-
1
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: ACM MOBICOM, Boston, MA, 2000, pp. 56-67. (Pubitemid 32024682)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
2
-
-
0012578438
-
Gradient broadcast: A robust, long-live large sensor network
-
UCLA
-
F. Ye, A. Chen, S. Lu, L. Zhang, Gradient broadcast: a robust, long-live large sensor network, Technical report, UCLA, 2001.
-
(2001)
Technical Report
-
-
Ye, F.1
Chen, A.2
Lu, S.3
Zhang, L.4
-
3
-
-
84904578657
-
A scalable solution to minimum cost forwarding in large sensor networks
-
Arizona, USA
-
F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: Conference on Computer Communications and Networks, Arizona, USA, 2001.
-
(2001)
Conference on Computer Communications and Networks
-
-
Ye, F.1
Chen, A.2
Lu, S.3
Zhang, L.4
-
4
-
-
1542347691
-
Power-efficient data dissemination in wireless sensor networks
-
San Diego, CA, USA
-
U. Cetintemel, A. Flinders, Y. Sun, Power-efficient data dissemination in wireless sensor networks, in: ACM MobiDE, San Diego, CA, USA, 2003.
-
(2003)
ACM MobiDE
-
-
Cetintemel, U.1
Flinders, A.2
Sun, Y.3
-
5
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
Washington, DC, USA
-
B. Krishnamachari, D. Estrin, S. Wicker, The impact of data aggregation in wireless sensor networks, in: IEEE ICDCS, Washington, DC, USA, 2002, pp. 575-578.
-
(2002)
IEEE ICDCS
, pp. 575-578
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.3
-
6
-
-
0003234376
-
Residual energy scans for monitoring wireless sensor networks
-
Y.J. Zhao, R. Govindan, D. Estrin, Residual energy scans for monitoring wireless sensor networks, in: IEEE WCNC, 2002.
-
(2002)
IEEE WCNC
-
-
Zhao, Y.J.1
Govindan, R.2
Estrin, D.3
-
8
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, Alaska, USA
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: IEEE Workshop on Sensor Network Protocols and Applications (SNPA), Anchorage, Alaska, USA, 2003.
-
(2003)
IEEE Workshop on Sensor Network Protocols and Applications (SNPA)
-
-
Karlof, C.1
Wagner, D.2
-
9
-
-
82955234795
-
Malicious node detection in wireless sensor networks
-
Miami, Florida, USA
-
W.R.P. Junior, T.H. de P. Figueiredo, H.C. Wong, Malicious node detection in wireless sensor networks, in: IEEE IPDPS, Miami, Florida, USA, 2004.
-
(2004)
IEEE IPDPS
-
-
Junior, W.R.P.1
Figueiredo De, T.P.H.2
Wong, H.C.3
-
10
-
-
79958699057
-
Detecting malicious sensor nodes from learned data patterns
-
Honolulu, Hawaii
-
P. Mukherjee, S. Sen, Detecting malicious sensor nodes from learned data patterns, in: Agent Technology for Sensor Networks, Honolulu, Hawaii, 2007.
-
(2007)
Agent Technology for Sensor Networks
-
-
Mukherjee, P.1
Sen, S.2
-
11
-
-
74549177934
-
Using learned data patterns to detect malicious nodes in sensor networks
-
Kolkata, India
-
P. Mukherjee, S. Sen, Using learned data patterns to detect malicious nodes in sensor networks, in: ICDCN, Kolkata, India, 2008.
-
(2008)
ICDCN
-
-
Mukherjee, P.1
Sen, S.2
-
12
-
-
77950998038
-
Detecting selective forwarding attacks in wireless sensor networks
-
Rhodes Island, Greece
-
B. Yu, B. Xao, Detecting selective forwarding attacks in wireless sensor networks, in: IEEE IPDPS, Rhodes Island, Greece, 2006.
-
(2006)
IEEE IPDPS
-
-
Yu, B.1
Xao, B.2
-
13
-
-
82955169882
-
Identity-based encryption for sensor networks
-
L.B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lpez, R. Dahab, Identity-based encryption for sensor networks, in: IEEE PERCOM, 2007.
