-
1
-
-
33847130828
-
-
Mobihoc Urbana-Champaign
-
Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005, May). Toward resilient security in wireless sensor networks. Urbana-Champaign, IL: Mobihoc.
-
(2005)
Toward Resilient Security in Wireless Sensor Networks
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
2
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route filtering of injected false data in sensor networks. INFOCOM.
-
(2004)
INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
4
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
May Oakland, CA
-
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of the IEEE symposium on security and privacy, Oakland, CA.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
5
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang W. Liu W. Lou Y. Fang 2006 Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks) 24 2 247 260 (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
8
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May Berkeley, California
-
Chan, H., Perrig, A., & Song, D. (2003, May). Random key predistribution schemes for sensor networks. In IEEE symposium on Security and Privacy (pp. 197-213). Berkeley, California.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
24944474308
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., & Deng, J. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. ACM CCS.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
-
11
-
-
33645692509
-
Improving key pre-distribution with deployment knowledge in static sensor networks
-
D. Liu P. Ning 2005 Improving key pre-distribution with deployment knowledge in static sensor networks ACM Transaction on Sensor Networks 20 1 32
-
(2005)
ACM Transaction on Sensor Networks
, vol.20
, pp. 1-32
-
-
Liu, D.1
Ning, P.2
-
12
-
-
77954087010
-
-
INFOCOM Barcelona, Spain
-
Traynor, P., Choi, H., Cao, G., Zhu, S., & T. L. Porta. (2006, April). Establishing pair-wise keys in heterogeneous sensor networks. Barcelona, Spain: INFOCOM.
-
(2006)
Establishing Pair-wise Keys in Heterogeneous Sensor Networks
-
-
Traynor, P.1
Choi, H.2
Cao, G.3
Zhu, S.4
Porta, T.L.5
-
13
-
-
73349100274
-
-
Mobisys Uppsala, Sweden
-
Traynor, P., Kumar, R., Saad, H. B., Cao, G., & Porta, T. L. (2006, June). Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. Uppsala, Sweden: Mobisys.
-
(2006)
Liger: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
-
-
Traynor, P.1
Kumar, R.2
Saad, H.B.3
Cao, G.4
Porta, T.L.5
-
14
-
-
77954088134
-
-
WCNC'05 New Orleans
-
Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2005, March). Securing sensor networks with location-based keys. New Orleans, Louisiana: WCNC'05.
-
(2005)
Securing Sensor Networks with Location-based Keys
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
15
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Washington, DC, USA: IEEE Computer Society
-
Kong, J., Zerfos, P., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for mobile ad hoc networks. In Proceedings of the ninth international conference on network protocols (p. 251). Washington, DC, USA: IEEE Computer Society.
-
(2001)
Proceedings of the Ninth International Conference on Network Protocols
, pp. 251
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
17
-
-
0033906585
-
Max-min D-cluster formation in wireless ad hoc networks
-
Amis, A. D., Prakash, R., Vuong, T. H. P., & Huynh, D. T. (2000). Max-min D-cluster formation in wireless ad hoc networks. INFOCOM.
-
(2000)
INFOCOM
-
-
Amis, A.D.1
Prakash, R.2
Vuong, T.H.P.3
Huynh, D.T.4
-
18
-
-
0041472588
-
An energy-efficient hierarchical clustering algorithm for wireless sensor networks
-
Bandyopadhyay, S., & Coyle, E. (2003). An energy-efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM.
-
(2003)
INFOCOM
-
-
Bandyopadhyay, S.1
Coyle, E.2
-
19
-
-
0035009259
-
A clustering scheme for hierarchical control in multi-hop wireless networks
-
Bannerjee, S., & Khuller, S. (2001). A clustering scheme for hierarchical control in multi-hop wireless networks. INFOCOM.
-
(2001)
INFOCOM
-
-
Bannerjee, S.1
Khuller, S.2
-
20
-
-
77954082905
-
Distributed clustering algorithm for ad-hoc networks
-
Basagni, S. (1999). Distributed clustering algorithm for ad-hoc networks. I-SPAN.
