-
1
-
-
33749627440
-
-
Lightweight detection and classification for wireless sensor networks in realistic environments. In Proceedings of ACM SenSys 2005, 2-4 November, San Diego, California, USA 205-217. 2005.
-
Gu L, Jia D, Vicaire P, et al. Lightweight detection and classification for wireless sensor networks in realistic environments. In Proceedings of ACM SenSys 2005, 2-4 November, San Diego, California, USA, pp. 205-217. 2005.
-
-
-
Gu, L.1
Jia, D.2
Vicaire, P.3
-
2
-
-
33744924736
-
-
Design of a Wireless Sensor Network Platform for Detecting Rare, Random, and Ephemeral Events. In Proceedings of the 3rd symposium on Information Processing in Sensor Networks (IPSN'05), LA, California
-
Dutta P, Grimmer M, Arora A, Bibyk S, Culler D. Design of a Wireless Sensor Network Platform for Detecting Rare, Random, and Ephemeral Events. In Proceedings of the 3rd symposium on Information Processing in Sensor Networks (IPSN'05), LA, California, pp. 497-502. 2005.
-
(2005)
, pp. 497-502
-
-
Dutta, P.1
Grimmer, M.2
Arora, A.3
Bibyk, S.4
Culler, D.5
-
3
-
-
80052185793
-
-
05 October
-
[05 October] 2010].
-
(2010)
-
-
-
4
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. 2003.
-
(2003)
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
4544293215
-
-
Location-based pairwise key establishments for static sensor networks. ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks
-
Liu D, Ning P. Location-based pairwise key establishments for static sensor networks. ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks, pp. 72-778. 2003.
-
(2003)
, pp. 72-778
-
-
Liu, D.1
Ning, P.2
-
6
-
-
49749136568
-
-
Hgkm - a group-based key management scheme for sensor networks using deployment knowledge. In Proceedings of Sixth Annual Conference on Communication Networks and Services Research, May 2008
-
Canh NT, Lee Y-K, Lee SY. Hgkm - a group-based key management scheme for sensor networks using deployment knowledge. In Proceedings of Sixth Annual Conference on Communication Networks and Services Research, May 2008, pp. 5-8.
-
-
-
Canh, N.T.1
Lee, Y.-K.2
Lee, S.Y.3
-
7
-
-
42149172778
-
Group-based key predistribution for wireless sensor networks
-
Article 11.
-
Liu D, Ning P, Du W. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks 2008; 4(2): Article 11.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.2
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
8
-
-
51349096874
-
-
A Group Rekeying Scheme for Location-aware Sensor Networks. In Proceedings of International Conference on Information Security and Assurance
-
Biswas S, Afzal SR, Lee G, Kim D-K. A Group Rekeying Scheme for Location-aware Sensor Networks. In Proceedings of International Conference on Information Security and Assurance, pp. 276-279. 2008.
-
(2008)
, pp. 276-279
-
-
Biswas, S.1
Afzal, S.R.2
Lee, G.3
Kim, D.-K.4
-
9
-
-
33745156817
-
-
An Efficient Key Management Scheme for Secure Sensor Networks. In Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
-
RuiYing D, HuiJuan T, Song W. An Efficient Key Management Scheme for Secure Sensor Networks. In Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies, pp. 279-283. 2005.
-
(2005)
, pp. 279-283
-
-
RuiYing, D.1
HuiJuan, T.2
Song, W.3
-
10
-
-
77953154766
-
-
A Novel Group Key Agreement Protocol for Wireless Sensor Networks. Proceedings of 2010 International Conference on Measuring Technology and Mechatronics Automation
-
Zhang Z, Jiang C, Deng J. A Novel Group Key Agreement Protocol for Wireless Sensor Networks. Proceedings of 2010 International Conference on Measuring Technology and Mechatronics Automation, vol. 1, pp. 230-233. 2010.
-
(2010)
, vol.1
, pp. 230-233
-
-
Zhang, Z.1
Jiang, C.2
Deng, J.3
-
11
-
-
33646400365
-
-
Efficient Key Establishment for Group-Based Wireless Sensor Deployments. In Proceedings of the 4th ACM WiSE'05, Cologne, Germany
-
Zhou L, Ni J, Ravishankar CV. Efficient Key Establishment for Group-Based Wireless Sensor Deployments. In Proceedings of the 4th ACM WiSE'05, Cologne, Germany, pp. 1-10. 2005.
-
(2005)
, pp. 1-10
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
-
12
-
-
4544246596
-
-
Secure Long Term Communities in Ad Hoc Networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)
-
Prigent N, Bidan C, Andreaux J-P, Heen O. Secure Long Term Communities in Ad Hoc Networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), pp. 115-124. 2003.
-
(2003)
, pp. 115-124
-
-
Prigent, N.1
Bidan, C.2
Andreaux, J.-P.3
Heen, O.4
-
13
-
-
84947618580
-
-
quot;A Study of Membership Management Protocols for Groups in Wireless Sensor Networks," M.S. thesis, Dept. Computer Science, University of Illinois at Urbana-Champaign, USA
-
Singh KH. "A Study of Membership Management Protocols for Groups in Wireless Sensor Networks," M.S. thesis, Dept. Computer Science, University of Illinois at Urbana-Champaign, USA, 2004.
-
(2004)
-
-
Singh, K.H.1
-
14
-
-
33750425520
-
-
Secure group communication in wireless sensor networks. First International Symposium on Wireless Pervasive Computing, Phuket, Thailand
-
Ghosh SK, Patro RK, Raina M, Thejaswi C, Ganapathy V. Secure group communication in wireless sensor networks. First International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 2006.