-
(2007)
IEEE PERCOM
-
-
Oliveira, L.B.1
Aranha, D.2
Morais, E.3
Daguano, F.4
Lpez, J.5
Dahab, R.6
-
14
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications, 2003, pp. 1976-1986.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
33751183522
-
A secure alternate path routing in sensor networks
-
Elsevier
-
S.-B. Lee, and Y.-H. Choi A secure alternate path routing in sensor networks Computer Communications vol. 30 2006 Elsevier 153 165
-
(2006)
Computer Communications
, vol.30
, pp. 153-165
-
-
Lee, S.-B.1
Choi, Y.-H.2
-
17
-
-
47749148120
-
RaWMS - Random walk based lightweight membership service for wireless ad hoc networks
-
Z. Bar-Yossef, R. Friedman, and G. Kliot RaWMS - Random walk based lightweight membership service for wireless ad hoc networks ACM Transactions on Computer Systems (TOCS) 26 2 2008 1 66
-
(2008)
ACM Transactions on Computer Systems (TOCS)
, vol.26
, Issue.2
, pp. 1-66
-
-
Bar-Yossef, Z.1
Friedman, R.2
Kliot, G.3
-
18
-
-
74549209899
-
-
Technical Report RR-6594, INRIA
-
F. Le Fessant, C. Sengul, A.-M. Kermarrec, Pace-maker: tracking peer availability in large networks, Technical Report RR-6594, INRIA, 2008.
-
(2008)
Pace-maker: Tracking Peer Availability in Large Networks
-
-
Le Fessant, F.1
Sengul, C.2
Kermarrec, A.-M.3
-
19
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Springer
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz Comparing elliptic curve cryptography and rsa on 8-bit cpus Proceedings of the Cryptographic Hardware and Embedded Systems 2004 Springer 119 132
-
(2004)
Proceedings of the Cryptographic Hardware and Embedded Systems
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
20
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324-328. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
21
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
DOI 10.1145/1180345.1180366, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
K. Piotrowski, P. Langendoerfer, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the 4th ACM workshop on Security of ad hoc and sensor networks, 2006, pp. 169-176. (Pubitemid 47168568)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
23
-
-
84876375076
-
Low-cost elliptic curve cryptography for wireless sensor networks
-
L. Batina, N. Mentens, K. Sakiyama, B. Preneel, I. Verbauwhede, Low-cost elliptic curve cryptography for wireless sensor networks, in: Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS), 2006, pp. 6-17.
-
(2006)
Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS)
, pp. 6-17
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
24
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. de Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, 2008, pp. 580-585.
-
(2008)
IEEE International Conference on Wireless and Mobile Computing, Networking and Communication
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
26
-
-
33646834914
-
A new approach for random key pre-distribution in large-scale wireless sensor networks
-
DOI 10.1002/wcm.397
-
K. Ren, K. Zeng, and W. Lou A new approach for random key predistribution in large scale wireless sensor networks Journal of Wireless Communication and Mobile Computing 6 2006 307 318 (Pubitemid 43774310)
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 307-318
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
27
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE Infocom, 2004.
-
(2004)
IEEE Infocom
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
28
-
-
24944537172
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach, in: IEEE ICNP, 2003.
-
(2003)
IEEE ICNP
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
29
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
DOI 10.1109/TMC.2007.70753, 4358997
-
K. Ren, W. Lou, and Y. Zhang Leds: providing location-aware end-to-end data security in wireless sensor networks IEEE Transactions on Mobile Computing (TMC) 7 5 2008 585 598 (Pubitemid 351454006)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
30
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang Location based compromise-tolerant security mechanisms in wireless sensor networks IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24 2 2006 247 260 (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
31
-
-
33847130828
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, in: ACM MOBIHOC, 2005.
-
(2005)
ACM MOBIHOC
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
33
-
-
74549128448
-
Insens: Intrusion-tolerant routing in wireless sensor networks
-
Providence, Rhodes Island, USA
-
S.M. Jing Deng, Richard Han, Insens: intrusion-tolerant routing in wireless sensor networks, in: IEEE ICDCS, Providence, Rhodes Island, USA, 2003.
-
(2003)
IEEE ICDCS
-
-
Jing Deng, S.M.1
Han, R.2
-
35
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MOBICOM, Boston, MA, 2000, pp. 255-265. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
36
-
-
74549134905
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Barcelona, Spain
-
Y. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, in: IEEE INFOCOM, Barcelona, Spain, 2007.