-
(1999)
I-SPAN
-
-
Basagni, S.1
-
21
-
-
0012797660
-
CA: A weighted clustering algorithm for mobile ad hoc networks
-
Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing.
-
(2002)
Cluster Computing
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
22
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
DOI 10.1109/TWC.2002.804190
-
W. R. Heinzelman A. Chandrakasan H. Baladrishnan 2002 An application-specific protocol architecture for wireless microsensor networks IEEE Transaction on Wireless Communication 1 4 660 670 10.1109/TWC.2002.804190 (Pubitemid 44934253)
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
23
-
-
4544285741
-
Distributed clustering in ad-hoc sensor networks
-
Younis, O. & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks. INFOCOM.
-
(2004)
INFOCOM
-
-
Younis, O.1
Fahmy, S.2
-
24
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks. MOBICOM.
-
(2000)
MOBICOM
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
25
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless neworks
-
Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless neworks. MOBICOM.
-
(2000)
MOBICOM
-
-
Karp, B.1
Kung, H.T.2
-
26
-
-
77954089294
-
-
Ferreira, A. C., Vilaa, M. A., Oliveira, L. B., Wong, H. C., & Loureiro, A. A. (2005). Networking-ICN (pp. 449-458).
-
(2005)
Networking-ICN
, pp. 449-458
-
-
Ferreira, A.C.1
Vilaa, M.A.2
Oliveira, L.B.3
Wong, H.C.4
Loureiro, A.A.5
-
27
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis and defenses. IPSN.
-
(2004)
IPSN
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
29
-
-
0018545449
-
How to share a secret
-
DOI 10.1145/359168.359176
-
A. Shamir 1979 How to share a secret. Commun. ACM (1979) 22 11 612 613 0414.94021 10.1145/359168.359176 549252 (Pubitemid 10431338)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
51849154205
-
Comparing symmetric-key and public-key based schemes in sensor networks: A case study for user access control
-
(2008, June) Beijing, China
-
Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008, June). Comparing symmetric-key and public-key based schemes in sensor networks: A case study for user access control. In Proceedings of ICDCS, Beijing, China.
-
Proceedings of ICDCS
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
32
-
-
41549167232
-
A framework for identifying compromised nodes in wireless sensor networks
-
DOI 10.1145/1341731.1341733
-
Q. Zhang T. Yu P. Ning 2008 A framework for identifying compromised nodes in wireless sensor networks ACM Trans. Inf. Syst. Secur 11 3 1 37 05669865 10.1145/1341731.1341733 (Pubitemid 351462726)
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.3
, pp. 12
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
-
33
-
-
33746088063
-
-
DCOSS San Francisco
-
Zhang, Y., Yang, Y., Jin, L., & Li, W. (2006). Locating compromised sensor nodes through incremental hashing authentication. San Francisco, CA: DCOSS.
-
(2006)
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
-
-
Zhang, Y.1
Yang, Y.2
Jin, L.3
Li, W.4
-
34
-
-
13244263673
-
-
Crossbow Technology INC
-
Crossbow Technology INC. Wireless sensor networks. http://www.xbow.com/ Products/Wireless-Sensor-Networks.htm.
-
Wireless Sensor Networks
-
-
-
35
-
-
46849114424
-
-
Tiny OS. (2006). Tinyos 1.1.10. http://www.tinyos.net.
-
(2006)
Tinyos 1.1.10
-
-
-
37
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
(2004, October) Santa Clara, CA
-
Malan, D. J., Welsh, M., & Smith, M. D. (2004, October). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In The first IEEE international conference on sensor and ad hoc communications and networks, Santa Clara, CA.
-
The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
38
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors (Short Paper)
-
(2006, December) Raleigh, NC
-
Wang, H., & Li, Q. (2006, December). Efficient implementation of public key cryptosystems on mote sensors (Short Paper). In International conference on information and communication security (ICICS). LNCS 4307 (pp. 519-528). Raleigh, NC.
-
International Conference on Information and Communication Security (ICICS). LNCS 4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
|