-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cyirci, E. (2002) ‘Wireless sensor networks: a survey’, Computer Networks, Vol. 38, No. 4, pp.393–422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cyirci, E.4
-
2
-
-
11144277843
-
Routing techniques in wireless sensor networks: a survey
-
Al-Karaki, J.N. and Kamal, A.E. (2004) ‘Routing techniques in wireless sensor networks: a survey’, IEEE Wireless Communications, Vol. 11, No. 6, pp.6–28.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
4
-
-
26844532138
-
End-to-end support for statistical quality of service in heterogeneous mobile ad-hoc networks
-
Al-Karaki, J.N. and Kamal, A.E. (2005) ‘End-to-end support for statistical quality of service in heterogeneous mobile ad-hoc networks’, Computer Communications, Vol. 28, No. 18, pp.2119–2132.
-
(2005)
Computer Communications
, vol.28
, Issue.18
, pp. 2119-2132
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
5
-
-
1642588232
-
The role of ad hoc networking in future wireless communications
-
Bangnan, X., Hischke, S. and Walke, B. (2003) ‘The role of ad hoc networking in future wireless communications’, International Conference on Communication Technology (ICCT 2003), Vol. 2, pp.1353–1358.
-
(2003)
International Conference on Communication Technology (ICCT 2003)
, vol.2
, pp. 1353-1358
-
-
Bangnan, X.1
Hischke, S.2
Walke, B.3
-
6
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
Binkley, J. and Trost, W. (2001) ‘Authenticated ad hoc routing at the link layer for mobile systems’, Wireless Networks, Vol. 7, No. 2, pp.139–145.
-
(2001)
Wireless Networks
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
Trost, W.2
-
7
-
-
24644507953
-
On the security of cluster-based communication protocols for wireless sensor networks
-
Ferreira, A.C., Vilaca, M.A., Oliveira, L.B., Habib, E., Wong, H.C. and Loureiro, A.A.F. (2005) ‘On the security of cluster-based communication protocols for wireless sensor networks’, Fourth IEEE International Conference on Networking (ICN’05), Lecture Notes in Computer Science, Vol. 3420, pp.449–458.
-
(2005)
Fourth IEEE International Conference on Networking (ICN’05), Lecture Notes in Computer Science
, vol.3420
, pp. 449-458
-
-
Ferreira, A.C.1
Vilaca, M.A.2
Oliveira, L.B.3
Habib, E.4
Wong, H.C.5
Loureiro, A.A.F.6
-
8
-
-
0035789268
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
Ganesan, D., Govindan, R., Shenker, S. and Estrin, D. (2001) ‘Highly-resilient, energy-efficient multipath routing in wireless sensor networks’, Mobile Computing and Communications Review, Vol. 4, No. 5.
-
(2001)
Mobile Computing and Communications Review
, vol.4
, Issue.5
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
11
-
-
0004118152
-
Ariadne: a secure on-demand routing protocol for ad hoc networks
-
Department of Computer Science, Rice University, December
-
Hu, Y-C., Perrig, A. and Johnson, D.B. (2001) ‘Ariadne: a secure on-demand routing protocol for ad hoc networks’, Technical Report TR01-383, Department of Computer Science, Rice University, December.
-
(2001)
Technical Report TR01-383
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
84961572484
-
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu, Y-C., Johnson, D.B. and Perrig, A. (2002) ‘SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks’, Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCKSA 2002), June, pp.3–13.
-
(2002)
Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCKSA 2002)
, vol.June
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
13
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Karlof, C. and Wagner, D. (2003) ‘Secure routing in wireless sensor networks: attacks and countermeasures’, Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Vol. 1, No. 23 pp.293–315.
-
(2003)
Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.23
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
14
-
-
0345755816
-
Adaptive security for multi-layer ad-hoc networks
-
Wiley Interscience Press
-
Kong, J., Luo, H., Xu, K., Gu, D.L., Gerla, M. and Lu, S. (2002) ‘Adaptive security for multi-layer ad-hoc networks’, Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press.
-
(2002)
Special Issue of Wireless Communications and Mobile Computing
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
16
-
-
85016596484
-
LiSP: a lightweight security protocol for wireless sensor networks
-
Park, T. and Shin, K.G. (2004) ‘LiSP: a lightweight security protocol for wireless sensor networks’, ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, pp.1–27.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 1-27
-
-
Park, T.1
Shin, K.G.2
-
17
-
-
12744268995
-
SPINS: security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J. (2001) ‘SPINS: security protocols for sensor networks’, Proceedings of Mobile Networking and Computing.
-
(2001)
Proceedings of Mobile Networking and Computing
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
18
-
-
3142739563
-
An architecture for key management in hierarchical mobile ad hoc networks
-
Rhee, K., Park, Y. and Tsudik, G. (2004) ‘An architecture for key management in hierarchical mobile ad hoc networks’, Journal of Communication and Networks, Vol. 6, No. 2, pp.156–162.
-
(2004)
Journal of Communication and Networks
, vol.6
, Issue.2
, pp. 156-162
-
-
Rhee, K.1
Park, Y.2
Tsudik, G.3
-
20
-
-
14344254253
-
A secure hierarchical model for sensor network
-
Tubaishat, M., Yin, J., Panja, B. and Madria, S. (2004) ‘A secure hierarchical model for sensor network’, SIGMOD Record 33, pp.7–13.
-
(2004)
SIGMOD Record 33
, pp. 7-13
-
-
Tubaishat, M.1
Yin, J.2
Panja, B.3
Madria, S.4
-
21
-
-
0006513010
-
Reliable group rekeying: design and performance analysis
-
Yang, Y., Li, X., Zhang, X. and Lam, S. (2001) ‘Reliable group rekeying: design and performance analysis’, Proceedings of ACM SIGCOMM’01.
-
(2001)
Proceedings of ACM SIGCOMM’01
-
-
Yang, Y.1
Li, X.2
Zhang, X.3
Lam, S.4
-
23
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L. and Haas, Z. (1999) ‘Securing ad hoc networks’, IEEE Network Magazine, Vol. 13, No. 6.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
24
-
-
84952965601
-
-
For the remainder of this paper, we assume that all nodes locations are fixed for the duration of their lifetime
-
For the remainder of this paper, we assume that all nodes locations are fixed for the duration of their lifetime.
-
-
-
-
25
-
-
84952965705
-
-
Although a NKS is used, an alternative is the prestorage of pair-wise node keys, where each node stores a separate key for communication with each of the other CH nodes in the network
-
Although a NKS is used, an alternative is the prestorage of pair-wise node keys, where each node stores a separate key for communication with each of the other CH nodes in the network.
-
-
-
-
26
-
-
84952957811
-
-
Although symmetric keys are used, asymmetric keys can also be used inside a cluster with minor modifications
-
Although symmetric keys are used, asymmetric keys can also be used inside a cluster with minor modifications.
-
-
-
|