-
1
-
-
84926294459
-
Routing security in sensor network: Hello flood attack and defense
-
M. A. Hamid, M. Mamun-Or-Rashid, and C. S. Hong, "Routing security in sensor network: Hello flood attack and defense," in Proceedings of 1st International Conference on Next-Generation Wireless Systems, January 2006, pp. 52-56.
-
Proceedings of 1st International Conference on Next-Generation Wireless Systems, January 2006
, pp. 52-56
-
-
Hamid, M.A.1
Mamun-Or-Rashid, M.2
Hong, C.S.3
-
2
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Washington, DC, USA: IEEE Computer Society, May
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, May 2005, pp. 49-63.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
3
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis and defenses," in Proceeding of Information Processing in Sensor Networks, April 2004, pp. 259-268.
-
Proceeding of Information Processing in Sensor Networks, April 2004
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
4
-
-
51249093755
-
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
-
Washington, DC, USA: IEEE Computer Society, April
-
H. Sangwon, N. Peng, L. An, and D. Wenliang, "Seluge: Secure and dos-resistant code dissemination in wireless sensor networks," in Proceedings of the 7th International conference on information Processing in Sensor Networks. Washington, DC, USA: IEEE Computer Society, April 2008, pp. 44-456.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks
, pp. 44-456
-
-
Sangwon, H.1
Peng, N.2
An, L.3
Wenliang, D.4
-
5
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Springer Berlin / Heidelberg, July
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, "Intrusion detection of sinkhole attacks in wireless sensor networks," in Proceedings of International Workshop on Algorithmic Aspects of Wireless Sensor Networks. Springer Berlin / Heidelberg, July 2007, pp. 150-161.
-
(2007)
Proceedings of International Workshop on Algorithmic Aspects of Wireless Sensor Networks
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
6
-
-
33748968113
-
Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks
-
New York, NY, USA: ACM
-
P. Traynor, R. Kumar, H. B. Saad, G. Cao, and T. L. Porta, "Liger: implementing efficient hybrid security mechanisms for heterogeneous sensor networks," in Proceedings of the 4th international conference on Mobile systems, applications and services. New York, NY, USA: ACM, 2006, pp. 15-27.
-
(2006)
Proceedings of the 4th International Conference on Mobile Systems, Applications and Services
, pp. 15-27
-
-
Traynor, P.1
Kumar, R.2
Saad, H.B.3
Cao, G.4
Porta, T.L.5
-
7
-
-
26444574670
-
Tinysec: Link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: Link layer security architecture for wireless sensor networks," in Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
-
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
8
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
February
-
A. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology, vol. 2, February 2006, pp. 1043-1048.
-
(2006)
Proceedings of the 8th International Conference Advanced Communication Technology
, vol.2
, pp. 1043-1048
-
-
Pathan, A.1
Lee, H.-W.2
Hong, C.S.3
-
9
-
-
35448965082
-
Two tier secure routing protocol for heterogeneous sensor networks
-
September
-
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two tier secure routing protocol for heterogeneous sensor networks," IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3395-3401, September 2007.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
10
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
New York, NY, USA: ACM
-
A. Francillon and C. Castelluccia, "Code injection attacks on harvard-architecture devices," in Proceedings of the 15th ACM conference on Computer and Communications Security. New York, NY, USA: ACM, 2008, pp. 15-26.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
11
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
New York, NY, USA: ACM
-
J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2004, pp. 81-94.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
12
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
13
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
14
-
-
36349021963
-
Security for wireless sensor networks
-
S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, "Security for wireless sensor networks," Wireless sensor networks, pp. 253-275, 2004.
-
(2004)
Wireless Sensor Networks
, pp. 253-275
-
-
Avancha, S.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
16
-
-
34547477757
-
Sigf: A family of configurable, secure routing protocols for wireless sensor networks
-
New York, NY, USA: ACM Press
-
A. D. Wood, L. Fang, J. A. Stankovic, and T. He, "Sigf: a family of configurable, secure routing protocols for wireless sensor networks," in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2006, pp. 35-48.
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 35-48
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
18
-
-
33745969132
-
Defending against path-based dos attacks in wireless sensor networks
-
NewYork, NY, USA: ACM
-
J. Deng, R. Han, and S. Mishra, "Defending against path-based dos attacks in wireless sensor networks," in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. NewYork, NY, USA: ACM, 2005, pp. 89-96.
