-
1
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
-
Anderson, R., Chan, H. and Perrig, A. (2004) 'Key infection: Smart trust for smart dust', Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP'04), 5-8 October, Berlin, Germany, pp.206-215. (Pubitemid 40574711)
-
(2004)
Proceedings - International Conference on Network Protocols, ICNP
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
2
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
DOI 10.1109/TSMCC.2007.905824
-
Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N. and Kandemir, M.T. (2007) 'On the detection of clones in sensor networks using random key predistribution', IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, Vol. 37, No. 6, pp.1246-1258. (Pubitemid 350130716)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
11-14 May, Oakland, CA, USA
-
Chan, H., Perrig, A. and Song, D. (2003) 'Random key predistribution schemes for sensor networks', Proceedings of the IEEE Symposium on Security and Privacy, 11-14 May, Oakland, CA, USA, pp.197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
17-20 September, Nice, France
-
Choi, H., Zhu, S. and La Porta, T.F. (2007) 'SET: Detecting node clones in sensor networks', Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), 17-20 September, Nice, France, pp.341-350.
-
(2007)
Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007)
, pp. 341-350
-
-
Choi, H.1
Zhu, S.2
La Porta, T.F.3
-
5
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
9-14 September, Montreal, Quebec, Canada
-
Conti, M., Pietro, R.D., Mancini, L.V. and Mei, A. (2007) 'A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks', Proceedings of the 8th ACM International Symposium on Mobile Ad hoc Networking and Computing, 9-14 September, Montreal, Quebec, Canada, pp.80-89.
-
(2007)
Proceedings of the 8th ACM International Symposium on Mobile Ad hoc Networking and Computing
, pp. 80-89
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
6
-
-
0004116989
-
-
MIT Press, Cambridge, MA
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L. and Stein, C. (2001) Introduction to Algorithms, MIT Press, Cambridge, MA.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
7
-
-
58149127893
-
-
Crossbow Technology Inc. Available online at, (accessed on 4 January 2010)
-
Crossbow Technology Inc. (2007) Wireless sensor networks product reference guide. Available online at: Http://www. xbow.com/ (accessed on 4 January 2010).
-
(2007)
Wireless Sensor Networks Product Reference Guide
-
-
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
7-11 March, Hong Kong
-
Du, W., Deng, J., Han, Y.S., Chen, S. and Varshney, P.K. (2004) 'A key management scheme for wireless sensor networks using deployment knowledge', Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE INFOCOM 2004, 7-11 March, Hong Kong, pp.586-597.
-
(2004)
Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE INFOCOM
, vol.2004
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
0038341106
-
A Key-management scheme for distributed sensor networks
-
17-21 November, Washington, DC, USA
-
Eschenauer, L. and Gligor, V. (2002) 'A Key-management scheme for distributed sensor networks', Proceedings of the 9th ACM Conference on Computer and Communications Security, 17-21 November, Washington, DC, USA, pp.41-47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
10
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
Fan, L., Cao, P., Almeida, J. and Broder, A.Z. (2000) 'Summary cache: A scalable wide-area web cache sharing protocol', IEEE/ ACM Transactions on Networking, Vol. 8, No. 3, pp.281-293.
-
(2000)
IEEE/ ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
12
-
-
67650432140
-
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
-
Ho, J-W., Liu, D., Wright, M. and Das, S.K. (2009) 'Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks', Ad Hoc Networks, Vol. 7, No. 8, pp.1476-1488.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1476-1488
-
-
Ho, J.-W.1
Liu, D.2
Wright, M.3
Das, S.K.4
-
13
-
-
55749099619
-
On handling insider attacks in wireless sensor networks
-
Krauß, C., Schneider, M. and Eckert, C. (2008) 'On handling insider attacks in wireless sensor networks', Information Security Technical Report, Vol. 13, pp.165-172.
-
(2008)
Information Security Technical Report
, vol.13
, pp. 165-172
-
-
Krauß, C.1
Schneider, M.2
Eckert, C.3
-
14
-
-
34547282118
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
-
30 October-3 November, Alexandria, VA, USA
-
Kun, S., Peng, N. and Cliff, W. (2006) 'TinySeRSync: Secure and resilient time synchronization in wireless sensor networks', Proceedings of the 13th ACM Conference on Computer and Communications Security, 30 October-3 November, Alexandria, VA, USA, pp.264-277.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 264-277
-
-
Kun, S.1
Peng, N.2
Cliff, W.3
-
15
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
31 October, Fairfax, VA, USA
-
Liu, D. and Ning, P. (2003) 'Location-based pairwise key establishments for static sensor networks', Proceedings of the 1st ACM workshop on Security of Ad hoc and Sensor Networks, 31 October, Fairfax, VA, USA, pp.72-82.
-
(2003)
Proceedings of the 1st ACM workshop on Security of Ad hoc and Sensor Networks
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
16
-
-
84866860550
-
Improving key predistribution with deployment knowledge in static sensor networks
-
Liu, D. and Ning, P. (2005) 'Improving key predistribution with deployment knowledge in static sensor networks', ACM Transactions on Sensor Network, Vol. 1, No. 2, pp.204-239.
