-
1
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Berlin, Germany, Oct
-
R. Anderson, H. Chan, and A. Perrig, "Key infection: Smart trust for smart dust," 12th IEEE Interna-tional Conference on Network Protocols (ICNP'04), pp. 206-215, Berlin, Germany, Oct. 2004.
-
(2004)
12th IEEE Interna-tional Conference on Network Protocols (ICNP'04)
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
2
-
-
0034291601
-
GPS-less low cost outdoor localization for very small devices
-
Oct
-
N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less low cost outdoor localization for very small devices," IEEE Personal Communication Magazine, vol. 7, pp. 28-34, Oct. 2000.
-
(2000)
IEEE Personal Communication Magazine
, vol.7
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
3
-
-
0347130058
-
Secure low-power operation of wire-less sensor networks
-
E. Callaway, "Secure low-power operation of wire-less sensor networks," Sensors Online, vol. 21, no. 1, 2004.
-
(2004)
Sensors Online
, vol.21
, Issue.1
-
-
Callaway, E.1
-
4
-
-
8344222870
-
TPS: a time-based positioning scheme for outdoor wireless sensor networks
-
Miami, FL, Mar
-
X. Cheng, A. Thaeler, G. Xue, and D. Chen, "TPS: a time-based positioning scheme for outdoor wireless sensor networks," IEEE INFOCOM '05, Miami, FL, Mar. 2005.
-
(2005)
IEEE INFOCOM '05
-
-
Cheng, X.1
Thaeler, A.2
Xue, G.3
Chen, D.4
-
5
-
-
46749158359
-
An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
-
A. K. Das, "An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks," Inter-national Journal of Network Security, vol. 6, no. 2, pp. 134-144, 2008.
-
(2008)
Inter-national Journal of Network Security
, vol.6
, Issue.2
, pp. 134-144
-
-
Das, A.K.1
-
6
-
-
80054061721
-
ECPKS: An improved location-aware key management scheme in static sensor networks
-
A. K. Das, "ECPKS: An improved location-aware key management scheme in static sensor networks," International Journal of Network Security, vol. 7, no. 3, pp. 358-369, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 358-369
-
-
Das, A.K.1
-
7
-
-
33746301733
-
A localized, dis-tributed protocol for secure information exchange in sensor networks
-
Denver, Colorado
-
T. Dimitriou, and I. Krontiris, "A localized, dis-tributed protocol for secure information exchange in sensor networks,"19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05), pp. 240, Denver, Colorado, 2005.
-
(2005)
19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05)
, pp. 240
-
-
Dimitriou, T.1
Krontiris, I.2
-
8
-
-
33847341872
-
Convex optimization methods for sensor node estimation
-
Anchorage, Alaska, Apr
-
L. Doherty, K. S. Pister, and L. E. Ghaoui, "Convex optimization methods for sensor node estimation," IEEE INFOCOM '01, Anchorage, Alaska, Apr. 2001.
-
(2001)
IEEE INFOCOM '01
-
-
Doherty, L.1
Pister, K.S.2
Ghaoui, L.E.3
-
9
-
-
69949134676
-
Authenticated reliable and semi-reliable communication in wireless sensor networks
-
F. Dressler, "Authenticated reliable and semi-reliable communication in wireless sensor networks," Inter-national Journal of Network Security, vol. 7, no. 1, pp. 61-68, 2008.
-
(2008)
Inter-national Journal of Network Security
, vol.7
, Issue.1
, pp. 61-68
-
-
Dressler, F.1
-
10
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
Washington, D.C., USA, Oct
-
S. Ganeriwal, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 66-77, Washington, D.C., USA, Oct. 25, 2004.
-
(2004)
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, vol.25
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
11
-
-
20544474194
-
Collabora-tive trust-based secure routing against colluding ma-licious nodes in multi-hop ad hoc networks
-
Tampa, USA
-
T. Ghosh, N. Pissinou, and K. Makki, "Collabora-tive trust-based secure routing against colluding ma-licious nodes in multi-hop ad hoc networks," Annual Conference on Local Computer Networks (LCN), pp. 224-231, Tampa, USA, 2004.
