-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
39049087707
-
On the energy hole problem of nonuniform node distribution in wireless sensor networks
-
X. Wu, G. Chen, and S. K. Das, "On the energy hole problem of nonuniform node distribution in wireless sensor networks,"in the Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2006, pp. 180-187.
-
The Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2006
, pp. 180-187
-
-
Wu, X.1
Chen, G.2
Das, S.K.3
-
3
-
-
51649118582
-
Broadcast control channel jamming: Resilience and identification of traitors
-
A. Chan, X. Liu, G. Noubir, and B. Thapa, "Broadcast control channel jamming: Resilience and identification of traitors," in the Proc. of IEEE International Symposium on Information Theory, 2007, pp. 2496-2500.
-
The Proc. of IEEE International Symposium on Information Theory, 2007
, pp. 2496-2500
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
4
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. D. Gligor, "Distributed detection of node replication attacks in sensor networks," in the Proc. of IEEE Symposium on Security and Privacy, 2005, pp. 49-63.
-
The Proc. of IEEE Symposium on Security and Privacy, 2005
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
5
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
DOI 10.1007/s11276-006-3723-x
-
R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,"Wireless Networks, vol. 13, no. 1, pp. 27-59, 2007. (Pubitemid 46034258)
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
6
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in the Proc. of the 16th ACM conference on Computer and Communications Security, 2009, pp. 21-32.
-
The Proc. of the 16th ACM Conference on Computer and Communications Security, 2009
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
7
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in the Proc. of the 8th ACM International symposium on Mobile ad hoc networking and computing, 2007, pp. 80-89.
-
The Proc. of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
9
-
-
84866469313
-
SeRLoc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Transactions on Sensor Networks, vol. 1, no. 1, pp. 73-100, 2005.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
|