-
1
-
-
33751044459
-
-
Texas, USA. IEEE
-
T. A. Zia and A. Y. Zomaya, A security framework for wireless sensor networks, in Proc. of IEEE Sensor Applications Symposium (SAS'06), Houston, Texas, USA. IEEE, February 2006, pp. 49-53.
-
(2006)
A Security Framework For Wireless Sensor Networks, In Proc. of IEEE Sensor Applications Symposium (SAS'06), Houston
, pp. 49-53
-
-
Zia, T.A.1
Zomaya, A.Y.2
-
2
-
-
39049088056
-
-
Barcelona, Spain. IEEE
-
T. A. Zia, A secure triple-key management scheme for wireless sensor networks, in Proc. of the 25th IEEE International Conference on Computer Communications (INFOCOM'06), Barcelona, Spain. IEEE, April 2006, pp. 1-2.
-
(2006)
A Secure Triple-key Management Scheme For Wireless Sensor Networks, In Proc. of the 25th IEEE International Conference On Computer Communications (INFOCOM'06)
, pp. 1-2
-
-
Zia, T.A.1
-
3
-
-
54949125959
-
-
Phuket, Thailand. ACTA Press
-
T. A. Zia, Secure localization in wireless sensor networks, in Proc. of the 4th IASTED Asian Conference on Communication Systems and Networks (AsiaCSN'07), Phuket, Thailand. ACTA Press, April 2007, pp. 177-180.
-
(2007)
Secure Localization In Wireless Sensor Networks, In Proc. of the 4th IASTED Asian Conference On Communication Systems and Networks (AsiaCSN'07)
, pp. 177-180
-
-
Zia, T.A.1
-
4
-
-
84886872965
-
A malicious node detection mechanism in wireless sensor networks
-
Macmillan Publishers India Ltd., January
-
T. A. Zia, A malicious node detection mechanism in wireless sensor networks, in Proc. of the International Conference on Network Security (ICONS'07), Erode, India. Macmillan Publishers India Ltd., January 2007.
-
Proc. of the International Conference On Network Security (ICONS'07), Erode, India
, pp. 2007
-
-
Zia, T.A.1
-
5
-
-
77951190728
-
Quality of security through triple key scheme in wireless sensor networks
-
T. A. Zia, Quality of security through triple key scheme in wireless sensor networks, Wireless Communications and Mobile Computing, vol. 10, no. 5, pp. 722-732, May 2010.
-
(2010)
Wireless Communications and Mobile Computing
, vol.10
, Issue.5
, pp. 722-732
-
-
Zia, T.A.1
-
6
-
-
0038341106
-
-
Washington, DC, USA. ACM
-
L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, in Proc. of the 9th ACM conference on Computer and communications security (CCS'02), Washington, DC, USA. ACM, November 2002, pp. 41-47.
-
(2002)
A Key-management Scheme For Distributed Sensor Networks, In Proc. of the 9th ACM Conference On Computer and Communications Security (CCS'02)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
7
-
-
0038487088
-
-
California, USA. IEEE
-
H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, in Proc. of the 2003 IEEE Symposium on Security and Privacy (SP'03), Oakland, California, USA. IEEE, May 2003, pp. 197-213.
-
(2003)
Random Key Predistribution Schemes For Sensor Networks, In Proc. of the 2003 IEEE Symposium On Security and Privacy (SP'03), Oakland
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
4544301464
-
-
Virginia, USA. ACM, October
-
R. Di Pietro, L. V. Mancini, and A. Mei, Random key-assignment for secure wireless sensor networks, in Proc. of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN'03), Fairfax, Virginia, USA. ACM, October 2003, pp. 62-71.
-
(2003)
Random Key-assignment For Secure Wireless Sensor Networks, In Proc. of the 1st ACM Workshop On Security of Ad Hoc and Sensor Networks (SASN'03), Fairfax
, pp. 62-71
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
9
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, Establishing pairwise keys in distributed sensor networks, ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, February 2005.
-
(2005)
ACM Transactions On Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
10
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag, August
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure key distribution for dynamic conferences, in Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'92), Santa Barbara, California, USA, LNCS, vol. 740. Springer-Verlag, August 1992, pp. 471-486.
-
(1992)
Proc. of the 12th Annual International Cryptology Conference On Advances In Cryptology (CRYPTO'92), Santa Barbara, California, USA, LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
11
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, A pairwise key predistribution scheme for wireless sensor networks, ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
-
(2005)
ACM Transactions On Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
12
-
-
8344262333
-
A Key Management Scheme For Wireless Sensor Networks Using Deployment Knowledge
-
Hong Kong, China. IEEE
-
W. Du, J. Deng, Y. Han, S. Chen, and P. K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in Proc. of The 23rd Conference of the IEEE Communications Society (INFOCOM'04), Hong Kong, China. IEEE, March 2004, pp. 586-597.