-
(2004)
Annual Conference on Local Computer Networks (LCN)
, pp. 224-231
-
-
Ghosh, T.1
Pissinou, N.2
Makki, K.3
-
12
-
-
29844453185
-
Towards designing a trusted routing solution in Mobile Ad Hoc networks, ACM Journal
-
Special issue on Non-Cooperative Wireless Networking and Computing
-
T. Ghosh, N. Pissinou, and K. Makki, "Towards designing a trusted routing solution in Mobile Ad Hoc networks," ACM Journal, Mobile Networks and Applications (MONET), Special issue on Non-Cooperative Wireless Networking and Computing, 2005.
-
(2005)
Mobile Networks and Applications (MONET)
-
-
Ghosh, T.1
Pissinou, N.2
Makki, K.3
-
14
-
-
27144521141
-
Range-free localization scheme in large scale sensor networks
-
San Diego, Ca, Sep
-
T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. F. Abdelzaher, "Range-free localization scheme in large scale sensor networks," ACM MOBICOM '03, San Diego, Ca, Sep. 2003.
-
(2003)
ACM MOBICOM '03
-
-
He, T.1
Huang, C.2
Blum, B.M.3
Stankovic, J.A.4
Abdelzaher, T.F.5
-
15
-
-
11244273945
-
Localization for mobile sensor networks
-
Philadelphia, PA, Sep
-
L. Hu, and D. Evans, "Localization for mobile sensor networks," ACM MOBICOM '04, Philadelphia, PA, Sep. 2004.
-
(2004)
ACM MOBICOM '04
-
-
Hu, L.1
Evans, D.2
-
16
-
-
17644390287
-
Towards a New Paradigm for Secur-ing Wireless Sensor Networks
-
Ascona, Switzer-land
-
K. Jones, A. Wadaa, S. Olariu, L.Wilson, and M.Eltoweissy, "Towards a New Paradigm for Secur-ing Wireless Sensor Networks," ACM New Security Paradigms Workshop, pp. 115-121, Ascona, Switzer-land, 2003.
-
(2003)
ACM New Security Paradigms Workshop
, pp. 115-121
-
-
Jones, K.1
Wadaa, A.2
Olariu, S.3
Wilson, L.4
Eltoweissy, M.5
-
17
-
-
4944220325
-
The beta reputation sys-tem
-
Bled, Slovenia
-
A. Jøsang, and R. Ismail, "The beta reputation sys-tem,"the 15th Bled Electronic Commerce Conference, pp. 33-48, Bled, Slovenia, 2002.
-
(2002)
the 15th Bled Electronic Commerce Conference
, pp. 33-48
-
-
Jøsang, A.1
Ismail, R.2
-
19
-
-
79959728389
-
Energy-effcient hybrid key management protocol for wireless sensor networks
-
T. Landstra, S. Jagannathan, and M. Zawodniok, "Energy-effcient hybrid key management protocol for wireless sensor networks," International Journal of Network Security, vol. 9, no. 2, pp. 121-134, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.2
, pp. 121-134
-
-
Landstra, T.1
Jagannathan, S.2
Zawodniok, M.3
-
20
-
-
0034541756
-
Miti-gating Routing Misbehavior In Mobile Ad Hoc Net-works
-
Boston, Massachusetts, United States, Aug
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Miti-gating Routing Misbehavior In Mobile Ad Hoc Net-works," 6th Annual International Conference on Mo-bile Computing and Networking (MobiCom), pp. 255-265, Boston, Massachusetts, United States, Aug. 2000.
-
(2000)
6th Annual International Conference on Mo-bile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
66549130452
-
Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks
-
A. Mohaisen, D. Nyang, and K. Lee, "Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks," International Journal of Network Security, vol. 8, no. 3, pp. 282-292, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.3
, pp. 282-292
-
-
Mohaisen, A.1
Nyang, D.2
Lee, K.3
-
22
-
-
84948698587
-
A Computational Model of Trust and Reputation
-
Hawaii
-
L. Mui, M. Mohtashemi, and A. Halberstadt, "A Computational Model of Trust and Reputation,"35th Annual Hawaii International Conference on System Sciences (HICSS-35'02), pp. 188, Hawaii, 2002.
-
(2002)
35th Annual Hawaii International Conference on System Sciences (HICSS-35'02)
, pp. 188
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
23
-
-
3042598885
-
Trust and Clus-tering Based Authentication Services in Mobile Ad Hoc Networks
-
Tokyo, Japan, Mar
-
E. C. H. Ngai, and M. R. Lyu, "Trust and Clus-tering Based Authentication Services in Mobile Ad Hoc Networks," 24th International Conference on Distributed Computing Systems Workshops (ICD-CSW'04), Tokyo, Japan, Mar. 2004.