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
11244309139
-
Visualization of wormholes in sensor networks
-
New York, NY, USA: ACM
-
W. Wang and B. Bhargava, "Visualization of wormholes in sensor networks," in Proceedings of the 3rd ACM workshop on Wireless security. New York, NY, USA: ACM, 2004, pp. 51-60.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 51-60
-
-
Wang, W.1
Bhargava, B.2
-
20
-
-
38049060339
-
Deploying a heterogeneous wireless sensor network
-
L. Yu, N. Wang, W. Zhang, and C. Zheng, "Deploying a heterogeneous wireless sensor network," in Proceeding of Wireless Communications, Networking and Mobile Computing, September 2007, pp. 2588-2591.
-
Proceeding of Wireless Communications, Networking and Mobile Computing, September 2007
, pp. 2588-2591
-
-
Yu, L.1
Wang, N.2
Zhang, W.3
Zheng, C.4
-
21
-
-
28444457336
-
Designing efficient routing protocol for heterogeneous sensor networks
-
X. Du and F. Lin, "Designing efficient routing protocol for heterogeneous sensor networks," in Proceeding of IEEE International Performance, Computing, and Communications Conference, April 2005, pp. 51-58.
-
Proceeding of IEEE International Performance, Computing, and Communications Conference, April 2005
, pp. 51-58
-
-
Du, X.1
Lin, F.2
-
22
-
-
51749099404
-
Exploiting heterogeneity for sensor network security
-
J. Mache, C.-Y. Wan, and M. Yarvis, "Exploiting heterogeneity for sensor network security," in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.
-
Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008
, pp. 591-593
-
-
Mache, J.1
Wan, C.-Y.2
Yarvis, M.3
-
23
-
-
45849089959
-
Scalable and efficient key management for heterogeneous sensor networks
-
F. Kausar, S. Hussain, L. T. Yang, and A. Masood, "Scalable and efficient key management for heterogeneous sensor networks," The Journal of Supercomputing, vol. 45, no. 1, pp. 44-65, 2008.
-
(2008)
The Journal of Supercomputing
, vol.45
, Issue.1
, pp. 44-65
-
-
Kausar, F.1
Hussain, S.2
Yang, L.T.3
Masood, A.4
-
24
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers
-
New York, NY, USA: ACM
-
C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers," in Proceedings of the Conference on Communications Architectures, Protocols and Applications. New York, NY, USA: ACM, 1994, pp. 234-244.
-
(1994)
Proceedings of the Conference on Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
25
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
June
-
E. Ngai, J. Liu, and M. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in Proceedings of the IEEE International Conference on Communications, vol. 8, June 2006, pp. 3383-3389.
-
(2006)
Proceedings of the IEEE International Conference on Communications
, vol.8
, pp. 3383-3389
-
-
Ngai, E.1
Liu, J.2
Lyu, M.3
-
26
-
-
48649095029
-
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
-
H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," in Proceedings of the 2007 IEEE Region 10 Conference, November 2007, pp. 1-4.
-
Proceedings of the 2007 IEEE Region 10 Conference, November 2007
, pp. 1-4
-
-
Sun, H.-M.1
Chen, C.-M.2
Hsiao, Y.-C.3
-
27
-
-
38049173337
-
Wodem: Wormhole attack defense mechanism in wireless sensor networks
-
J.-H. L. Ji-Hoon Yun, Il-Hwan Kim and S.-W. Seo, "Wodem: Wormhole attack defense mechanism in wireless sensor networks," Ubiquitous Convergence Technology, vol. 4412/2007, pp. 200-209, 2007.
-
(2007)
Ubiquitous Convergence Technology
, vol.4412
, Issue.2007
, pp. 200-209
-
-
Ji-Hoon Yun, J.-H.L.1
Kim, I.-H.2
Seo, S.-W.3
-
28
-
-
33747378828
-
Jamming attack detection and counter-measures in wireless sensor network using ant system
-
M. Rajani and O. L. Ann, "Jamming attack detection and counter-measures in wireless sensor network using ant system," in Proceedings of SPIE, the International Society for Optical Engineering, vol. 6248, 2004, pp. 62 480G.1-62 480G.12.
-
(2004)
Proceedings of SPIE, the International Society for Optical Engineering
, vol.6248
-
-
Rajani, M.1
Ann, O.L.2
|