-
1
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
Apr.
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
2
-
-
5444275208
-
Wireless sensor and actor networks: Research challenges
-
Oct.
-
I.F. Akyildiz and I.H. Kasimoglu, "Wireless Sensor and Actor Networks: Research Challenges," Ad Hoc Networks, vol. 2, no. 4, pp. 351-367, Oct. 2004.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.4
, pp. 351-367
-
-
Akyildiz, I.F.1
Kasimoglu, I.H.2
-
3
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-116, Aug. 2002.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.8
, pp. 102-116
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
DOI 10.1109/JPROC.2003.814918, Sensor Networks and Applications
-
C.-Y. Chong and S.P. Kumar, "Sensor Networks: Evolution, Opportunities, and C (Pubitemid 40890834)
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.-Y.1
Kumar, S.P.2
-
5
-
-
84996492266
-
Habitat monitoring: Application driver for wireless communications technology
-
Apr.
-
A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, "Habitat Monitoring: Application Driver for Wireless Communications Technology," Proc. ACM SIGCOMM Workshop Data Comm. in Latin Am. and the Caribbean, Apr. 2001.
-
(2001)
Proc. ACM SIGCOMM Workshop Data Comm. in Latin Am. and the Caribbean
-
-
Cerpa, A.1
Elson, J.2
Estrin, D.3
Girod, L.4
Hamilton, M.5
Zhao, J.6
-
6
-
-
0002058575
-
Connecting the physical world with pervasive networks
-
DOI 10.1109/MPRV.2002.993145
-
D. Estrin, D. Culler, and K. Pister, "Connecting the Physical World with Pervasive Networks," IEEE Pervasive Computing, vol. 1, no. 1, pp. 59-69, Jan.-Mar. 2002. (Pubitemid 44939997)
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.1
, pp. 59-69
-
-
Estrin, D.1
Culler, D.2
Pister, K.3
Sukhatme, G.4
-
7
-
-
85032779250
-
Secure sensor information management and mining
-
May
-
B. Thuraisingham, "Secure Sensor Information Management and Mining," IEEE Signal Processing Magazine, vol. 21, no. 3, pp. 14-19, May 2004.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.3
, pp. 14-19
-
-
Thuraisingham, B.1
-
8
-
-
33845511795
-
RISE Co-S: High performance sensor storage and co-processing architecture
-
A. Banerjee, A. Mitra, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, "RISE Co-S: High Performance Sensor Storage and Co-Processing Architecture," Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks (SECON '05), 2005.
-
(2005)
Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks (SECON '05)
-
-
Banerjee, A.1
Mitra, A.2
Najjar, W.3
Zeinalipour-Yazti, D.4
Kalogeraki, V.5
Gunopulos, D.6
-
9
-
-
84876154089
-
High-performance low power sensor platforms featuring gigabyte scale storage
-
A. Mitra, A. Banerjee, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, "High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage," Proc. Ann IEEE/ACM Int'l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous '05), 2005.
-
(2005)
Proc. Ann IEEE/ACM Int'l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous '05)
-
-
Mitra, A.1
Banerjee, A.2
Najjar, W.3
Zeinalipour-Yazti, D.4
Kalogeraki, V.5
Gunopulos, D.6
-
10
-
-
34547487841
-
Capsule: An energy-optimized object storage system for memory-constrained sensor devices
-
Nov.
-
G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, "Capsule: An Energy-Optimized Object Storage System for Memory-Constrained Sensor Devices," Proc. ACM Conf. Embedded Networked Sensor Systems (Sensys), Nov. 2006.
-
(2006)
Proc. ACM Conf. Embedded Networked Sensor Systems (Sensys)
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
11
-
-
33646524284
-
Towards in-situ data storage in sensor databases
-
D. Zeinalipour-Yazti, V. Kalogeraki, D. Gunopulos, A. Mitra, A. Banerjee, and W. Najjar, "Towards In-Situ Data Storage in Sensor Databases," Proc. 10th Panhellenic Conf. Informatics (PCI '05), pp. 36-46, 2005.
-
(2005)
Proc. 10th Panhellenic Conf. Informatics (PCI '05)
, pp. 36-46
-
-
Zeinalipour-Yazti, D.1
Kalogeraki, V.2
Gunopulos, D.3
Mitra, A.4
Banerjee, A.5
Najjar, W.6
-
12
-
-
0036983290
-
GHT: A geographic hash table for data-centric storage
-
Sept.
-
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: A Geographic Hash Table for Data-Centric Storage," Proc. Int'l Workshop Wireless Sensor Networks and Applications (WSNA '02), Sept. 2002.
-
(2002)
Proc. Int'l Workshop Wireless Sensor Networks and Applications (WSNA '02)
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
13
-
-
18844435123
-
GEM:Graph embedding for routing and data-centric storage in sensor networks without geographic information
-
Nov.
-
J. Newsome and D. Song, "GEM:Graph Embedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information," Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys '03), Nov. 2003.
-
(2003)
Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys '03)
-
-
Newsome, J.1
Song, D.2
-
14
-
-
34249316910
-
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007. (Pubitemid 46819205)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.7
, pp. 1073-1089
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
15
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
Mar.
-
R.D. Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," Proc. Sixth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '08), Mar. 2008.
