-
1
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
Jun.
-
T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol.3, no.2, pp. 273-289, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
3
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Santa Barbara, CA
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc. 29th Int. Cryptology Conf. (CRYPTO), Santa Barbara, CA, 1993, pp. 110-125.
-
(1993)
Proc. 29th Int. Cryptology Conf. (CRYPTO)
, pp. 110-125
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Miami, FL
-
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Miami, FL, 2005, pp. 524-535.
-
(2005)
Proc. 24th IEEE Conf. Computer Communications (INFOCOM)
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Security and Privacy (S&P)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Apr.
-
S. A. Çamtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," IEEE/ACM Trans. Netw., vol.15, no.2, pp. 346-358, Apr. 2007.
-
(2007)
IEEE/ACM Trans. Netw.
, vol.15
, Issue.2
, pp. 346-358
-
-
Çamtepe, S.A.1
Yener, B.2
-
7
-
-
42449162962
-
Expander graph based key distribution mechanisms in wireless sensor networks
-
Istanbul, Turkey
-
S. A. Çamtepe, B. Yener, and M. Yung, "Expander graph based key distribution mechanisms in wireless sensor networks," in Proc. IEEE Int. Conf. Communications (ICC), Istanbul, Turkey, 2006, pp. 2262-2267.
-
(2006)
Proc. IEEE Int. Conf. Communications (ICC)
, pp. 2262-2267
-
-
Çamtepe, S.A.1
Yener, B.2
Yung, M.3
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong, China
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004.
-
(2004)
Proc. 24th IEEE Conf. Computer Communications (INFOCOM)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
3042783638
-
A pairwise key pre-distriubtion scheme for wireless sensor networks
-
Washington, DC
-
W. Du, J. Deng, Y. S. Han, and P. Varshney, "A pairwise key pre-distriubtion scheme for wireless sensor networks," in Proc. Annu. ACM Computer and Communications Security (CCS), Washington, DC, 2003, pp. 42-51.
-
(2003)
Proc. Annu. ACM Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
10
-
-
33745969132
-
Defending against path-based dos attacks in wireless sensor networks
-
DOI 10.1145/1102219.1102235, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "Defending against path-based DoS attacks in wireless sensor networks," in Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, VA, 2005, pp. 89-96. (Pubitemid 44059935)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. Annual ACM Computer and Communications Security (CCS), Washington, DC, 2002, pp. 41-47.
-
(2002)
Proc. Annual ACM Computer and Communications Security (CCS)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
13
-
-
38149062124
-
Security in wireless sensor networks
-
Jan.
-
V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, "Security in wireless sensor networks," Wireless Commun. Mobile Comput., vol.8, no.1, pp. 1-24, Jan. 2008.
-
(2008)
Wireless Commun. Mobile Comput.
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.C.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
14
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
Washington, DC
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware key management scheme for wireless sensor networks," in Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, DC, 2004, pp. 29-42.
-
(2004)
Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
15
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
Jan.
-
D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. IEEE, vol.96, no.1, pp. 112-130, Jan. 2008.
-
(2008)
Proc. IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.N.3
Zourntos, T.4
-
17
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. Annu. ACM Computer and Communications Security (CCS), Washington, DC, 2003, pp. 52-61.
-
(2003)
Proc. Annu. ACM Computer and Communications Security (CCS)
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
18
-
-
42149172778
-
Group-based key predistribution for wireless sensor networks
-
Mar.
-
D. Liu, P. Ning, and W. Du, "Group-based key predistribution for wireless sensor networks," ACM Trans. Sensor Netw., vol.4, no.2, pp. 11:1-11:30, Mar. 2008.
-
(2008)
ACM Trans. Sensor Netw.
, vol.4
, Issue.2
, pp. 111-1130
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
19
-
-
40049091352
-
On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
-
Mar.
-
J. Lee and D. R. Stinson, "On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs," ACM Trans. Inf. Syst. Security, vol.11, no.2, pp. 5:1-5:35, Mar. 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.11
, Issue.2
, pp. 51-535
-
-
Lee, J.1
Stinson, D.R.2
-
22
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
Berkeley, CA, Apr.
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. Third Int. Symp. Information Processing in Sensor Networks (IPSN), Berkeley, CA, Apr. 2004, pp. 259-268.
-
(2004)
Proc. Third Int. Symp. Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
23
-
-
12444300139
-
Efficient and resilient key discovery based on pseudo-random key pre-deployment
-
Santa Fe, NM
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Efficient and resilient key discovery based on pseudo-random key pre-deployment," in Proc. Int. Parallel and Distributed Processing Symp. (IPDPS)-Workshop 12, Santa Fe, NM, 2004.
-
(2004)
Proc. Int. Parallel and Distributed Processing Symp. (IPDPS)-Workshop
, pp. 12
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, Jul.
