-
1
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Xiao Y., Rayi V. K., Sun B., Du X., Hu F., Galloway M., A survey of key management schemes in wireless sensor networks Computer Communications 2007 30 11-12 2314 2341 (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
2
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
Oliveira L., Wong H., Loureiro A., Dahab R., On the design of secure protocols for hierarchical sensor networks International Journal of Security and Networks 2007 2 3 216 227
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3
, pp. 216-227
-
-
Oliveira, L.1
Wong, H.2
Loureiro, A.3
Dahab, R.4
-
3
-
-
79251628004
-
-
IEEE Std.802.15.4 for Information TechnologyTelecommunication and Information Exchage between SystemsLocal and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks, IEEE, 2006
-
IEEE Std.802.15.4 for Information TechnologyTelecommunication and Information Exchage between SystemsLocal and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks, IEEE, 2006
-
-
-
-
5
-
-
18144417809
-
Energy and QoS aware routing in wireless sensor networks
-
DOI 10.1007/s10586-005-6183-7
-
Akkaya K., Younis M. F., Energy and QoS aware routing in wireless sensor networks Cluster Computing 2005 8 2-3 179 188 (Pubitemid 40608603)
-
(2005)
Cluster Computing
, vol.8
, Issue.2-3
, pp. 179-188
-
-
Akkaya, K.1
Younis, M.F.2
-
6
-
-
39049111000
-
Efficient load-balanced clustering algorithms for wireless sensor networks
-
Low C. P., Fang C., Ng J. M., Ang Y. H., Efficient load-balanced clustering algorithms for wireless sensor networks Computer Communications 2008 31 4 750 759
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 750-759
-
-
Low, C.P.1
Fang, C.2
Ng, J.M.3
Ang, Y.H.4
-
8
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Younis O., Fahmy S., HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks IEEE Transactions on Mobile Computing 2004 3 4 366 379
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
9
-
-
34347371238
-
Optimal distributed detection in clustered wireless sensor networks
-
Tian Q., Coyle E. J., Optimal distributed detection in clustered wireless sensor networks IEEE Transactions on Signal Processing 2007 55 7 3892 3904
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.7
, pp. 3892-3904
-
-
Tian, Q.1
Coyle, E.J.2
-
10
-
-
49249123418
-
Multipath key establishment for wireless sensor networks using just-enough redundancy transmission
-
Deng J., Han Y. S., Multipath key establishment for wireless sensor networks using just-enough redundancy transmission IEEE Transactions on Dependable and Secure Computing 2008 5 3 177 190
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.3
, pp. 177-190
-
-
Deng, J.1
Han, Y.S.2
-
12
-
-
39749159073
-
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
-
Lu K., Qian Y., Guizani M., Chen H.-H., A framework for a distributed key management scheme in heterogeneous wireless sensor networks IEEE Transactions on Wireless Communications 2008 7 2 639 647
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.2
, pp. 639-647
-
-
Lu, K.1
Qian, Y.2
Guizani, M.3
Chen, H.-H.4
-
13
-
-
37849028668
-
A random perturbationbased scheme for pairwise key establishment in sensor networks
-
ACM
-
Zhang W., Tran M., Zhu S., Cao G., Kranakis E., Belding E. M., Modiano E., A random perturbationbased scheme for pairwise key establishment in sensor networks Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc '07) 2007 ACM 90 99
-
(2007)
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc '07)
, pp. 90-99
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
Kranakis, E.5
Belding, E.M.6
Modiano, E.7
-
15
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
Du W., Deng J., Han Y. S., Varshney P. K., Katz J., Khalili A., A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security 2005 8 2 228 258 (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
17
-
-
63149164405
-
Key management for wireless sensor networks using trusted neighbors
-
IEEE Computer Society
-
Xue Y., Jrgensen H., Azarderakhsh R., Reyhani-Masoleh A., Xu C.-Z., Guo M., Key management for wireless sensor networks using trusted neighbors 2 Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC '08) 2008 IEEE Computer Society 228 233
-
(2008)
Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC '08)
, vol.2
, pp. 228-233
-
-
Xue, Y.1
Jrgensen, H.2
Azarderakhsh, R.3
Reyhani-Masoleh, A.4
Xu, C.-Z.5
Guo, M.6
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 1978 21 2 120 126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
24
-
-
49949100301
-
Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks
-
Springer
-
Szczechowiak P., Oliveira L., Scott M., Collier M., Dahab R., Nanoecc: testing the limits of elliptic curve cryptography in sensor networks Proceedings of European Conference on Wireless Sensor Networks (EWSN '08) 2008 Springer 305 320
-
(2008)
Proceedings of European Conference on Wireless Sensor Networks (EWSN '08)
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
25
-
-
17444400469
-
Energy-efficient broadcasting in all-wireless networks
-
agalj M., Hubaux J.-P., Enz C. C., Energy-efficient broadcasting in all-wireless networks Wireless Networks 2005 11 1-2 177 188
