-
1
-
-
39149134290
-
A role-based access in a hierarchical sensor network architecture to provide multilevel security
-
B. Panja, S.K. Madria, and B. Bhargava A role-based access in a hierarchical sensor network architecture to provide multilevel security Computer Communications 31 4 2008 793 806
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 793-806
-
-
Panja, B.1
Madria, S.K.2
Bhargava, B.3
-
2
-
-
0036688074
-
A survey on sensor networks
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci A survey on sensor networks IEEE Communications Magazine 40 8 2002 102 114
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler SPINS: security protocols for sensor networks Wireless Networks 8 2002 521 534
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
4
-
-
47849123313
-
An access control scheme in wireless sensor network
-
Y. Shen, J. Ma, Q. Pei, An access control scheme in wireless sensor network, in: Proc. 4th IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), Dalian, China, September, 2007, pp. 362-367.
-
(2007)
Proc. 4th IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), Dalian, China, September
, pp. 362-367
-
-
Shen, Y.1
Ma, J.2
Pei, Q.3
-
5
-
-
51249090096
-
Lightweight, distributed access control for wireless sensor networks supporting mobility
-
May
-
L. Maccari, L. Mainardi, M.A. Marchitti, N.R. Prasad, R. Fantacci, Lightweight, distributed access control for wireless sensor networks supporting mobility, in: Proc. IEEE International Conference on Communication (ICC 2008), vol. 7, May, 2008, pp. 1141-1145.
-
(2008)
Proc. IEEE International Conference on Communication (ICC 2008)
, vol.7
, pp. 1141-1145
-
-
MacCari, L.1
Mainardi, L.2
Marchitti, M.A.3
Prasad, N.R.4
Fantacci, R.5
-
6
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proc. Second ACM Conference on Embedded Networked Sensor Systems (SensSys'04), Baltimore, Maryland, November, 2004.
-
(2004)
Proc. Second ACM Conference on Embedded Networked Sensor Systems (SensSys'04), Baltimore, Maryland, November
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
7
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Y. Zhou, Y. Zhang, and Y. Fang Access control in wireless sensor networks Ad Hoc Networks 5 1 2007 3 13 (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
8
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
L. Eschenauer, V. Gligor, A key management scheme for distributed sensor networks, in: Proc. 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, 2002.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC
-
-
Eschenauer, L.1
Gligor, V.2
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proc. 2003 IEEE Symposium on Security and Privacy (S&P'03), May, 2003, p. 197.
-
(2003)
Proc. 2003 IEEE Symposium on Security and Privacy (S&P'03), May
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, October, 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, October
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
11
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, Proc. 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC
-
-
Liu, D.1
Ning, P.2
-
12
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
25 October
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruus, TinyPK: securing sensor networks with public key technology, in: Proc. 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN'04), Washington, DC, USA, 25 October, 2004.
-
(2004)
Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, USA
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
13
-
-
36348973964
-
Cluster-based reputation and trust for wireless sensor networks
-
G.V. Crosby, N. Pissinou, Cluster-based reputation and trust for wireless sensor networks, in: Proc. 4th Consumer Communications and Networking Conference (CCNC 2007), January, 2007, pp. 604-608.
