-
1
-
-
0003417978
-
GloMoSim: a scalable network simulation environment
-
Department of Computer Sceince, UCLA
-
Bajaj, L., Takai, M., Ahuja, R., Tang, K., Bagrodia, R. and Gerla, M. (1999) ‘GloMoSim: a scalable network simulation environment’, Technical Report 990027, Department of Computer Sceince, UCLA.
-
(1999)
Technical Report 990027
-
-
Bajaj, L.1
Takai, M.2
Ahuja, R.3
Tang, K.4
Bagrodia, R.5
Gerla, M.6
-
3
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs, September
-
Carman, W.D., Kruus, S.P. and Matt, J.B. (2000) ‘Constraints and approaches for distributed sensor network security’, Technical Report 00-010, NAI Labs, September.
-
(2000)
Technical Report 00-010
-
-
Carman, W.D.1
Kruus, S.P.2
Matt, J.B.3
-
4
-
-
25844435733
-
PIKE: peer intermediaries for key establishment in sensor networks
-
Miami, March
-
Chan, H. and Perrig, A. (2005) ‘PIKE: peer intermediaries for key establishment in sensor networks’, IEEE INFOCOM 2005, Miami, March.
-
(2005)
IEEE INFOCOM 2005
-
-
Chan, H.1
Perrig, A.2
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, May
-
Chan, H., Perrig, A. and Song, D. (2003) ‘Random key predistribution schemes for sensor networks’, IEEE Symposium on Security and Privacy, Oakland, May.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hongkong, China, March
-
Du, W., Deng, J., Han, S.Y., Chen, S. and Varshney, K.P. (2004) ‘A key management scheme for wireless sensor networks using deployment knowledge’, IEEE INFOCOM 2004, Hongkong, China, March.
-
(2004)
IEEE INFOCOM 2004
-
-
Du, W.1
Deng, J.2
Han, S.Y.3
Chen, S.4
Varshney, K.P.5
-
7
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington, DC, October
-
Du, W., Deng, J., Han, S.Y. and Varshney, K.P. (2003) ‘A pairwise key pre-distribution scheme for wireless sensor networks’, The Tenth ACM Conference on Computer and Communication Security(CCS), Washington, DC, October.
-
(2003)
The Tenth ACM Conference on Computer and Communication Security(CCS)
-
-
Du, W.1
Deng, J.2
Han, S.Y.3
Varshney, K.P.4
-
8
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, November
-
Eschenauer, L. and Gligor, D.V. (2002) ‘A key-management scheme for distributed sensor networks’, The Ninth ACM Conference on Computer and Communication Security(CCS), Washington, DC, November.
-
(2002)
The Ninth ACM Conference on Computer and Communication Security(CCS)
-
-
Eschenauer, L.1
Gligor, D.V.2
-
9
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
Washington, DC, October
-
Huang, D., Mehta, M., Medhi, D. and Harn, L. (2004) ‘Location-aware key management scheme for wireless sensor networks’, 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04), Washington, DC, October.
-
(2004)
2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04)
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
10
-
-
14844335004
-
Revisiting random key pre-distribution schemes for wireless sensor networks
-
Washington, DC, October
-
Hwang, J. and Kim, Y. (2004) ‘Revisiting random key pre-distribution schemes for wireless sensor networks’, 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04), Washington, DC, October.
-
(2004)
2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04)
-
-
Hwang, J.1
Kim, Y.2
-
11
-
-
25844461930
-
Distributed algorithms for secure multipath routing
-
Miami, March
-
Lee, P., Misra, V. and Rubenstein, D. (2005) ‘Distributed algorithms for secure multipath routing’, IEEE INFOCOM 2005, Miami, March.
-
(2005)
IEEE INFOCOM 2005
-
-
Lee, P.1
Misra, V.2
Rubenstein, D.3
-
12
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
Helsinki, Finland, June
-
Lee, S. and Gerla, M. (2001) ‘Split multipath routing with maximally disjoint paths in ad hoc networks’, IEEE International Conference on Communications (ICC’01), Helsinki, Finland, June.
