-
1
-
-
27644494768
-
An analysis of a large scale habit monitoring application
-
R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, "An Analysis of a Large Scale Habit Monitoring Application," Proc. Second ACM Int'l Conf. Embedded Networked Sensor Systems (Sensys'04), 2004.
-
(2004)
Proc. Second ACM Int'l Conf. Embedded Networked Sensor Systems (Sensys'04)
-
-
Szewczky, R.1
Mainwaring, A.2
Anderson, J.3
Culler, D.4
-
3
-
-
51249084123
-
AICN: An efficient algorithm to identify compromised nodes in wireless sensor network
-
May
-
R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, "AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network," Proc. IEEE Int'l Conf. Comm. (ICC'08), May 2008.
-
(2008)
Proc. IEEE Int'l Conf. Comm. (ICC'08)
-
-
Lu, R.1
Lin, X.2
Zhang, C.3
Zhu, H.4
Ho, P.5
Shen, X.6
-
4
-
-
77952053188
-
MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks
-
X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 10, pp. 843-856, 2010.
-
(2010)
Wireless Comm. and Mobile Computing
, vol.10
, pp. 843-856
-
-
Lin, X.1
Lu, R.2
Shen, X.3
-
5
-
-
77951598972
-
CAT: Building couples to early detect node compromise attack in wireless sensor networks
-
Nov.-Dec.
-
X. Lin, "CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks," Proc. IEEE GLOBECOM'09, Nov.-Dec. 2009.
-
(2009)
Proc. IEEE GLOBECOM'09
-
-
Lin, X.1
-
7
-
-
33745725710
-
A fault localized scheme for false report filtering in sensor networks
-
DOI 10.1109/PERSER.2005.1506391, 1506391, Proceedings - International Conference on Pervasive Services, ICPS '05
-
L. Zhou and C. Ravishankar, "A Fault Localized Scheme for False Report Filtering in Sensor Networks," Proc. Int'l Conf. Pervasive Services, (ICPS'05), pp. 59-68, July 2005. (Pubitemid 43996459)
-
(2005)
Proceedings - International Conference on Pervasive Services, ICPS '05
, vol.2005
, pp. 59-68
-
-
Zhou, L.1
Ravishankar, C.V.2
-
8
-
-
38148998731
-
An effective secure routing for false data injection attack in wireless sensor network
-
Z. Zhu, Q. Tan, and P. Zhu, "An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network," Proc. 10th Asia-Pacific Network Operations and Management Symp. (APNOMS'07), pp. 457-465, 2007.
-
(2007)
Proc. 10th Asia-pacific Network Operations and Management Symp. (APNOMS'07)
, pp. 457-465
-
-
Zhu, Z.1
Tan, Q.2
Zhu, P.3
-
9
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
Mar.
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM'04, Mar. 2004.
-
(2004)
Proc. IEEE INFOCOM'04
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
10
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
11
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'05), pp. 34-45, 2005. (Pubitemid 43037581)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
12
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
Apr.
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM'06, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM'06
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
13
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
14
-
-
70450169460
-
A dos-resilient en-route filtering scheme for sensor networks
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "A Dos-Resilient En-Route Filtering Scheme for Sensor Networks," Proc. Tenth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'09), pp. 343-344, 2009.
-
(2009)
Proc. Tenth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'09)
, pp. 343-344
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
15
-
-
77954597619
-
Feedback based clock synchronization in wireless sensor networks: A control theoretic approach
-
June
-
J. Chen, Q. Yu, Y. Zhang, H.-H. Chen, and Y. Sun, "Feedback Based Clock Synchronization in Wireless Sensor Networks: A Control Theoretic Approach," IEEE Trans. Vehicular Technology, vol. 59, no. 6, pp. 2963-2973, June 2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.6
, pp. 2963-2973
-
-
Chen, J.1
Yu, Q.2
Zhang, Y.3
Chen, H.-H.4
Sun, Y.5
-
16
-
-
77953769705
-
On optimal information capture by energy-constrained mobile sensors
-
June
-
S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, "On Optimal Information Capture by Energy-Constrained Mobile Sensors," IEEE Trans. Vehicular Technology, vol. 59, no. 5, pp. 2472-2484, June 2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.5
, pp. 2472-2484
-
-
He, S.1
Chen, J.2
Sun, Y.3
Yau, D.K.Y.4
Yip, N.K.5
-
17
-
-
13944283393
-
A survey on routing protocols for wireless sensor networks
-
DOI 10.1016/j.adhoc.2003.09.010, PII S1570870503000738
-
K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005. (Pubitemid 40266054)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.2
-
18
-
-
38149062124
-
Security in wireless sensor networks
-
Jan.