-
(2004)
In Proc. of the 23rd Conference of the IEEE Communications Society (INFOCOM'04)
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.K.5
-
13
-
-
10044284351
-
LEAP: Efficient Security Mechanisms For Large-scale Distributed Sensor Networks
-
Washington DC, USA. ACM
-
S. Zhu, S. Setia, and S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in Proc. of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington DC, USA. ACM, October 2003, pp. 62-72.
-
(2003)
In Proc. of the 10th ACM Conference On Computer and Communications Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
14
-
-
0034541756
-
-
Boston, Massachusetts, USA. ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. of the 6th annual international conference on Mobile computing and networking (MobiCom'00), Boston, Massachusetts, USA. ACM, August 2000, pp. 255-265.
-
(2000)
Mitigating Routing Misbehavior In Mobile Ad Hoc Networks, In Proc. of the 6th Annual International Conference On Mobile Computing and Networking (MobiCom'00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
15
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, Spins: security protocols for sensor networks, Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
16
-
-
84886931264
-
Security for sensor networks
-
Baltimore, USA, October
-
J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston, Security for sensor networks, in Proc. of 2002 CADIP Research Symposium (CADIP'02), Baltimore, USA, October 2002.
-
Proc. of 2002 CADIP Research Symposium (CADIP'02)
, pp. 2002
-
-
Undercoffer, J.1
Avancha, S.2
Joshi, A.3
Pinkston, J.4
-
17
-
-
11244264140
-
-
Philadelphia, Pennsylvania, USA. ACM
-
L. Lazos and R. Poovendran, SeRLoc: secure range-independent localization for wireless sensor networks, in Proc. of the 3rd ACM workshop on Wireless security (WiSe'04), Philadelphia, Pennsylvania, USA. ACM, 2004, pp. 21-30.
-
(2004)
SeRLoc: Secure Range-independent Localization For Wireless Sensor Networks, In Proc. of the 3rd ACM Workshop On Wireless Security (WiSe'04)
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
18
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
IEEE, March
-
Secure positioning of wireless devices with application to sensor networks, in Proc. of the 24th Conference of the IEEE Communications Society (INFOCOM 2005), Miami, USA, vol. 3. IEEE, March 2005, pp. 1917-1928.
-
(2005)
Proc. of the 24th Conference of the IEEE Communications Society (INFOCOM 2005), Miami, USA
, vol.3
, pp. 1917-1928
-
-
-
19
-
-
33750303903
-
-
Washington, DC, USA. IEEE
-
F. Anjum, S. Pandey, and P. Agrawal, Secure localization in sensor networks using transmission range vari- ation, in Proc. of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'05), Washington, DC, USA. IEEE, November 2005, pp. 194-203.
-
(2005)
Secure Localization In Sensor Networks Using Transmission Range Vari- Ation, In Proc. of the 2nd IEEE International Conference On Mobile Ad-hoc and Sensor Systems (MASS'05)
, pp. 194-203
-
-
Anjum, F.1
Pandey, S.2
Agrawal, P.3
-
20
-
-
27944459744
-
Detecting Malicious Beacon Nodes For Secure Location Discovery In Wireless Sensor Networks
-
Ohio, USA. IEEE
-
D. Liu, P. Ning, and W. Du, Detecting malicious beacon nodes for secure location discovery in wireless sensor networks, in Proc. of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio, USA. IEEE, June 2005, pp. 609-619.
-
(2005)
In Proc. of the 25th IEEE International Conference On Distributed Computing Systems (ICDCS'05), Columbus
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
21
-
-
36949013183
-
DRBTS: Distributed Reputation-based Beacon Trust System
-
Indianapolis, USA. IEEE
-
A. Srinivasan, J. Teitelbaum, and J. Wu, DRBTS: Distributed reputation-based beacon trust system, in Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Purdue University, Indianapolis, USA. IEEE, September 2006, pp. 277-283.
-
(2006)
In Proc. of the 2nd IEEE International Symposium On Dependable, Autonomic and Secure Computing (DASC'06), Purdue University
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
22
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
Y. Zhou and Y. Fang, A two-layer key establishment scheme for wireless sensor networks, IEEE Transac- tions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
-
(2007)
IEEE Transac- Tions On Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
23
-
-
49249123418
-
Han, Multipath key establishment for wireless sensor networks using just- nough redun- dancy transmission
-
J. Deng and Y. S. Han, Multipath key establishment for wireless sensor networks using just- nough redun- dancy transmission, IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 3, pp. 177-190, July-September 2008.