-
(2001)
IEEE International Conference on Communications (ICC’01)
-
-
Lee, S.1
Gerla, M.2
-
13
-
-
15344349168
-
Node-disjointness-based multipath routing for mobile ad hoc networks
-
Venezia, Italy, October
-
Li, X. and Cuthbert, L. (2004) ‘Node-disjointness-based multipath routing for mobile ad hoc networks’, PE-WASUN ’04: The First ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Venezia, Italy, October.
-
(2004)
PE-WASUN ’04: The First ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
-
Li, X.1
Cuthbert, L.2
-
14
-
-
33846621980
-
End-to-end pairwise key establishment using multi-path in wireless sensor network
-
St. Louis, MO, November
-
Ling, H. and Znati, T. (2005) ‘End-to-end pairwise key establishment using multi-path in wireless sensor network’, The 2005 IEEE Global Communications Conference(GLOBECOM 2005), St. Louis, MO, November.
-
(2005)
The 2005 IEEE Global Communications Conference(GLOBECOM 2005)
-
-
Ling, H.1
Znati, T.2
-
15
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, October
-
Liu, D. and Ning, P. (2003a) ‘Establishing pairwise keys in distributed sensor networks’, The Tenth ACM Conference on Computer and Communication Security(CCS), Washington, DC, October.
-
(2003)
The Tenth ACM Conference on Computer and Communication Security(CCS)
-
-
Liu, D.1
Ning, P.2
-
16
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
Fairfax, VA, October
-
Liu, D. and Ning, P. (2003b) ‘Location-based pairwise key establishments for static sensor networks’, The First ACM workshop on Security of Ad Hoc and sensor networks (SASN’03), Fairfax, VA, October.
-
(2003)
The First ACM workshop on Security of Ad Hoc and sensor networks (SASN’03)
-
-
Liu, D.1
Ning, P.2
-
17
-
-
33749033368
-
Group-based key pre-distribution in wireless sensor networks
-
Cologne, Germany, September
-
Liu, D., Ning, P. and Du, W. (2005) ‘Group-based key pre-distribution in wireless sensor networks’, ACM Workshop on Wireless Security (Wise’05), Cologne, Germany, September.
-
(2005)
ACM Workshop on Wireless Security (Wise’05)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
18
-
-
4444237581
-
SPREAD: enhancing data confidentiality in mobile ad hoc networks
-
Hongkong, China, March
-
Lou, W., Liu, W. and Fang, Y. (2004) ‘SPREAD: enhancing data confidentiality in mobile ad hoc networks’, IEEE INFOCOM 2004, Hongkong, China, March.
-
(2004)
IEEE INFOCOM 2004
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
19
-
-
0035425905
-
Performance of multipath routing for on-demand protocols in mobile ad hoc networks
-
Kluwer Academic Publisher.
-
Nasipuri, A. and Castaneda, R. (2001) ‘Performance of multipath routing for on-demand protocols in mobile ad hoc networks’, Mobile Networks and Applications, Kluwer Academic Publisher.
-
(2001)
Mobile Networks and Applications
-
-
Nasipuri, A.1
Castaneda, R.2
-
20
-
-
8344255723
-
Efficient algorithms for computing disjoint QoS paths
-
Hongkong, China, March
-
Orda, A. and Sprintson, A. (2004) ‘Efficient algorithms for computing disjoint QoS paths’, IEEE INFOCOM 2004, Hongkong, China, March.
-
(2004)
IEEE INFOCOM 2004
-
-
Orda, A.1
Sprintson, A.2
-
21
-
-
0242527360
-
Path set selection in mobile ad hoc networks
-
Lausanne, Switzerland, June
-
Papadimitratos, P., Haas, J.Z. and Sirer, E.G. (2002) ‘Path set selection in mobile ad hoc networks’, The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, June.