-
V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, "Security in Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 8, no. 1, pp. 1-24, Jan. 2008.
-
(2008)
Wireless Comm. and Mobile Computing
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.C.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
20
-
-
50249128803
-
Random graph theory based connectivity analysis in wireless sensor networks with rayleigh fading channels
-
Oct.
-
J. Dong, Q. Chen, and Z. Niu, "Random Graph Theory Based Connectivity Analysis in Wireless Sensor Networks with Rayleigh Fading Channels," Proc. Asia-Pacific Conf. Comm. (APCC'07), pp. 123-126, Oct. 2007.
-
(2007)
Proc. Asia-pacific Conf. Comm. (APCC'07)
, pp. 123-126
-
-
Dong, J.1
Chen, Q.2
Niu, Z.3
-
21
-
-
77953514352
-
-
MICAz: Wireless Measurement System, http://www.xbow.com/Products/Product- pdf-files/Wireless-pdf/MICAz-Datasheet.pdf, 2010.
-
(2010)
MICAz: Wireless Measurement System
-
-
-
23
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
C. Boyd, W. Mao, and K. G. Paterson, "Key Agreement Using Statically Keyed Authenticators," Proc. Second Int'l Conf. Applied Cryptography and Network Security C (ACNS'04), pp. 248-262, 2004.
-
(2004)
Proc. Second Int'l Conf. Applied Cryptography and Network Security C (ACNS'04)
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.G.3
-
24
-
-
17444383008
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
DOI 10.1007/s00145-004-0016-3
-
J. Black and P. Rogaway, "Cbc Macs for Arbitrary-Length Messages: the Three-Key Constructions," J. Cryptology, vol. 18, no. 2, pp. 111-131, 2005. (Pubitemid 40537627)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.2
, pp. 111-131
-
-
Black, J.1
Rogaway, P.2
-
26
-
-
68949170852
-
Localized distance-sensitive service discovery in wireless sensor and actor networks
-
Sept.
-
X. Li, N. Santoro, and I. Stojmenovic, "Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks," IEEE Trans. Computers, vol. 58, no. 9, pp. 1275-1288, Sept. 2009.
-
(2009)
IEEE Trans. Computers
, vol.58
, Issue.9
, pp. 1275-1288
-
-
Li, X.1
Santoro, N.2
Stojmenovic, I.3
-
27
-
-
77955123111
-
Sensor placement in sensor and actuator networks
-
Wiley
-
X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, "Sensor Placement in Sensor and Actuator Networks," Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication, Wiley, 2010.
-
(2010)
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication
-
-
Li, X.1
Nayak, A.2
Simplot-Ryl, D.3
Stojmenovic, I.4
-
28
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, "An Effective Key Management Scheme for Heterogeneous Sensor Networks," Ad Hoc Networks, vol. 5, pp. 24-34, Jan. 2007. (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
29
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Mar.
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. IEEE INFOCOM'99, pp. 708-716, Mar. 1999.
-
(1999)
Proc. IEEE INFOCOM'99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
30
-
-
33845544481
-
Authenticated query flooding in sensor networks
-
DOI 10.1007/0-387-33406-8-4, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
-
Z. Benenson, C. Freiling, E. Hammerschmidt, S. Lucks, and L. Pimenidis, "Authenticated Query Flooding in Sensor Networks," Security and Privacy in Dynamic Environments, Springer, pp. 38-49, July 2006. (Pubitemid 44920641)
-
(2006)
IFIP International Federation for Information Processing
, vol.201
, pp. 38-49
-
-
Benenson, Z.1
Freiling, F.C.2
Hammerschmidt, E.3
Lucks, S.4
Pimenidis, L.5
-
31
-
-
58149131215
-
TUA: A novel compromise-resilient authentication architecture for wireless mesh networks
-
Apr.
-
X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, "TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks," IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1389-1399, Apr. 2008.
-
(2008)
IEEE Trans. Wireless Comm.
, vol.7
, Issue.4
, pp. 1389-1399
-
-
Lin, X.1
Lu, R.2
Ho, P.3
Shen, X.4
Cao, Z.5
-
32
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
Apr.
-
C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM'08, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM'08
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.4
Shen, X.5
|