-
(2007)
IEEE INFOCOM
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
37
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Suzhou, China
-
Z. Liu, A. Joy, R. Thompson, A dynamic trust model for mobile ad hoc networks, in: Future Trends of Dist. Computing Systems, Suzhou, China, 2004.
-
(2004)
Future Trends of Dist. Computing Systems
-
-
Liu, Z.1
Joy, A.2
Thompson, R.3
-
39
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Springer
-
R. Poovendran, and L. Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Network vol. 13 2007 Springer pp. 108-114
-
(2007)
Wireless Network
, vol.13
, pp. 108-114
-
-
Poovendran, R.1
Lazos, L.2
-
41
-
-
64449088975
-
Serwa: A secure routing protocol against wormhole attacks in sensor networks
-
S. Madria, and J. Yin Serwa: a secure routing protocol against wormhole attacks in sensor networks Ad Hoc Network 7 2009 1051 1063
-
(2009)
Ad Hoc Network
, vol.7
, pp. 1051-1063
-
-
Madria, S.1
Yin, J.2
-
42
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
DOI 10.1007/s11276-006-3723-x
-
R. Poovendran, and L. Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Network 13 2007 27 59 (Pubitemid 46034258)
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
43
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
S. Čapkun, L. Buttyán, J.-P. Hubaux, Sector: secure tracking of node encounters in multi-hop wireless networks, in: ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 21-32.
-
(2003)
ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 21-32
-
-
Čapkun, S.1
-
44
-
-
37849022826
-
Applicability of public key infrastructures in wireless sensor networks
-
Springer
-
R. Roman, and C. Alcaraz Applicability of public key infrastructures in wireless sensor networks Proceedings of the 4th EuroPKI Workshop 2007 Springer 313 320
-
(2007)
Proceedings of the 4th EuroPKI Workshop
, pp. 313-320
-
-
Roman, R.1
Alcaraz, C.2
-
46
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
DOI 10.1109/PERCOMW.2007.98, 4144829, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede, Public-key cryptography for rfid-tags, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2007, pp. 217-222. (Pubitemid 47214212)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
47
-
-
84957812088
-
Selecting cryptographic key sizes
-
Springer-Verlag London, UK
-
A.K. Lenstra, and E.R. Verheul Selecting cryptographic key sizes PKC 2000 Springer-Verlag London, UK 446 465
-
(2000)
PKC
, pp. 446-465
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
48
-
-
74249113564
-
-
IOS Press (Chapter L. Batina et al. Chapter Public-key Primitives)
-
J. Lopez, and J. Zhou Wireless Sensor Network Security 2008 IOS Press (Chapter L. Batina et al. Chapter Public-key Primitives)
-
(2008)
Wireless Sensor Network Security
-
-
Lopez, J.1
Zhou, J.2
-
49
-
-
35348832896
-
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
-
DOI 10.1007/s11036-007-0024-2, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. Guest Editors: Maire O'Neill, Xinmiao Zhang, Nicolas Sklavos
-
R. Roman, C. Alcaraz, and J. Lopez A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes Mobile Networks Application 12 4 2007 231 244 (Pubitemid 47574435)
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.4
, pp. 231-244
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
-
50
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
DOI 10.1145/1138127.1138130
-
Y.W. Law, J. Doumen, and P. Hartel Survey and benchmark of block ciphers for wireless sensor networks ACM Transactions on Sensor Networks. 2 1 2006 65 93 (Pubitemid 43925113)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
51
-
-
37149007406
-
Survey and benchmark of stream ciphers for wireless sensor networks
-
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings
-
N. Fournel, M. Minier, and S. Ubéda Survey and benchmark of stream ciphers for wireless sensor networks Proceedings of the Workshop on Information Security Theory and Practice Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems Lecture Notes in Computer Science vol. 4462 2007 Springer Berlin/ Heidelberg 202 214 (Pubitemid 350259651)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4462
, pp. 202-214
-
-
Fournel, N.1
Minier, M.2
Ubeda, S.3
-
52
-
-
49649122357
-
Tinyrng: A cryptographic random number generator for wireless sensors network nodes
-
A. Francillon, C. Castelluccia, Tinyrng: a cryptographic random number generator for wireless sensors network nodes, in: Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007, pp. 1-7.
-
(2007)
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops
, pp. 1-7
-
-
Francillon, A.1
Castelluccia, C.2
-
53
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. Culler Spins: security protocols for sensor networks Wireless Networks 8 2001 521 534
-
(2001)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
|