-
3
-
-
50249175122
-
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
-
Strasser, M., Popper, C.,Capkun, S.,Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: IEEE Symposium on Security and Privacy (2008)
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
-
4
-
-
78751484765
-
Efficient Uncoordinated FHSS Anti-Jamming Communication
-
Strasser, M., Popper, C., Capkun, S.: Efficient Uncoordinated FHSS Anti-Jamming Communication. In: ACM Mobihoc (2009)
-
(2009)
ACM Mobihoc
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
-
6
-
-
78650893161
-
Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference
-
Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference. In: ACM IPSN (2007)
-
(2007)
ACM IPSN
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
7
-
-
34548314598
-
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
-
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In: IEEE Infocom (2007)
-
(2007)
IEEE Infocom
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
8
-
-
33745966425
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: ACM Mobihoc (2005)
-
(2005)
ACM Mobihoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
11
-
-
78650922429
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM Mobihoc (2006)
-
(2006)
ACM Mobihoc
-
-
Brown, T.1
James, J.2
Sethi, A.3
-
12
-
-
70349111445
-
Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks
-
Lazos, L., Liu, S., Krunz, M.: Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. In: ACM WiSec (2009)
-
(2009)
ACM WiSec
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
14
-
-
56749150049
-
AntiJamming Timing Channels for Wireless Networks
-
Xu, W., Trappe, W., Zhang, Y.: AntiJamming Timing Channels for Wireless Networks. In: ACM WiSec (2008)
-
(2008)
ACM WiSec
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
17
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS (2003)
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
18
-
-
78650880763
-
LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks
-
Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: ACM TOSN (2006)
-
(2006)
ACM TOSN
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
19
-
-
32144459886
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys (2004)
-
(2004)
ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
20
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Advances in Cryptology
-
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proc. of CRYPTO, Advances in Cryptology (1993)
-
(1993)
Proc. of CRYPTO
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
21
-
-
34548307187
-
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
-
Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks. In: IEEE Infocom (2007)
-
(2007)
IEEE Infocom
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
23
-
-
84872950530
-
-
Tinyos homepage, http://webs.cs.berkeley.edu/tos/
-
Tinyos Homepage
-
-
-
24
-
-
78650892627
-
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks
-
Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. In: IEEE SECON (2007)
-
(2007)
IEEE SECON
-
-
Wood, A.1
Stankovic, J.2
Zhou, G.3
-
26
-
-
70549106758
-
Transient-based identification of wireless sensor nodes
-
Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: ACM/IEEE IPSN (2009)
-
(2009)
ACM/IEEE IPSN
-
-
Danev, B.1
Capkun, S.2
-
28
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy (2004)
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
29
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. Springer, Heidelberg
-
Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27-41. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3813
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
30
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing (2005)
-
(2005)
IEEE Transactions on Mobile Computing
-
-
Park, T.1
Shin, K.G.2
-
31
-
-
47249110641
-
Distributed softwarebased attestation for node compromise detection in sensor networks
-
Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed softwarebased attestation for node compromise detection in sensor networks. In: IEEE SRDS (2007)
-
(2007)
IEEE SRDS
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
|