-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P '05), 2005, pp. 49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
4
-
-
33745855808
-
Tampering with motes: Real-world physical attacks on wireless sensor networks
-
DOI 10.1007/11734666-9, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings
-
A. Becher, Z. Benenson, and M. Dornseif, "Tampering with motes: Realworld physical attacks on wireless sensor networks," in Proc. Third Int. Conf. Security Pervasive Computing (SPC '06), 2006, pp. 104-118. (Pubitemid 44029561)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3934
, pp. 104-118
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
5
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.225, 4215807, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in Proc. IEEE INFOCOM, May 2007, pp. 1937-1945. (Pubitemid 47334425)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P '03), May 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Security and Privacy (S&P '03)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03), 2003, pp. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
8
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," in Proc. Second ACM Conf. Embedded Networked Sensor Systems (SenSys '04), 2004, pp. 162-175. (Pubitemid 41563357)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in Proc. ACM MobiHoc, 2007, pp. 80-89.
-
(2007)
Proc. ACM MobiHoc
, pp. 80-89
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
10
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
Dec.
-
B. Zhu, V. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient distributed detection of node replication attacks in sensor networks," in Proc. 23rd Ann. Computer Security Applications Conference (ACSAC '07), Dec. 2007, pp. 257-267.
-
(2007)
Proc. 23rd Ann. Computer Security Applications Conference (ACSAC '07)
, pp. 257-267
-
-
Zhu, B.1
Addada, V.2
Setia, S.3
Jajodia, S.4
Roy, S.5
-
11
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
DOI 10.1109/TSMCC.2007.905824
-
R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. Kandemir, "On the detection of clones in sensor networks using random key predistribution," IEEE Trans. Syst., Man, Cybern. C, vol. 37, no. 6, pp. 1246-1258, Nov. 2007. (Pubitemid 350130716)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
12
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
Sept.
-
H. Choi, S. Zhu, and T. F. La Porta, "SET: Detecting node clones in sensor networks," in Proc. Third Int. Conf. Security and Privacy in Communications Networks and the Workshops (SecureComm '07), Sept. 2007, pp. 341-350.
-
(2007)
Proc. Third Int. Conf. Security and Privacy in Communications Networks and the Workshops (SecureComm '07)
, pp. 341-350
-
-
Choi, H.1
Zhu, S.2
La Porta, T.F.3
-
13
-
-
51849154670
-
Realtime detection of clone attacks in wireless sensor networks
-
June
-
K. Xing, F. Liu, X. Cheng, and D. H.-C. Du, "Realtime detection of clone attacks in wireless sensor networks," in Proc. 28th Int. Conf. Distributed Computing Systems (ICDCS '08), June 2008, pp. 3-10.
-
(2008)
Proc. 28th Int. Conf. Distributed Computing Systems (ICDCS '08)
, pp. 3-10
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.H.-C.4
-
14
-
-
84055183278
-
Active detection of node replication attacks
-
C. A. Melchor, B. Ait-Salem, P. Gaborit, and K. Tamine, "Active detection of node replication attacks," Int. J. of Computer Science and Network Security, vol. 9, no. 2, pp. 13-21, 2009.
-
(2009)
Int. J. of Computer Science and Network Security
, vol.9
, Issue.2
, pp. 13-21
-
-
Melchor, C.A.1
Ait-Salem, B.2
Gaborit, P.3
Tamine, K.4
-
16
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
A. Savvides, C.-C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proc. ACM MobiCom, 2001, pp. 166-179. (Pubitemid 33006713)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 166-179
-
-
Savvides, A.1
Han, C.-C.2
Strivastava, M.B.3
-
17
-
-
33144454801
-
Secure positioning in wireless networks
-
DOI 10.1109/JSAC.2005.861380
-
S. Čapkun and J. P. Hubaux, "Secure positioning in wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221-232, Feb. 2006. (Pubitemid 43269745)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
-
18
-
-
51849124994
-
Implementing public-key infrastructure for sensor networks
-
D. J. Malan, M. Welsh, and M. D. Smith, "Implementing public-key infrastructure for sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 4, pp. 1-23, 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.4
, pp. 1-23
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
19
-
-
51349093348
-
-
College of William and Mary, Computer Science, Williamsburg, VA, Tech. Rep. WM-CS-2007-11
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li, "WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes," College of William and Mary, Computer Science, Williamsburg, VA, Tech. Rep. WM-CS-2007-11, 2007.
-
(2007)
WM-ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
21
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
April
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proc. Third Int. Symp. Information Processing in Sensor Networks (IPSN '04), April 2004, pp. 259-268.
-
(2004)
Proc. Third Int. Symp. Information Processing in Sensor Networks (IPSN '04)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
22
-
-
3042738543
-
SWATT: Softwarebased attestation for embedded devices
-
May
-
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: softwarebased attestation for embedded devices," in Proc. IEEE Symp. Security and Privacy (S&P '04), May 2004, pp. 272-282.
-
(2004)
Proc. IEEE Symp. Security and Privacy (S&P '04)
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
23
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM MobiHoc, 2005, pp. 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
24
-
-
33751069036
-
Double rulings for information brokerage in sensor networks
-
Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking, MOBICOM 2006
-
R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks," in Proc. ACM MobiCom, 2006, pp. 286-297. (Pubitemid 44758723)
-
(2006)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, vol.2006
, pp. 286-297
-
-
Sarkar, R.1
Zhu, X.2
Gao, J.3
-
26
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: scalable coordination in sensor networks," in Proc. ACM MobiCom, 1999, pp. 263-270.
-
(1999)
Proc. ACM MobiCom
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
27
-
-
41849094781
-
Mitigating dos attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du, "Mitigating dos attacks against broadcast authentication in wireless sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 1, pp. 1-35, 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
28
-
-
3242765057
-
Data MULEs: Modeling and analysis of a three-tier architecture for sparse sensor networks
-
DOI 10.1016/S1570-8705(03)00003-9
-
R. C. Shah, S. Roy, S. Jain, and W. Brunette, "Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks," Ad Hoc Networks, vol. 1, no. 2-3, pp. 215 - 233, 2003. (Pubitemid 40421410)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 215-233
-
-
Shah, R.C.1
Roy, S.2
Jain, S.3
Brunette, W.4
-
30
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks," in Proc. SIGCOMM, 2006, pp. 267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
34
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. IEEE INFOCOM, April 2008, pp. 51-55.
-
(2008)
Proc. IEEE INFOCOM
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
35
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proc. First ACM Conf. Wireless Network Security (WiSec '08), 2008, pp. 77-88.
-
(2008)
Proc. First ACM Conf. Wireless Network Security (WiSec '08)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
36
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
J. McCune, E. Shi, A. Perrig, and M. Reiter, "Detection of denial-ofmessage attacks on sensor network broadcasts," in Proc. IEEE Symp. Security and Privacy (S&P '05), May 2005, pp. 64-78. (Pubitemid 41543647)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
37
-
-
84055189102
-
IEEE trial-use standard for wireless access in vehicular environments - Security services for applications and management messages
-
IEEE std 1609.2
-
"IEEE std 1609.2, IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages," Intelligent Transportation Systems Committee, 2006.
-
(2006)
Intelligent Transportation Systems Committee
-
-
-
38
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
DOI 10.1145/1138127.1138130
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks," ACM Trans. Sen. Netw., vol. 2, no. 1, pp. 65-93, 2006. (Pubitemid 43925113)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
|