-
(2007)
Proc. 4th Consumer Communications and Networking Conference (CCNC 2007), January
, pp. 604-608
-
-
Crosby, G.V.1
Pissinou, N.2
-
14
-
-
33846639615
-
An agent-based trust and reputation management scheme for wireless sensor networks
-
DOI 10.1109/GLOCOM.2005.1577970, 1577970, GLOBECOM'05: IEEE Global Telecommunications Conference, 2005
-
A. Boukerche, X. Li, An agent-based trust and reputation management scheme for wireless sensor networks, in: Proc. IEEE Global Telecommunications Conference, 28 November-2 December, 2005, pp. 1857-1861. (Pubitemid 46171445)
-
(2005)
GLOBECOM - IEEE Global Telecommunications Conference
, vol.3
, pp. 1857-1861
-
-
Boukerche, A.1
Li, X.2
-
15
-
-
38749146509
-
Analysis of a reputation system for mobile ad-hoc networks with liars
-
J. Mundinger, and J.-Y. Le Boudec Analysis of a reputation system for mobile ad-hoc networks with liars Performance Evaluation 65 3-4 2008 212 226
-
(2008)
Performance Evaluation
, vol.65
, Issue.34
, pp. 212-226
-
-
Mundinger, J.1
Le Boudec, J.-Y.2
-
16
-
-
50649085699
-
SCAF: A secure cluster-based architecture formation scheme for wireless sensor network
-
W.C. Yang, Y.Y. Zhang, K.B. Kim, J.H. Kim, M.-S. Park, SCAF: a secure cluster-based architecture formation scheme for wireless sensor network, in: Proc. 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC 2008), May, 2008, pp. 843-847.
-
(2008)
Proc. 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC 2008), May
, pp. 843-847
-
-
Yang, W.C.1
Zhang, Y.Y.2
Kim, K.B.3
Kim, J.H.4
Park, M.-S.5
-
18
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux Eviction of misbehaving and faulty nodes in vehicular networks IEEE Journal on Selected Areas in Communications 25 8 2007 1557 1568
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
19
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, J. Lacy, Decentralized trust management, in: Proc. 1996 IEEE Conference on Privacy and Security, Oakland, US, 1996, pp. 164-173.
-
(1996)
Proc. 1996 IEEE Conference on Privacy and Security, Oakland, US
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
21
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in: Proc. 12th International World Wide Web Conference, Budapest, Hungary, 2003, pp. 640-651.
-
(2003)
Proc. 12th International World Wide Web Conference, Budapest, Hungary
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
22
-
-
33745900048
-
A robust reputation system for P2P and mobile ad-hoc networks
-
S. Buchegger, J. Boudec, A robust reputation system for P2P and mobile ad-hoc networks, in: Proc. Second Workshop the Economics of Peer-to-Peer Systems, Cambridge, US, June, 2004.
-
(2004)
Proc. Second Workshop the Economics of Peer-to-Peer Systems, Cambridge, US, June
-
-
Buchegger, S.1
Boudec, J.2
-
23
-
-
33847008265
-
Enhanced reputation mechanism for mobile ad hoc networks
-
March
-
J. Liu, V. Issarny, Enhanced reputation mechanism for mobile ad hoc networks, in: Proc. Second International Conference on Trust Management, vol. 2995, March, 2004, pp. 48-62.
-
(2004)
Proc. Second International Conference on Trust Management
, vol.2995
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
-
24
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
K. Ren, T. Li, Z. Wan, F. Bao, R.H. Deng, and K. Kim Highly reliable trust establishment scheme in ad hoc networks Computer Networks 2004 687 699
-
(2004)
Computer Networks
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
25
-
-
11244333253
-
Trust evaluation in ad-hoc networks
-
G. Theodorakopoulos, J.S. Baras, Trust evaluation in ad-hoc networks, in: Proc. 2004 ACM Workshop on Wirel. Security, Philadelphia, USA, 2004, pp. 1-10.
-
(2004)
Proc. 2004 ACM Workshop on Wirel. Security, Philadelphia, USA
, pp. 1-10
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
26
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
September
-
D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs Technical Report, September, 2000.