-
(2008)
Proc. Sixth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '08)
-
-
Pietro, R.D.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
16
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity assurance
-
Apr.
-
Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
17
-
-
84943529186
-
LHAP: A lightweight hopby-hop authentication protocol for ad-hoc networks
-
May
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A Lightweight Hopby- Hop Authentication Protocol for Ad-Hoc Networks," Proc. IEEE Int'l Conf. Distributed Computing Systems Workshops (ICDCSW '03), May 2003.
-
(2003)
Proc. IEEE Int'l Conf. Distributed Computing Systems Workshops (ICDCSW '03)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
18
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Mar.
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, Mar. 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
20
-
-
67649494461
-
PDCS: Security and privacy support for data-centric sensor networks
-
Aug.
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.8
, pp. 1023-1038
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
21
-
-
67650465277
-
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
-
R.D. Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1463-1475, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1463-1475
-
-
Pietro, R.D.1
Mancini, L.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
22
-
-
51849099823
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Nov.
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 4, Nov. 2008.
-
(2008)
ACM Trans. Sensor Networks
, vol.4
, Issue.4
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
24
-
-
51849154205
-
Comparing symmetric- key and public-key based schemes in sensor networks: A case study for user access control
-
June
-
H. Wang, B. Sheng, C.C. Tan, and Q. Li, "Comparing Symmetric- Key and Public-Key Based Schemes in Sensor Networks: A Case Study for User Access Control," Proc. IEEE Int'l Symp. Distributed Computing Systems (ICDCS), June 2008.
-
(2008)
Proc. IEEE Int'l Symp. Distributed Computing Systems (ICDCS)
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
25
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
Mar.-Apr.
-
C.C. Tan, H. Wang, S. Zhong, and Q. Li, "Body Sensor Network Security: An Identity-Based Cryptography Approach," Proc. ACM Conf. Wireless Network Security (WiSec), Mar.-Apr. 2008.
-
(2008)
Proc. ACM Conf. Wireless Network Security (WiSec)
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
26
-
-
35648972648
-
Securing distributed data storage and retrieval in sensor networks
-
DOI 10.1016/j.pmcj.2007.06.002, PII S1574119207000454, PerCom 2007
-
N. Subramanian, C. Yang, and W. Zhang, "Securing Distributed Data Storage and Retrieval in Sensor Networks," Pervasive and Mobile Computing, (Special Issue for PerCom 2007), vol. 3, no. 6, pp. 659-676, Nov. 2007. (Pubitemid 350030640)
-
(2007)
Pervasive and Mobile Computing
, vol.3
, Issue.6
, pp. 659-676
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
27
-
-
84919387740
-
Attacking cryptographic schemes based on 'perturbation polynomials'
-
M. Albrecht, C. Gentry, S. Halevi, and J. Katz, "Attacking Cryptographic Schemes Based on 'Perturbation Polynomials'," Cryptology ePrint Archive Report 2009/098, 2009.
-
(2009)
Cryptology EPrint Archive Report 2009/098
-
-
Albrecht, M.1
Gentry, C.2
Halevi, S.3
Katz, J.4
-
29
-
-
58049200643
-
Collusion- resistant group key management using attribute-based encryption
-
L. Cheung, J. Cooley, R. Khazan, and C. Newport, "Collusion- Resistant Group Key Management Using Attribute-Based Encryption," Cryptology ePrint Archive Report 2007/161, 2007.
-
(2007)
Cryptology EPrint Archive Report 2007/161
-
-
Cheung, L.1
Cooley, J.2
Khazan, R.3
Newport, C.4
-
32
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Aug.
-
B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM Mobicom, Aug. 2000.
-
(2000)
Proc. ACM Mobicom
-
-
Karp, B.1
Kung, H.2
-
33
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security (CCS), 2006.
-
(2006)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
37
-
-
0000636954
-
The versaKey framework: Versatile group key management
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey Framework: Versatile Group Key Management," IEEE J. Selected Areas in Comm., vol. 17, no. 9, pp. 1614-1631, Sept. 1999. (Pubitemid 129587918)
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
41
-
-
24144459865
-
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
May
-
J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '05), May 2005.
-
(2005)
Proc. IEEE Int'l Conf. Comm. (ICC '05)
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
42
-
-
76949090588
-
A survey on the encryption of convergecast-traffic with in-network processing
-
Jan.-Mar.
-
S. Peter, D. Westhoff, and C. Castelluccia, "A Survey on the Encryption of Convergecast-Traffic with In-Network Processing," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20- 34, Jan.-Mar. 2010.
-
(2010)
IEEE Trans. Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 20-34
-
-
Peter, S.1
Westhoff, D.2
Castelluccia, C.3
-
45
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
Apr.
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
49
-
-
79952070209
-
-
PBC Library
-
PBC Library, http://crypto.stanford.edu/pbc/times.html, 2010.
-
(2010)
-
-
-
50
-
-
79952068156
-
-
TinyECC Library
-
TinyECC Library, http://discovery.csc.ncsu.edu/software/ TinyECC/index.html, 2010.
-
(2010)
-
-
-
52
-
-
79952070559
-
-
TelosB mote platform
-
TelosB mote platform, http://www.xbow.com/Products/ Product-pdf-files/ Wireless-pdf/TelosB-Datasheet.pdf, 2009.
-
(2009)
-
-
|