoc Networks, Vol. 3, No. 3, pp. 325-349, May 2005.
-
(2005)
Elsevier Journal of Ad Hoc Networks
, vol.3
, Issue.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.2
-
5
-
-
33646918331
-
Evaluation of Security Mechanisms in Wireless Sensor Networks
-
G. Guimarães, E. Souto, D. Sadok, and J. Kelner, "Evaluation of Security Mechanisms in Wireless Sensor Networks", in the Proceedings of the Systems Communications Conf., Montreal, Canada , August 2005.
-
Proceedings of the Systems Communications Conf., Montreal, Canada, August 2005
-
-
Guimarães, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
6
-
-
46449092480
-
Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks
-
T. Zia, A. Zomaya, and, N. Ababneh, "Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks," in the Proceedings of the international Conference on Sensor Technologies and Applications (SENSORCOMM'07), Valencia, Spain, October 2007.
-
Proceedings of the International Conference on Sensor Technologies and Applications (SENSORCOMM'07), Valencia, Spain, October 2007
-
-
Zia, T.1
Zomaya, A.2
Ababneh, N.3
-
7
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
September
-
C. Karlof and D.Wagner. "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Journal of Ad-hoc Networks, Special Issue on Sensor Network Applications and Protocols, Vol. 1, No. 2-3, pp. 293-315, September 2003.
-
(2003)
Journal of Ad-hoc Networks, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
77949974817
-
PLUS: Parameterised Localised Trust Management-based Security Framework for Sensor Networks
-
Z. Yao, D. Kim, Y. Doh, "PLUS: Parameterised Localised Trust Management-based Security Framework for Sensor Networks," Int'l Journal of Sensor Networks, Vol. 3, No. 4, pp. 224-236, 2008.
-
(2008)
Int'l Journal of Sensor Networks
, vol.3
, Issue.4
, pp. 224-236
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
9
-
-
70350070568
-
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
-
to appear a pre-publication version is available at
-
R. Shaikh, et al., "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, to appear (a pre-publication version is available at http://doi.ieeecomputersociety.org/10.1109/TPDS.2008.258).
-
IEEE Transactions on Parallel and Distributed Systems
-
-
Shaikh, R.1
-
10
-
-
33745820773
-
Trust Management for Resilient Wireless Sensor Networks
-
Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC'05), Korea, December
-
J. Hur, Y. Lee, S.-M. Hong and H. Yoon, "Trust Management for Resilient Wireless Sensor Networks," in the Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC'05), Lecture Notes in Computer Science, Vol. 3935 pp. 56-68, Korea, December 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3935
, pp. 56-68
-
-
Hur, J.1
Lee, Y.2
Hong, S.-M.3
Yoon, H.4
-
11
-
-
18144417809
-
Energy and QoS aware Routing for Wireless Sensor Networks
-
July
-
K. Akkaya and M. Younis, "Energy and QoS aware Routing for Wireless Sensor Networks," Cluster Computing, Vol. 8, No. 2-3, pp. 179-188, July 2005.
-
(2005)
Cluster Computing
, vol.8
, Issue.2-3
, pp. 179-188
-
-
Akkaya, K.1
Younis, M.2
-
12
-
-
84907549442
-
Energy Aware Routing for Low Energy Ad Hoc Sensor Networks
-
R. Shah and J. Rabaey, "Energy Aware Routing for Low Energy Ad Hoc Sensor Networks", in the Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Orlando, FL, March 2002.
-
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Orlando, FL, March 2002
-
-
Shah, R.1
Rabaey, J.2
-
13
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
th annual International Conference on Mobile Computing and Networking (MobiCom'01), Rome, Italy, August 2001.
-
th Annual International Conference on Mobile Computing and Networking (MobiCom'01), Rome, Italy, August 2001
-
-
Perrig1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
14
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor networks
-
nd International Conference on Embedded Networked Sensor systems (SenSys'04), Baltimore, MD, USA, November 2004.
-
nd International Conference on Embedded Networked Sensor Systems (SenSys'04), Baltimore, MD, USA, November 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
15
-
-
0036980294
-
Securing Ad hoc Routing Protocols
-
M.G. Zapata and N. Asokan, "Securing Ad hoc Routing Protocols," in the Proceedings of the ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, September 2002.