-
(2005)
Wireless Networks
, vol.11
, Issue.12
, pp. 177-188
-
-
Agalj, M.1
Hubaux, J.-P.2
Enz, C.C.3
-
27
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
Du X., Xiao Y., Guizani M., Chen H.-H., An effective key management scheme for heterogeneous sensor networks Ad Hoc Networks 2007 5 1 24 34 (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
28
-
-
45849089959
-
Scalable and efficient key management for heterogeneous sensor networks
-
Kausar F., Hussain S., Yang L. T., Masood A., Scalable and efficient key management for heterogeneous sensor networks Journal of Supercomputing 2008 45 1 44 65
-
(2008)
Journal of Supercomputing
, vol.45
, Issue.1
, pp. 44-65
-
-
Kausar, F.1
Hussain, S.2
Yang, L.T.3
Masood, A.4
-
29
-
-
63149098881
-
A key management scheme for cluster based wireless sensor networks
-
Azarderakhsh R., Reyhani-Masoleh A., Abid Z.-E., Xu C.-Z., Guo M., A key management scheme for cluster based wireless sensor networks Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC '08) 2008 222 227
-
(2008)
Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC '08)
, pp. 222-227
-
-
Azarderakhsh, R.1
Reyhani-Masoleh, A.2
Abid, Z.-E.3
Xu, C.-Z.4
Guo, M.5
-
31
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
Traynor P., Kumar R., Choi H., Cao G., Zhu S., La Porta T., Efficient hybrid security mechanisms for heterogeneous sensor networks IEEE Transactions on Mobile Computing 2007 6 6 663 676
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 663-676
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
32
-
-
39349088351
-
An efficient public-key-based heterogeneous sensor network key distribution scheme
-
DOI 10.1109/GLOCOM.2007.191, 4411101, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
Brown J., Du X., Nygard K., An efficient public-key-based heterogeneous sensor network key distribution scheme Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) November 2007 991 995 (Pubitemid 351259179)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 991-995
-
-
Brown, J.1
Du, X.2
Nygard, K.3
-
34
-
-
70350230005
-
Multi-user broadcast authentication in wireless sensor networks
-
Ren K., Yu S., Lou W., Zhang Y., Multi-user broadcast authentication in wireless sensor networks IEEE Transactions on Vehicular Technology 2009 58 8 4554 4564
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.8
, pp. 4554-4564
-
-
Ren, K.1
Yu, S.2
Lou, W.3
Zhang, Y.4
-
35
-
-
34249756853
-
Balancing minimum spanning trees and shortest-path trees
-
Khuller S., Raghavachari B., Young N., Balancing minimum spanning trees and shortest-path trees Algorithmica 1995 14 4 305 321
-
(1995)
Algorithmica
, vol.14
, Issue.4
, pp. 305-321
-
-
Khuller, S.1
Raghavachari, B.2
Young, N.3
-
36
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
IEEE
-
Du W., Deng J., Han Y., Chen S., Varshney P., A key management scheme for wireless sensor networks using deployment knowledge 4 Proceedings of 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04) 2004 IEEE 586 597
-
(2004)
Proceedings of 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)
, vol.4
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
37
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
ARTICLE NO. 1
-
Ning P., Liu A., Du W., Mitigating DoS attacks against broadcast authentication in wireless sensor networks ACM Transactions on Sensor Networks 2008 4 1, article no. 1 1 35
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
38
-
-
21844480681
-
Link-level measurements from an 802.11b mesh network
-
September usa
-
Aguayo D., Bicket J., Biswas S., Judd G., Morris R., Link-level measurements from an 802.11b mesh network Proceedings of the Conference on Computer Communications (ACM SIGCOMM '04) September 2004 usa 121 131
-
(2004)
Proceedings of the Conference on Computer Communications (ACM SIGCOMM '04)
, pp. 121-131
-
-
Aguayo, D.1
Bicket, J.2
Biswas, S.3
Judd, G.4
Morris, R.5
-
40
-
-
43949130441
-
Contention-free MAC protocols for asynchronous wireless sensor networks
-
Busch C., Magdon-Ismail M., Sivrikaya F., Yener B., Contention-free MAC protocols for asynchronous wireless sensor networks Distributed Computing 2008 21 1 23 42
-
(2008)
Distributed Computing
, vol.21
, Issue.1
, pp. 23-42
-
-
Busch, C.1
Magdon-Ismail, M.2
Sivrikaya, F.3
Yener, B.4
-
43
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
ACM
-
Woo A., Tong T., Culler D. E., Akyildiz I. F., Estrin D., Culler D. E., Srivastava M. B., Taming the underlying challenges of reliable multihop routing in sensor networks Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (Sensys '03) 2003 ACM 14 27
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (Sensys '03)
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.E.3
Akyildiz, I.F.4
Estrin, D.5
Culler, D.E.6
Srivastava, M.B.7
-
44
-
-
13844250146
-
-
I. Scalable Network Technologies
-
I. Scalable Network Technologies, QualNet Simulator. http://www.scalable- networks.com/products/qualnet
-
QualNet Simulator
-
-
-
45
-
-
84908985308
-
-
M. Wireless Sensor Networks
-
M. Wireless Sensor Networks, Crossbow. http://www.xbow.com/Products
-
Crossbow
-
-
|