-
(2005)
ACM Transactions on Sensor Network
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
17
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
15-19 March, San Diego, CA, USA
-
Liu, Y., Ning, P., Dai, H. and Liu, A. (2010) 'Randomized differential DSSS: Jamming-resistant wireless broadcast communication', Proceedings of the 29th Conference on Information Communications, IEEE INFOCOM 2010, 15-19 March, San Diego, CA, USA, pp.695-703.
-
(2010)
Proceedings of the 29th Conference on Information Communications IEEE INFOCOM
, vol.2010
, pp. 695-703
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
18
-
-
33750342024
-
A collusion attack on pairwise key predistribution schemes for distributed sensor networks
-
DOI 10.1109/PERCOMW.2006.3, 1598981, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
Moore, T. (2006) 'A collusion attack on pairwise key predistribution schemes for distributed sensor networks', Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom'06), 13-17 March, Pisa, Italy, pp.251-255. (Pubitemid 44612586)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 251-255
-
-
Moore, T.1
-
19
-
-
67749114527
-
An effective defensive node against jamming attacks in sensor networks
-
Mpitziopoulos, A. and Gavalas, D. (2008) 'An effective defensive node against jamming attacks in sensor networks', Security and Communication Networks, Vol. 2, No. 2, pp.145-163.
-
(2008)
Security and Communication Networks
, vol.2
, Issue.2
, pp. 145-163
-
-
Mpitziopoulos, A.1
Gavalas, D.2
-
20
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Parno, B., Perrig, A. and Gligor, V. (2005) 'Distributed detection of node replication attacks in sensor networks', Proceedings of the IEEE Symposium on Security and Privacy, 8-11 May, Oakland, CA, USA, pp.49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
21
-
-
85034799271
-
Jamming-resistant broadcast communication without shared keys
-
10-14 August, Montreal, Canada
-
Pöpper, C., Strasser, M. and Capkun, S. (2009) 'Jamming-resistant broadcast communication without shared keys', Proceedings of the 18th Conference on USENIX Security Symposium, 10-14 August, Montreal, Canada, pp.231-248.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 231-248
-
-
Pöpper, C.1
Strasser, M.2
Capkun, S.3
-
22
-
-
67650697116
-
A framework for confronting key-swapping collusion attack on random pairwise key predistribution schemes for distributed sensor networks
-
29 September- 2 October, Atlanta, GA, USA
-
Tran, T.D. and Agbinya, J.I. (2008) 'A framework for confronting key-swapping collusion attack on random pairwise key predistribution schemes for distributed sensor networks', Paper Presented at the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'08), 29 September- 2 October, Atlanta, GA, USA, pp.815-820.
-
(2008)
Paper Presented at the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'08)
, pp. 815-820
-
-
Tran, T.D.1
Agbinya, J.I.2
-
23
-
-
79251536864
-
Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks
-
Tran, T.D. and Agbinya, J.I. (2009) 'Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks', Security and Communication Networks, Vol. 4, No. 2, pp.109-121.
-
(2009)
Security and Communication Networks
, vol.4
, Issue.2
, pp. 109-121
-
-
Tran, T.D.1
Agbinya, J.I.2
-
24
-
-
79960597468
-
Attack-tolerant timesynchronization in wireless sensor networks
-
15-17 April, Phoenix, AZ, USA
-
Xin, H., Taejoon, P. and Shin, K.G. (2008) 'Attack-tolerant timesynchronization in wireless sensor networks', Proceedings of the 27th IEEE Conference on Computer Communications, 15-17 April, Phoenix, AZ, USA, pp.41-45.
-
(2008)
Proceedings of the 27th IEEE Conference on Computer Communications
, pp. 41-45
-
-
Xin, H.1
Taejoon, P.2
Shin, K.G.3
-
25
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) 'The feasibility of launching and detecting jamming attacks in wireless networks', Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'05), 25-27 May, Urbana-Champaign, IL, USA, pp.46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
26
-
-
51349136300
-
Lightweight and compromise-resilient message authentication in sensor networks
-
15-17 April, Phoenix, AZ, USA
-
Zhang, W., Subramanian, N. and Wang, G. (2008) 'Lightweight and compromise-resilient message authentication in sensor networks', Proceedings of the 27th IEEE Conference on Computer Communications, 15-17 April, Phoenix, AZ, USA, pp.1418-1426.
-
(2008)
Proceedings of the 27th IEEE Conference on Computer Communications
, pp. 1418-1426
-
-
Zhang, W.1
Subramanian, N.2
Wang, G.3
-
27
-
-
33744945781
-
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
-
25-27 April, Los Angeles, CA, USA
-
Zhen, Y., and Yong, G. (2005) 'A key pre-distribution scheme using deployment knowledge for wireless sensor networks', Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, 25-27 April, Los Angeles, CA, USA, pp.261-268.
-
(2005)
Proceedings of the 4th International Symposium on Information Processing in Sensor Networks
, pp. 261-268
-
-
Zhen, Y.1
Yong, G.2
-
28
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
Zhu, S., Setia, S. and Jajodia, S. (2006) 'LEAP: Efficient security mechanisms for large-scale distributed sensor networks', ACM Transactions on Sensor Network (TOSN), Vol. 2, No. 4, pp.500-528. (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|