-
(2000)
NAI Labs Technical Report
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
28
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerch, L. Xu, and K. EL-Khatib Trust-based security for wireless ad hoc and sensor networks Computer Communications 30 2007 2413 2427
-
(2007)
Computer Communications
, vol.30
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
29
-
-
67749116290
-
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks
-
S.K. Dhurandher, S. Misra, M.S. Obaidat, and N. Gupta An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks Security and Communication Networks 2 2 2009 215 224
-
(2009)
Security and Communication Networks
, vol.2
, Issue.2
, pp. 215-224
-
-
Dhurandher, S.K.1
Misra, S.2
Obaidat, M.S.3
Gupta, N.4
-
30
-
-
44349137568
-
A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis
-
R. Chandrasekar, M.S. Obaidat, S. Misra, and F. Peña-Mora A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis Simulation: Transactions of the Society for Modeling and Simulation International 84 2/3 2008 131 146
-
(2008)
Simulation: Transactions of the Society for Modeling and Simulation International
, vol.84
, Issue.2-3
, pp. 131-146
-
-
Chandrasekar, R.1
Obaidat, M.S.2
Misra, S.3
Peña-Mora, F.4
-
31
-
-
50249085943
-
REEP: A data-centric, energy-efficient and reliable routing protocol for wireless sensor networks
-
F. Zabin, S. Misra, I. Woungang, H. Rashvand, N.-W. Ma, and M.A. Ali REEP: a data-centric, energy-efficient and reliable routing protocol for wireless sensor networks IET Communications, UK 2 8 2008 995 1008
-
(2008)
IET Communications, UK
, vol.2
, Issue.8
, pp. 995-1008
-
-
Zabin, F.1
Misra, S.2
Woungang, I.3
Rashvand, H.4
Ma, N.-W.5
Ali, M.A.6
-
32
-
-
70449111292
-
A fuzzy logic-based energy efficient packet loss preventive routing protocol
-
Istanbul, Turkey, July 13-16
-
S. Misra, S. Roy, M.S. Obaidat, D. Mohanta, A fuzzy logic-based energy efficient packet loss preventive routing protocol, in: Proc. 2009 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2009), Istanbul, Turkey, July 13-16, 2009, pp. 185-192.
-
(2009)
Proc. 2009 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2009)
, pp. 185-192
-
-
Misra, S.1
Roy, S.2
Obaidat, M.S.3
Mohanta, D.4
-
33
-
-
67349160443
-
LACAS: Learning automata-based congestion avoidance scheme for healthcare wireless sensor networks
-
S. Misra, V. Tiwari, and M.S. Obaidat LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks IEEE Journal on Selected Areas in Communications 27 4 2009 466 479
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 466-479
-
-
Misra, S.1
Tiwari, V.2
Obaidat, M.S.3
-
34
-
-
70349898362
-
Ant colony optimization-based congestion control in ad-hoc wireless sensor networks
-
Rabat, Morocco, May 10-13
-
S.K. Dhurandher, S. Misra, H. Mittal, A. Aggarwal, I. Woungang, Ant colony optimization-based congestion control in ad-hoc wireless sensor networks, in: Proc. 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, Morocco, May 10-13, 2009.
-
(2009)
Proc. 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09)
-
-
Dhurandher, S.K.1
Misra, S.2
Mittal, H.3
Aggarwal, A.4
Woungang, I.5
-
35
-
-
78751641700
-
Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
-
doi:10.1002/wcm.839
-
S. Misra, S. Goswami, G.P. Pathak, N. Shah, Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks, Wireless Communications and Mobile Computing Wiley, 2010, doi:10.1002/wcm.839.
-
(2010)
Wireless Communications and Mobile Computing Wiley
-
-
Misra, S.1
Goswami, S.2
Pathak, G.P.3
Shah, N.4
-
36
-
-
77954886398
-
-
doi:10.1007/s11235-009-9254-x
-
S. Misra, S. Goswami, G.P. Pathak, N. Shah, I. Woungang, Geographic server distribution model for key revocation, Telecommunication Systems, 2010, doi:10.1007/s11235-009-9254-x.
-
(2010)
Geographic Server Distribution Model for Key Revocation, Telecommunication Systems
-
-
Misra, S.1
Goswami, S.2
Pathak, G.P.3
Shah, N.4
Woungang, I.5
-
37
-
-
72849137975
-
Chinese remainder theorem-based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing
-
October 12-14
-
S. Sarkar, B. Kisku, S. Misra and M.S. Obaidat, Chinese remainder theorem-based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing, in: Proc. 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'09), Marrakech, Morocco, October 12-14, 2009, pp. 258-262.
