-
1
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Jan.-March
-
Raymond D.R, Midkiff S.F."Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses". IEEE Pervasive Computing, vol.7, no.1, pp. 74-81, Jan.-March 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
2
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep
-
Adrian Perrig, Robert Szewczyk,J. D. Tygar,Victor Wen,David E. Culler ."SPINS: Security Protocols for Sensor Networks". Wireless Networks, vol.8, no.5, pp.521-534, Sep 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
3
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
25-27 April
-
Luk M, Mezzour G Perrig A, Gligor V. "MiniSec: A Secure Sensor Network Communication Architecture". IPSN 2007, pp. 479-488, 25-27 April 2007.
-
(2007)
IPSN 2007
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
4
-
-
34548390509
-
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
-
August
-
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning. "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks". ACM Transactions on Sensor Networks, vol. 3, no. 3, pp.14/1-14/33, August 2007.
-
(2007)
ACM Transactions on Sensor Networks
, vol.3
, Issue.3
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
5
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
May
-
Kui Ren, Wenjing Lou, Yanchao Zhang. "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks". IEEE Transaction on mobile computing, vol. 7, no. 5, pp.585-598, May 2008.
-
(2008)
IEEE Transaction on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
6
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Jing Deng, Richard Han, Shivakant Mishra. "Limiting DoS attacks during multihop data delivery in wireless sensor networks". International Journal of Security and Networks, vol.1, nos.3/4, pp.167-176, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-176
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
7
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
8-12 March
-
Wander A.S, Gura N, Eberle H, Gupta V, Shantz S.C. "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks". PerCom 2005.Third IEEE International Conference, pp. 324 - 328, 8-12 March 2005.
-
(2005)
PerCom 2005.Third IEEE International Conference
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
8
-
-
51849124994
-
Implementing public-key infrastructure for sensor networks
-
Aug.
-
David J. Malan, Matt Welsh, Michael D. Smith. "Implementing public-key infrastructure for sensor networks". ACM Transactions on Sensor Networks, vol.4, no.4, pp.1-23, Aug.2008.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.4
, pp. 1-23
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
9
-
-
37849012001
-
Containing denialof-service attacks in broadcast authentication in sensor networks
-
Sep
-
th ACM MobiCom, pp.71-79, Sep 2007.
-
(2007)
th ACM MobiCom
, pp. 71-79
-
-
Wang, R.1
Du, W.2
Ning, P.3
|