-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102-114 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53-57 (2004)
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
4
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A., Stankovic, J.: Denial of Service in Sensor Networks. IEEE Computer 35, 54-62 (2002)
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
5
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking 11(1), 2-16 (2003)
-
(2003)
ACM/IEEE Transactions on Networking
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
8
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
Chan, H., Perrig, A., Song, D.: Random Key Pre-Distribution Schemes for Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 197-213 (2003)
-
(2003)
Proc. of IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. In: Proc. of ACM MobiCom, pp. 189-199 (2001)
-
(2001)
Proc. of ACM MobiCom
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
11
-
-
26444574670
-
Tiny sec: A link layer security architecture for wireless sensor networks
-
Karlof, C., Sastry, N., Wagner, D.: Tiny Sec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. of ACM SensSys, pp. 162-175 (2004)
-
(2004)
Proc. of ACM SensSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
12
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Parno, B., Perrig, A., Gligor, V.D.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 49-63 (2005)
-
(2005)
Proc. of IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
13
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Proc. of IEEE IPSN, pp. 259-268 (2004)
-
(2004)
Proc. of IEEE IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
14
-
-
27544440245
-
INSENS: Intrusion-tolerant routing in wireless sensor networks
-
Dept. of Computer Science, University of Colorado at Boulder
-
Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks. Technical Report CU-CS-939-1002, Dept. of Computer Science, University of Colorado at Boulder (2002)
-
(2002)
Technical Report CU-CS-939-1002
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
15
-
-
18844362199
-
Routing on trust and isolating compromised sensors in location-aware sensor networks
-
Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks. In: Proc. of 1st International Conference on Embedded Networked Sensor Systems, pp. 324-325 (2003)
-
(2003)
Proc. of 1st International Conference on Embedded Networked Sensor Systems
, pp. 324-325
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
16
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 62-72 (2003) (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
17
-
-
0013043106
-
Highly resilient energy-efficient multipath routing in wireless sensor networks
-
Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. Computing and Communications Review (MC2R) 1, 11-25 (2002)
-
(2002)
Computing and Communications Review (MC2R)
, vol.1
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
18
-
-
35248846963
-
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
Deng, J., Han, R., Mishra, S.: A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In: Proc. of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN), pp. 349-364 (2003)
-
(2003)
Proc. of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN)
, pp. 349-364
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
2442529460
-
GRAdient broadcast: A robust data delivery protocol for large scale sensor networks
-
Ye, F., Zhong, G., Lu, S., Zhang, L.: GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks. ACM Wireless Networks, WINET (2005)
-
(2005)
ACM Wireless Networks, WINET
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
20
-
-
11244309425
-
JANUS: Towards robust and malicious resilient routing in hybrid wireless networks
-
Carbunar, B., Ioannidis, I., Nita-Rotaru, C.: JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks. In: Proc. of ACM Workshop on Wireless Security, WiSe (2004)
-
(2004)
Proc. of ACM Workshop on Wireless Security, WiSe
-
-
Carbunar, B.1
Ioannidis, I.2
Nita-Rotaru, C.3
-
21
-
-
34547527115
-
M2RC: Multiplicative-increase/additive-decrease multipath routing control for wireless sensor networks
-
Morcos, H., Matta, I., Bestavros, A.: M2RC: Multiplicative-Increase/ Additive-Decrease Multipath Routing Control for Wireless Sensor Networks. ACM SIGBED Review 2 (2005)
-
(2005)
ACM SIGBED Review
, vol.2
-
-
Morcos, H.1
Matta, I.2
Bestavros, A.3
-
22
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
Yang, H., Ye, F., Yuan, Y., Lu, S., Arbough, W.: Towards Resilient Security in Wireless Sensor Networks. In: Proc. of ACM MobiHoc, pp. 34-45 (2005) (Pubitemid 43037581)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
23
-
-
0002360279
-
Systems architecture directions for networked sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: Systems Architecture Directions for Networked Sensors. In: ACU ASPLOS IX (2000)
-
(2000)
ACU ASPLOS
, vol.9
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
24
-
-
77952308184
-
A dependable routing protocol in wireless sensor networks
-
Ssu, K.-F., Wu, T.-T., Huang, S.-K., Jiau, H.C.: A Dependable Routing Protocol in Wireless Sensor Networks. In: Proc. of ICWMC, pp. 1-6 (2006)
-
(2006)
Proc. of ICWMC
, pp. 1-6
-
-
Ssu, K.-F.1
Wu, T.-T.2
Huang, S.-K.3
Jiau, H.C.4
|