-
(2002)
The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Papadimitratos, P.1
Haas, J.Z.2
Sirer, E.G.3
-
22
-
-
84907567978
-
Improving the performance of query-based routing protocols through “Diversity Injection”
-
New Orleans, LA, September
-
Pearlman, R.M. and Haas, J.Z. (1999) ‘Improving the performance of query-based routing protocols through “Diversity Injection”’, IEEE Wireless Communications and Networking Conference 99, New Orleans, LA, September.
-
(1999)
IEEE Wireless Communications and Networking Conference 99
-
-
Pearlman, R.M.1
Haas, J.Z.2
-
23
-
-
34347349933
-
Ad hoc on-demand distance vector routing
-
New Orleans, LA, February
-
Perkins, E.C. and Royer, M.E. (1999) ‘Ad hoc on-demand distance vector routing’, IEEE WMCSA’99, New Orleans, LA, February.
-
(1999)
IEEE WMCSA’99
-
-
Perkins, E.C.1
Royer, M.E.2
-
24
-
-
4544301464
-
Random key assignment for secure wireless sensor networks
-
Fairfax, VA, October
-
Pietro, D.R., Mancini, V.L. and Mei, A. (2003) ‘Random key assignment for secure wireless sensor networks’, The First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), Fairfax, VA, October.
-
(2003)
The First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03)
-
-
Pietro, D.R.1
Mancini, V.L.2
Mei, A.3
-
25
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, A. (1979) ‘How to share a secret’, Communications of ACM, November, Vol. 22, No. 11, pp.612–613.
-
(1979)
Communications of ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
0001636850
-
Kerberos: an authentication service for computer networks
-
Dallas, TX, January
-
Steiner, J., Neuman, C. and Schiller, J. (1988) ‘Kerberos: an authentication service for computer networks’, Usenix Winter Conference, Dallas, TX, January.
-
(1988)
Usenix Winter Conference
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.3
-
27
-
-
24944442139
-
A robust group-based key management scheme for wireless sensor networks
-
New Orleans, LA, March
-
Yu, Z. and Guan, Y. (2005) ‘A robust group-based key management scheme for wireless sensor networks’, IEEE Wireless Communications and Networking Conference 2005, New Orleans, LA, March.
-
(2005)
IEEE Wireless Communications and Networking Conference 2005
-
-
Yu, Z.1
Guan, Y.2
-
28
-
-
24944483778
-
Securing sensor networks with location-based keys
-
New Orleans, LA, March
-
Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2005) ‘Securing sensor networks with location-based keys’, IEEE Wireless Communications and Networking Conference 2005, New Orleans, LA, March.
-
(2005)
IEEE Wireless Communications and Networking Conference 2005
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
29
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
-
Miami, March
-
Zhang, W. and Cao, G. (2005) ‘Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach’, IEEE INFOCOM 2005, Miami, March.
-
(2005)
IEEE INFOCOM 2005
-
-
Zhang, W.1
Cao, G.2
-
30
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
-
Atlanta, GA, November
-
Zhu, S., Xu, S., Setia, S. and Jajodia, S. (2003) ‘Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach’, The Eleventh IEEE International Conference on Networking Protocols, Atlanta, GA, November.
-
(2003)
The Eleventh IEEE International Conference on Networking Protocols
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
31
-
-
84952952255
-
-
Dividing a key into multiple fragments is only an example approach of splitting the key into fragments, the major property of the splitting method is that all key fragments are required in order to re-generate the secure key
-
Dividing a key into multiple fragments is only an example approach of splitting the key into fragments, the major property of the splitting method is that all key fragments are required in order to re-generate the secure key.
-
-
-
-
32
-
-
84952956662
-
-
During the analysis, we assume that the source and destination node will not be compromised, thus they are not counted in the total number of nodes n
-
During the analysis, we assume that the source and destination node will not be compromised, thus they are not counted in the total number of nodes n.
-
-
-
-
33
-
-
85088188003
-
-
s means there are s paths with the same hop count l in this set
-
s means there are s paths with the same hop count l in this set.
-
-
-
|