-
1
-
-
33745639957
-
-
University of Colorado at Boulder, Tech. Rep., January, [Online]. Available: Accessed: October 10, 2009
-
C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: The need for secure systems," University of Colorado at Boulder, Tech. Rep., January, 2005, [Online]. Available: http://www.cs.colorado.edu/ department/publications/reports/docs/CUCS-990-05.pdf [Accessed: October 10, 2009].
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
2
-
-
80052561084
-
A forward and backward secure key management in wireless sensor networks for PCS/SCADA
-
Pisa, Italy, September, in press
-
st International ICST Conference on Sensor Systems and Software, Pisa, Italy, September 7-8, 2009, in press.
-
(2009)
st International ICST Conference on Sensor Systems and Software
-
-
Alzaid, H.1
Park, D.2
Nieto, J.G.3
Boyd, C.4
Foo, E.5
-
3
-
-
56749175324
-
Key management and secure software updates in wireless process control environments
-
V. D. Gligor, J.-P. Hubaux, and R. Poovendran, Eds. ACM, March 31-April 02
-
st ACM Conference on Wireless Network Security, WISEC'08, V. D. Gligor, J.-P. Hubaux, and R. Poovendran, Eds. ACM, March 31-April 02, 2008, pp. 100-108.
-
(2008)
st ACM Conference on Wireless Network Security, WISEC'08
, pp. 100-108
-
-
Nilsson, D.K.1
Roosta, T.2
Lindqvist, U.3
Valdes, A.4
-
4
-
-
17744384943
-
Key Management for SCADA
-
March, Accessed: October 10, 2009
-
C. L. Beaver, D. Gallup, W. D. NeuMann, and M. Torgerson, "Key management for SCADA," Sandia National Laboratories, Tech. Rep., March, 2002, [Online]. Available: www.sandia.gov/scada/documents/013252.pdf [Accessed: October 10, 2009].
-
(2002)
Sandia National Laboratories, Tech. Rep.
-
-
Beaver, C.L.1
Gallup, D.2
NeuMann, W.D.3
Torgerson, M.4
-
5
-
-
84872800478
-
SKMA: A key management architecture for SCADA systems
-
thAustralasian Information Security Workshop (Network Security) (AISW'06)
-
th Australasian Symposium on Grid Computing and e-Research (AusGrid'06) and the 4th Australasian Information Security Workshop (Network Security) (AISW'06), ser. CRPIT, R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo, Eds., vol. 54. Australian Computer Society, January, 2006, pp. 183-192.
-
(2006)
th Australasian Symposium on Grid Computing and e-Research (AusGrid'06)
, vol.54
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
6
-
-
0037377597
-
SCADA and IP: Is network convergence really here?
-
Mar/Apr, IEEE
-
R. McClanahan, "SCADA and IP: Is network convergence really here?" Industry Applications Magazine, IEEE, vol. 9, no. 2, pp. 29-36, Mar/Apr 2003.
-
(2003)
Industry Applications Magazine
, vol.9
, Issue.2
, pp. 29-36
-
-
McClanahan, R.1
-
8
-
-
38349039331
-
Forward-secure key evolution in wireless sensor networks
-
Springer, Ser. Lecture Notes in Computer Science, F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, Eds., December 8-10
-
th International Conference on Cryptology and Network Security, CANS'07, ser. Lecture Notes in Computer Science, F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, Eds., vol. 4856. Springer, December 8-10, 2007, pp. 102-120.
-
(2007)
th International Conference on Cryptology and Network Security, CANS'07
, vol.4856
, pp. 102-120
-
-
Klonowski, M.1
Kutylowski, M.2
Ren, M.3
Rybarczyk, K.4
-
9
-
-
33745850722
-
Forward secure communication in wireless sensor networks
-
Springer, Ser. Lecture Notes in Computer Science, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., April 18-21
-
rd International Conference on Security in Pervasive Computing, SPC'06, ser. Lecture Notes in Computer Science, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., vol. 3934. Springer, April 18-21, 2006, pp. 32-42.
-
(2006)
rd International Conference on Security in Pervasive Computing, SPC'06
, vol.3934
, pp. 32-42
-
-
Mauw, S.1
Van Vessem, I.2
Bos, B.3
-
10
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Computer Networks, vol. 38, no. 4, pp. 393-422, March, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
11
-
-
50249104172
-
-
Online. Available, Accessed: October 10, 2009
-
Crossbow Technology Inc., "Mica2 datasheet," 2006, [Online]. Available: http://www.xbow.com/Products/productdetails.aspx?sid=174 [Accessed: October 10, 2009.
-
(2006)
Mica2 Datasheet
-
-
-
12
-
-
0034445661
-
System architecture directions for networked sensors
-
Cambridge, MA, USA, November 12-15
-
th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'00, Cambridge, MA, USA, November 12-15, 2000, pp. 93-104.
-
(2000)
th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'00
, pp. 93-104
-
-
Hill, J.L.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
13
-
-
84893905141
-
A survey on network protocols for 864 wireless sensor networks
-
August 11-13
-
A. Ahmed, H. Shi, and Y. Shang, "A survey on network protocols for 864 wireless sensor networks," in Proceedings of the international conference on Information Technology: Research and Education, ITRE'03, August 11-13, 2003, pp. 301-305.
-
(2003)
Proceedings of the International Conference on Information Technology: Research and Education, ITRE'03
, pp. 301-305
-
-
Ahmed, A.1
Shi, H.2
Shang, Y.3
-
14
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
DOI 10.1109/TWC.2002.804190
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, October 2002. (Pubitemid 44934253)
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
15
-
-
40949096414
-
Measurement of energy costs of security in wireless sensor nodes
-
DOI 10.1109/ICCCN.2007.4317803, 4317803, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
-
th International Conference on Computer Communications and Networks, IEEE ICCCN'07, August 13-16, 2007, pp. 95-102. (Pubitemid 351403435)
-
(2007)
Proceedings - International Conference on Computer Communications and Networks, ICCCN
, pp. 95-102
-
-
Chang, C.-C.1
Muftic, S.2
Nagel, D.J.3
-
16
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
October 12-14
-
G. De Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in Proceedings of the 4th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, WIMOB'08. IEEE Computer Society, October 12-14, 2008, pp. 580-585.
-
(2008)
th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, WIMOB'08
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
17
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
October 30-November 1
-
R. Venugopalan, P. Ganesan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis," in Proceedings of the international conference on Compilers, architecture and synthesis for embedded systems, CASES'03, October 30-November, 12003, pp. 188-197.
-
(2003)
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, CASES'03
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
18
-
-
33646581008
-
Energy analysis of public key cryptography for wireless sensor networks
-
IEEE Computer Society, March
-
rd IEEE International Conference on Pervasive Computing and Communications, PerCom'05. IEEE Computer Society, March, 2005, pp. 324-328.
-
(2005)
rd IEEE International Conference on Pervasive Computing and Communications, PerCom'05
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
|