-
(2006)
-
-
Ghosh, S.K.1
Patro, R.K.2
Raina, M.3
Thejaswi, C.4
Ganapathy, V.5
-
17
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications 2009; 27(4): 400-411.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
18
-
-
74249103024
-
-
A new Group Key Management Scheme based on DMST for Wireless Sensor Networks, In Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems 2009 (MASS'09)
-
Zeng Y, Xia Y, Su J. A new Group Key Management Scheme based on DMST for Wireless Sensor Networks, In Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems 2009 (MASS'09), pp. 989-994. 2009.
-
(2009)
, pp. 989-994
-
-
Zeng, Y.1
Xia, Y.2
Su, J.3
-
19
-
-
77953905477
-
-
Group-based Key Management for Mobile Sensor Networks. In Proceedings of 2010 IEEE Sarnoff Symposium, Princeton, NJ, USA, 2010
-
Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. Group-based Key Management for Mobile Sensor Networks. In Proceedings of 2010 IEEE Sarnoff Symposium, Princeton, NJ, USA, 2010. pp. 1-5.
-
-
-
Kifayat, K.1
Merabti, M.2
Shi, Q.3
Llewellyn-Jones, D.4
-
20
-
-
77958116785
-
-
A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-oriented Cryptography, 2010 International Conference on Internet Technology and Applications, Wuhan, China
-
Juwei Z, Liwen Z. A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-oriented Cryptography, 2010 International Conference on Internet Technology and Applications, Wuhan, China, pp. 1-5. 2010.
-
(2010)
, pp. 1-5
-
-
Juwei, Z.1
Liwen, Z.2
-
21
-
-
56449090764
-
Authentic delay bounded event detection in heterogeneous wireless sensor networks
-
Ai C, Hou H, Li Y, Beyah R. Authentic delay bounded event detection in heterogeneous wireless sensor networks. Ad Hoc Networks, 2009; 7, (3): 599-613.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.3
, pp. 599-613
-
-
Ai, C.1
Hou, H.2
Li, Y.3
Beyah, R.4
-
22
-
-
12844249406
-
A minimum cost heterogeneous sensor network with a lifetime constraint
-
Mhatre VP, Rosenberg C, Kofman D, Mazumdar R, Shroff N. A minimum cost heterogeneous sensor network with a lifetime constraint. IEEE Transactions on Mobile Computing 2005; 4(1): 4-15.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.1
, pp. 4-15
-
-
Mhatre, V.P.1
Rosenberg, C.2
Kofman, D.3
Mazumdar, R.4
Shroff, N.5
-
23
-
-
47949097290
-
-
A Secure Lightweight Approach of Node Membership Verification in Dense HDSN. In Proceedings of the IEEE Military Communications Conference (IEEE MILCOM'07), October 29-31, Orlando, Florida, USA, 1-6.
-
Pathan A-SK, Heo G, Hong CS. A Secure Lightweight Approach of Node Membership Verification in Dense HDSN. In Proceedings of the IEEE Military Communications Conference (IEEE MILCOM'07), October 29-31, Orlando, Florida, USA, 2007, pp. 1-6.
-
(2007)
-
-
Pathan, A.-S.1
Heo, G.2
Hong, C.S.3
-
24
-
-
80052185792
-
-
Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report # 00-010, NAI Labs, The Security Research Division, Glenwood, MD, USA, dated 1 September
-
Carman DW, Kruss PS, Matt BJ. Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report # 00-010, NAI Labs, The Security Research Division, Glenwood, MD, USA, dated 1 September, 2000.
-
(2000)
-
-
Carman, D.W.1
Kruss, P.S.2
Matt, B.J.3
-
25
-
-
57849119211
-
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks
-
Pathan A-SK, Hong CS. SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annals of Telecommunications 2008; 63: (9-10): 529-541.
-
(2008)
Annals of Telecommunications
, vol.63
, Issue.9-10
, pp. 529-541
-
-
Pathan, A.-S.1
Hong, C.S.2
-
28
-
-
67650216200
-
An asymmetric key-based security architecture for wireless sensor networks
-
Haque MM, Pathan A-SK, Hong CS, Huh E-N. An asymmetric key-based security architecture for wireless sensor networks. KSII Transactions on Internet and Information Systems 2008; 2(5): 265-279.
-
(2008)
KSII Transactions on Internet and Information Systems
, vol.2
, Issue.5
, pp. 265-279
-
-
Haque, M.M.1
Pathan, A.-S.2
Hong, C.S.3
Huh, E.-N.4
-
29
-
-
27544515049
-
-
John Wiley & Sons Ltd, West Sussex, England, ISBN 0-470-85285-2
-
Rhee MY. Internet Security Cryptographic principles, algorithms and protocols John Wiley & Sons Ltd, West Sussex, England, ISBN 0-470-85285-2, pp. 165-172. 2003.
-
(2003)
Internet Security Cryptographic principles, algorithms and protocols
, pp. 165-172
-
-
Rhee, M.Y.1
-
30
-
-
33847323575
-
-
Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures. In Proceedings of the 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05), Athens, Greece, September 2005
-
Gabrielli A, Mancini LV, Setia S, Jajodia S. Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures. In Proceedings of the 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05), Athens, Greece, September 2005, 101-112.
-
-
-
Gabrielli, A.1
Mancini, L.V.2
Setia, S.3
Jajodia, S.4
-
31
-
-
80052168018
-
-
05 October
-
[05 October], 2010.
-
(2010)
-
-
|