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tyger, "SPINS: Security protocols for sensor networks," in Proc. Seventh Annu. Int. Conf. Mobile Computing and Networks (ACM Mobicom), Rome, Italy, Jul. 2001.
-
(2001)
Proc. Seventh Annu. Int. Conf. Mobile Computing and Networks (ACM Mobicom)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tyger, D.5
-
25
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle, "Secure communications over insecure channels," Commun. ACM, vol.21, no.4, pp. 294-299, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
26
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
Barcelona, Catalunya, Spain
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Barcelona, Catalunya, Spain, 2006, pp. 1-12.
-
(2006)
Proc. 24th IEEE Conf. Computer Communications (INFOCOM)
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
27
-
-
51249173817
-
Randomized rounding: A technique for provably good algorithms and algorithmic proofs
-
P. Raghavan and C. D. Tompson, "Randomized rounding: A technique for provably good algorithms and algorithmic proofs," Combinatorica, vol.7, no.4, pp. 365-374, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 365-374
-
-
Raghavan, P.1
Tompson, C.D.2
-
29
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
2nd Quarter
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tutorials, vol.8, no.2, pp. 2-23, 2006, 2nd Quarter.
-
(2006)
IEEE Commun. Surveys Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
30
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. D.Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol.35, no.10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
31
-
-
46849086756
-
R-MAC: An energy-efficient MAC protocol for underwater sensor networks
-
Chicago, IL
-
P. Xie and J.-H. Cui, "R-MAC: An energy-efficient MAC protocol for underwater sensor networks," in Proc. Int. Conf. Wireless Algorithms, Systems, and Applications (WASA), Chicago, IL, 2007.
-
(2007)
Proc. Int. Conf. Wireless Algorithms, Systems, and Applications (WASA)
-
-
Xie, P.1
Cui, J.-H.2
-
32
-
-
57349180418
-
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks
-
Hong Kong, China (Poster Session)
-
C.-M. Yu, T.-Y. Chi, C.-S. Lu, and S.-Y. Kuo, "A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Hong Kong, China, 2008, pp. 449-450, (Poster Session).
-
(2008)
Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 449-450
-
-
Yu, C.-M.1
Chi, T.-Y.2
Lu, C.-S.3
Kuo, S.-Y.4
-
33
-
-
51649097218
-
A key management scheme using deployment knowledge for wireless sensor networks
-
Oct.
-
Z. Yu and Y. Guan, "A key management scheme using deployment knowledge for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.19, no.10, pp. 1411-1425, Oct. 2008.
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, vol.19
, Issue.10
, pp. 1411-1425
-
-
Yu, Z.1
Guan, Y.2
-
34
-
-
33646921841
-
Location-aware combinatorial key management scheme for clustered sensor networks
-
Aug.
-
M. F. Younis, K. Ghumman, and M. Eltoweissy, "Location-aware combinatorial key management scheme for clustered sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.17, no.8, pp. 865-882, Aug. 2006.
-
(2006)
IEEE Trans. Parallel Distrib. Syst.
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.F.1
Ghumman, K.2
Eltoweissy, M.3
-
35
-
-
70449562077
-
A simple non-interactive pairwise key establishment scheme in sensor networks
-
Rome, Italy
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "A simple non-interactive pairwise key establishment scheme in sensor networks," in Proc. IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Rome, Italy, 2009, pp. 1-9.
-
(2009)
Proc. IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
, pp. 1-9
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
36
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Hong Kong, China
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004, pp. 2446-2457.
-
(2004)
Proc. 24th IEEE Conf. Computer Communications (INFOCOM)
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
37
-
-
18844411823
-
Understanding packet delivery performance in dense wireless sensor networks
-
Los Angeles, CA
-
J. Zhao and R. Govindan, "Understanding packet delivery performance in dense wireless sensor networks," in Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, 2003, pp. 1-13.
-
(2003)
Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys)
, pp. 1-13
-
-
Zhao, J.1
Govindan, R.2
-
38
-
-
84942436231
-
Computing aggregates for monitoring wireless sensor networks
-
Anchorage, AK
-
J. Zhao, R. Govindan, and D. Estrin, "Computing aggregates for monitoring wireless sensor networks," in Proc. IEEE Int. Workshop on Sensor Network Protocols and Applications, Anchorage, AK, 2003.
-
(2003)
Proc. IEEE Int. Workshop on Sensor Network Protocols and Applications
-
-
Zhao, J.1
Govindan, R.2
Estrin, D.3
-
39
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. Annu. ACMComputer and Communications Security (CCS),Washington, DC, 2003, pp. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
40
-
-
37849028668
-
A random perturbationbased scheme for pairwise key establishment in sensor networks
-
Montreal, QC, Candada, Sep. 9-14
-
W. Zhang, M. Tran, S. Zhu, and G. Cao, "A random perturbationbased scheme for pairwise key establishment in sensor networks," in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, QC, Candada, Sep. 9-14, 2007.
-
(2007)
Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
|