-
1
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
December
-
J. N. Al-karaki and A. E. Kamal. Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6):6-28, December 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
2
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
DOI 10.1016/j.comcom.2005.05.018, PII S0140366405002045
-
J. Deng, R. Han, and S. Mishra. Insens: Intrusion-tolerant routing in wireless sensor networks. Computer Communications In Dependable Wireless Sensor Networks, 29(2):216-230, January 2006. (Pubitemid 43060026)
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
3
-
-
0035789268
-
Highly-resilient, energy-ecient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-ecient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4):11-25, 2001.
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.4
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
4
-
-
0033877788
-
Energyefficient communication protocols for wireless microsensor networks
-
January
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energyefficient communication protocols for wireless microsensor networks. In Proc. 33rd IEEE Hawaii International Conference on System Sciences, volume vol.8, pages 4-7, January 2000.
-
(2000)
Proc. 33rd IEEE Hawaii International Conference on System Sciences
, vol.8
, pp. 4-7
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
5
-
-
52949131368
-
Nhrpa: A novel hierarchical routing protocol algorithm for wireless sensor networks
-
September
-
C. Hong-bing, Y. Geng, and H. Su-jun. Nhrpa: a novel hierarchical routing protocol algorithm for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 15(3):75-81, September 2008.
-
(2008)
The Journal of China Universities of Posts and Telecommunications
, vol.15
, Issue.3
, pp. 75-81
-
-
Hong-Bing, C.1
Geng, Y.2
Su-Jun, H.3
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
C. Karlof and D. Wagner. Secure routing in sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1:293-315, May 2003. (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
0345869098
-
Efficient Rabin-type Digital Signature Scheme
-
K. Kurosawa and W. Ogata. Efficient rabin-type digital signature scheme. Designs, Codes and Cryptography, 16(1):53-64, January 1999. (Pubitemid 129617273)
-
(1999)
Designs, Codes, and Cryptography
, vol.16
, Issue.1
, pp. 53-64
-
-
Kurosawa, K.1
Ogata, W.2
-
9
-
-
33746324120
-
An efficient N-to-1 multipath routing protocol in wireless sensor networks
-
DOI 10.1109/MAHSS.2005.1542857, 1542857, 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
-
Wenjing Lou. An efficient n-to-1 multipath routing protocol in wireless sensor networks. In In: Proc. 2nd IEEE International Conference MASS, pages 665-672, Washington D.C., November 2005. (Pubitemid 44612335)
-
(2005)
2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
, vol.2005
, pp. 665-672
-
-
Lou, W.1
-
10
-
-
34548042955
-
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.014, PII S0140366407001727
-
N. Nasser and Y. Chen. Seem: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications, 20(11-12):2401-2412, 2007. (Pubitemid 47285289)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2401-2412
-
-
Nasser, N.1
Chen, Y.2
-
11
-
-
34547913472
-
SecLEACH-On the security of clustered sensor networks
-
DOI 10.1016/j.sigpro.2007.05.016, PII S0165168407001892
-
L. B. Oliveira, A. Ferreira, M. A. Vilaa, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro. Secleach-on the security of clustered sensor networks. Signal Processing, 87(12):2882-2895, December 2007. (Pubitemid 47259185)
-
(2007)
Signal Processing
, vol.87
, Issue.12
, pp. 2882-2895
-
-
Oliveira, L.B.1
Ferreira, A.2
Vilaca, M.A.3
Wong, H.C.4
Bern, M.5
Dahab, R.6
Loureiro, A.A.F.7
-
12
-
-
77953852618
-
Secure sensor network routing: A clean-slate approach
-
Lisboa, Portugal, December. ACM
-
B. Parno, M. Luk, E. Gaustad, and A. Perrig. Secure sensor network routing: a clean-slate approach. In Proc. the 2006 ACM CoNEXT conference, pages 1-13, Lisboa, Portugal, December 2006. ACM.
-
(2006)
Proc. the 2006 ACM CoNEXT Conference
, pp. 1-13
-
-
Parno, B.1
Luk, M.2
Gaustad, E.3
Perrig, A.4
-
13
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
15
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
February
-
J. G. Steiner, G. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proc. the Usenix Winter Conference, Berkeley, pages 191-202, February 1988.
-
(1988)
Proc. the Usenix Winter Conference, Berkeley
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, G.2
Schiller, J.I.3
-
16
-
-
14344254253
-
A secure hierarchical model for sensor network
-
DOI 10.1145/974121.974123
-
M. Tubaishat, J. Yin, B. Panja, and S. Madria. A secure hierarchical model for sensor network. ACM SIGMOD Record, 33(1):7-13, March 2004. (Pubitemid 40290233)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 7-13
-
-
Tubaishat, M.1
Yin, J.2
Panja, B.3
Madria, S.4
-
17
-
-
28444435923
-
EECS: An energy efficient clustering scheme in wireless sensor networks 10a.2
-
Conference Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005
-
M. Ye, C. Li, G. Chen, and J. Wu. Eecs: An energy efficient clustering scheme in wireless sensor networks. In Proc. of the IEEE International Performance Computing and Communications Conference, pages 535- 540. IEEE Press, 2005. (Pubitemid 41729996)
-
(2005)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 535-540
-
-
Ye, M.1
Li, C.2
Chen, G.3
Wu, J.4
-
18
-
-
58049106676
-
A secure routing protocol for cluster-based wireless sensor networks using group key management
-
October
-
K. Zhang, C. Wang, and C. Wang. A secure routing protocol for cluster-based wireless sensor networks using group key management. In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08), pages 1-5, October 2008.
-
(2008)
Proc. 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08)
, pp. 1-5
-
-
Zhang, K.1
Wang, C.2
Wang, C.3
|