-
(2009)
Proc. 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'09), Marrakech, Morocco
, pp. 258-262
-
-
Sarkar, S.1
Kisku, B.2
Misra, S.3
Obaidat, M.S.4
-
38
-
-
70349909985
-
Dividing PKI in strongest availability zones
-
May 10-13
-
S. Misra, S. Goswami, G.P. Pathak, I. Woungang, Dividing PKI in strongest availability zones, in: Proc. 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, Morocco, May 10-13, 2009.
-
(2009)
Proc. 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, Morocco
-
-
Misra, S.1
Goswami, S.2
Pathak, G.P.3
Woungang, I.4
-
39
-
-
67749133733
-
LAID: A learning automata-based scheme for intrusion detection in wireless sensor networks
-
S. Misra, K.I. Abraham, M.S. Obaidat, and P.V. Krishna LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks Security and Communication Networks 2 2 2009 105 115
-
(2009)
Security and Communication Networks
, vol.2
, Issue.2
, pp. 105-115
-
-
Misra, S.1
Abraham, K.I.2
Obaidat, M.S.3
Krishna, P.V.4
-
40
-
-
53849148915
-
FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
-
R. Chandrasekar, S. Misra, and M.S. Obaidat FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Computer Communications 31 16 2008 3855 3869
-
(2008)
Computer Communications
, vol.31
, Issue.16
, pp. 3855-3869
-
-
Chandrasekar, R.1
Misra, S.2
Obaidat, M.S.3
-
41
-
-
74549125798
-
Attack graph generation with infused fuzzy clustering
-
Milan, Italy, July 7-10, 2009
-
S. Misra, A. Bagchi, R. Bhatt, S. Ghosh, M.S. Obaidat, Attack graph generation with infused fuzzy clustering, in: Proc. International Conference on Security and Cryptology, Part of the International Joint Conference on e-Business and Telecommunications (ICETE 2009), Milan, Italy, July 7-10, 2009, pp. 92-98.
-
(2009)
Proc. International Conference on Security and Cryptology, Part of the International Joint Conference on E-Business and Telecommunications (ICETE 2009)
, pp. 92-98
-
-
Misra, S.1
Bagchi, A.2
Bhatt, R.3
Ghosh, S.4
Obaidat, M.S.5
-
42
-
-
65549145947
-
E2-SCAN: An extended credit strategy-based energy-efficient security scheme in wireless ad hoc networks
-
S.K. Dhurandher, S. Misra, S. Ahlawat, N. Gupta, and N. Gupta E2-SCAN: an extended credit strategy-based energy-efficient security scheme in wireless ad hoc networks IET Communications, UK 2009 808 819
-
(2009)
IET Communications, UK
, pp. 808-819
-
-
Dhurandher, S.K.1
Misra, S.2
Ahlawat, S.3
Gupta, N.4
Gupta, N.5
-
43
-
-
75949128923
-
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
-
S. Misra, S.K. Dhurandher, A. Rayankula, and D. Agrawal Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks Computers and Electrical Engineering 36 2 2010 367 382
-
(2010)
Computers and Electrical Engineering
, vol.36
, Issue.2
, pp. 367-382
-
-
Misra, S.1
Dhurandher, S.K.2
Rayankula, A.3
Agrawal, D.4
-
44
-
-
78751649026
-
-
Network Simulator (NS-2). Available from
-
Network Simulator (NS-2). Available from: < http://www.isi.edu/nsnam/ ns />.
-
-
-
-
45
-
-
78751648977
-
-
Mannasim Package for NS-2. Available from
-
Mannasim Package for NS-2. Available from: < http://www.mannasim.dcc. ufmg.br />.
-
-
-
|