-
Proceedings of the ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, September 2002
-
-
Zapata, M.G.1
Asokan, N.2
-
16
-
-
85016596484
-
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks
-
August
-
T. Park and K. G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks", ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, pp. 634-660, August 2004.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
17
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks
-
th annual International Conference on Mobile Computing and Networking (MobiCom'02), Atlanta, GA, September 23-28, 2002.
-
th Annual International Conference on Mobile Computing and Networking (MobiCom'02), Atlanta, GA, September 23-28, 2002
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
3042647758
-
A Survey of Secure Wireless Ad Hoc Routing
-
May- June
-
H. Yih-Chun, A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security & Privacy, Vol. 2, No. 3, pp. 28 - 39, May- June 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Yih-Chun, H.1
Perrig, A.2
-
19
-
-
21144452079
-
Collaborative Trust-based Secure Routing in Multihop Ad hoc Networks
-
Proceedings of IFIP Networking Conference (NETWORKING'04), Athènes, Greece, May
-
N. Pissinou, T. Ghosh, and K. Makki, "Collaborative Trust-based Secure Routing in Multihop Ad hoc Networks," in the Proceedings of IFIP Networking Conference (NETWORKING'04), Lecture Notes in Computer Science, Vol. 3042, Athènes, Greece, May 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3042
-
-
Pissinou, N.1
Ghosh, T.2
Makki, K.3
-
21
-
-
77951265495
-
Trust based routing decisions in mobile ad-hoc networks
-
K. Meka, M. Virendra, and S. Upadhyaya, "Trust based routing decisions in mobile ad-hoc networks," in the Proceedings of the Workshop on Secure Knowledge Management (SKM'06), New York, September 2006.
-
Proceedings of the Workshop on Secure Knowledge Management (SKM'06), New York, September 2006
-
-
Meka, K.1
Virendra, M.2
Upadhyaya, S.3
-
22
-
-
11244296240
-
A Trust Model based Routing Protocol for Secure Ad hoc Networks
-
X. Li, M. Lyu, and J. Liu, "A Trust Model based Routing Protocol for Secure Ad hoc Networks," in the Proceedings of the IEEE Aerospace Conference, Big Sky, MT, March 2004.
-
Proceedings of the IEEE Aerospace Conference, Big Sky, MT, March 2004
-
-
Li, X.1
Lyu, M.2
Liu, J.3
-
23
-
-
0003574981
-
-
Research Report, Dept. of Math., Univ. of Coimbra, Portugal, June
-
E. Q. V. Martins, M. M. B. Pascoal, and J. L. E. dos Santos, "The K shortest paths problem," Research Report, Dept. of Math., Univ. of Coimbra, Portugal, June 1998.
-
(1998)
The K Shortest Paths Problem
-
-
Martins, E.Q.V.1
Pascoal, M.M.B.2
Dos Santos, J.L.E.3
-
24
-
-
0032108018
-
Finding the k Shortest Paths
-
February
-
D. Eppstein, "Finding the k Shortest Paths," SIAM Journal on Computing, Vol. 28, No. 2, pp. 652-673 , February 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.2
, pp. 652-673
-
-
Eppstein, D.1
-
26
-
-
0035703920
-
On-demand Multipath Distance Vector Routing in Ad Hoc Networks
-
M. K. Marina and S. R. Das, "On-demand Multipath Distance Vector Routing in Ad Hoc Networks," in the Proceedings of IEEE International Conference on Network Protocols (ICNP), Riverside, California, November 2001.
-
Proceedings of IEEE International Conference on Network Protocols (ICNP), Riverside, California, November 2001
-
-
Marina, M.K.1
Das, S.R.2
-
27
-
-
0029195850
-
Propagation Measurements and Models for Wireless Communications Channels
-
January
-
J. Andresen, T. Rappaport, S. Yoshida, "Propagation Measurements and Models for Wireless Communications Channels," IEEE Communications Magazine, Vol. 33, No. 1, pp. 42-49, January1995.
-
(1995)
IEEE Communications Magazine
, vol.33
, Issue.1
, pp. 42-49
-
-
Andresen, J.1
Rappaport, T.2
Yoshida, S.3
-
28
-
-
85088357047
-
The RC5 Encryption Algorithm
-
Proceedings of the Leuven Workshop on Fast Software Encryption, Leuven, Belgium, December
-
R. L. Rivest, "The RC5 Encryption Algorithm," in the Proceedings of the Leuven Workshop on Fast Software Encryption, Lecture Notes in Computer Science 1008, Leuven, Belgium, December 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.1008
-
-
Rivest, R.L.1
|