-
(2004)
24th International Conference on Distributed Computing Systems Workshops (ICD-CSW'04)
-
-
Ngai, E.C.H.1
Lyu, M.R.2
-
25
-
-
0041973656
-
Ad Hoc Positioning Sys-tem (APS) using AoA
-
San Francisco, CA, Apr
-
D. Niculescu, and B. Nath, "Ad Hoc Positioning Sys-tem (APS) using AoA,"IEEE INFOCOM '03, San Francisco, CA, Apr. 2003.
-
(2003)
IEEE INFOCOM '03
-
-
Niculescu, D.1
Nath, B.2
-
26
-
-
24944532285
-
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
-
Rocquencourt, France
-
J. Patel, W. T. L. Teacy, N. R. Jennings, and M. Luck, "A Probabilistic Trust Model for Handling Inaccurate Reputation Sources," the Third Interna-tional Conference on Trust Management, pp. 193-209, Rocquencourt, France, 2005.
-
(2005)
the Third Interna-tional Conference on Trust Management
, pp. 193-209
-
-
Patel, J.1
Teacy, W.T.L.2
Jennings, N.R.3
Luck, M.4
-
27
-
-
0034771605
-
SPINS: Security protocols for sensor net-works
-
Rome Italy
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.Tygar, "SPINS: Security protocols for sensor net-works," Seventh Annual ACM International Confer-ence on Mobile Networking and Computing (Mobi-com 2001), pp. 189-199, Rome Italy, 2001.
-
(2001)
Seventh Annual ACM International Confer-ence on Mobile Networking and Computing (Mobi-com 2001)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
28
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
30
-
-
33751068221
-
Collabora-tive trust-based secure routing in multihop Ad Hoc networks
-
Athens, Greece
-
N. Pissinou, T. Ghosh, and K. Makki, "Collabora-tive trust-based secure routing in multihop Ad Hoc networks," The Third IFIP-TC6 Networking Confer-ence (Networking '04), Athens, Greece, 2004.
-
(2004)
The Third IFIP-TC6 Networking Confer-ence (Networking '04)
-
-
Pissinou, N.1
Ghosh, T.2
Makki, K.3
-
31
-
-
1542317849
-
Secure verification of location claims
-
San Diego, California, Sep
-
N. Sastry, U. Shankar, and D.Wagner, "Secure verification of location claims,"the Second ACM Workshop on Wireless Security (WiSe), San Diego, California, Sep. 2003.
-
(2003)
the Second ACM Workshop on Wireless Security (WiSe)
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
32
-
-
0034775930
-
Dynamic fine-grained localization in Ad-hoc networks of sen-sors
-
Rome, Italy, July
-
A. Savvides, C. Han, and M. Srivastava, "Dynamic fine-grained localization in Ad-hoc networks of sen-sors," ACM MOBICOM, Rome, Italy, July 2001.
-
(2001)
ACM MOBICOM
-
-
Savvides, A.1
Han, C.2
Srivastava, M.3
-
33
-
-
46749125818
-
Establishing au-thenticated channels and secure identifiers in Ad-hoc networks
-
B. Sieka and A. D. Kshemkalyani, "Establishing au-thenticated channels and secure identifiers in Ad-hoc networks," International Journal of Network Secu-rity, vol. 5, pp. 55-61, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, pp. 55-61
-
-
Sieka, B.1
Kshemkalyani, A.D.2
-
34
-
-
84871442641
-
On communication security in wireless Ad-Hoc sensor networks
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zim-beck, and M. B. Srivastava, "On communication security in wireless Ad-Hoc sensor networks," The Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enter-prises, 2002.
-
(2002)
The Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enter-prises
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zim-beck, S.4
Srivastava, M.B.5
-
35
-
-
77649308267
-
Node-failure tolerance of topology in wireless sensor networks
-
L. M. Wang, J. F. Ma, and Y. B. Guo, "Node-failure tolerance of topology in wireless sensor networks," International Journal of Network Security, vol. 7, no. 2, pp. 261-264, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 261-264
-
-
Wang, L.M.1
Ma, J.F.2
Guo, Y.B.3
-
36
-
-
0036793924
-
Denial Of service in sensor networks
-
A. D. Wood, and J. A. Stankovic, "Denial Of service in sensor networks,"IEEE Computer, vol. 35, pp. 54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|