-
(2008)
IEEE Transactions On Dependable and Secure Computing
, vol.5
, Issue.3
, pp. 177-190
-
-
Deng, J.1
-
24
-
-
33847326821
-
DICAS: Detection, Diagnosis and Isolation of Control Attacks In Sensor Networks
-
Athens, Greece. IEEE
-
I. Khalil, S. Bagchi, and C. Nina-Rotaru, DICAS: Detection, diagnosis and isolation of control attacks in sensor networks, in Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), Athens, Greece. IEEE, September 2005, pp. 89-100.
-
(2005)
In Proc. of the 1st International Conference On Security and Privacy For Emerging Areas In Communications Networks (SECURECOMM'05)
, pp. 89-100
-
-
Khalil, I.1
Bagchi, S.2
Nina-Rotaru, C.3
-
25
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
C.-Y. Chong and S. P. Kumar, Sensor networks: Evolution, opportunities, and challenges, Proceedings of the IEEE, vol. 91, no. 8, pp. 1247-1256, August 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.-Y.1
Kumar, S.P.2
-
26
-
-
85034572933
-
Energy-efficient communication protocol for wireless microsensor networks
-
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proc. of the 33rd Annual Hawaii International Conference on System Sciences (HICSS'00), Maui, Hawaii, USA, vol. 2. IEEE, January 2000, pp. 8020-.
-
(2000)
In Proc. of the 33rd Annual Hawaii International Conference On System Sciences (HICSS'00), Maui, Hawaii, USA
, vol.2
, pp. 8020
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
27
-
-
14344254253
-
A secure hierarchical model for sensor network
-
M. Tubaishat, J. Yin, B. Panja, and S. Madria, A secure hierarchical model for sensor network, ACM SIGMOD Record, vol. 33, no. 1, pp. 7-13, March 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 7-13
-
-
Tubaishat, M.1
Yin, J.2
Panja, B.3
Madria, S.4
-
28
-
-
0036739784
-
Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
-
B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks, Wireless Networks, vol. 8, no. 5, pp. 481-494, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 481-494
-
-
Chen, B.1
Jamieson, K.2
Balakrishnan, H.3
Morris, R.4
-
29
-
-
17744386714
-
Key Infection: Smart Trust For Smart Dust
-
Berlin, Germany. IEEE
-
R. Anderson, H. Chan, and A. Perrig, Key infection: smart trust for smart dust, in Proc. of the 12th IEEE International Conference on Network Protocols (ICNP'04), Berlin, Germany. IEEE, October 2004, pp. 206-215.
-
(2004)
In Proc. of the 12th IEEE International Conference On Network Protocols (ICNP'04)
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
30
-
-
84886907611
-
-
MEMSIC Inc., MICA2: Wireless Measurement System, Mica2 Datasheets
-
MEMSIC Inc., MICA2: Wireless Measurement System, Mica2 Datasheets, http://www.memsic.com/support/documentation/wireless-sensor-networks/category/7-datasheets.html.
-
-
-
-
31
-
-
58449099938
-
Taxonomy of Security Attacks In Sensor Networks and Countermea- Sures
-
Hanoi, Vietnam
-
T. Roosta, S. Shieh, and S. Sastry, Taxonomy of security attacks in sensor networks and countermea- sures, in Proc. of the 1st IEEE International Conference on System Integration and Reliability Improvements (SIRI'06), Hanoi, Vietnam, December 2006, pp. 13-15.
-
(2006)
In Proc. of the 1st IEEE International Conference On System Integration and Reliability Improvements (SIRI'06)
, pp. 13-15
-
-
Roosta, T.1
Shieh, S.2
Sastry, S.3
-
32
-
-
84886910577
-
-
Security in Computing (4th Edition). Prentice Hall PTR, [Online]. Available
-
C. P. Pfleeger and S. L. Pfleeger, Security in Computing (4th Edition). Prentice Hall PTR, 2006. [Online]. Available: http://portal.acm.org/citation.cfm?id=1177321
-
(2006)
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
33
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Ad Hoc Network Journal, vol. 1, no. 2-3, pp. 293-315, September 2003.
-
(2003)
Ad Hoc Network Journal
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
34
-
-
33746339333
-
Secure wireless sensor networks: Problems and solutions
-
F. Hu, J. Ziobro, J. Tillett, and N. K. Sharma, Secure wireless sensor networks: Problems and solutions, Journal of Systemics, Cybernetics and Informatics, vol. 1, no. 4, pp. 90-100, 2003.
-
(2003)
Journal of Systemics, Cybernetics and Informatics
, vol.1
, Issue.4
, pp. 90-100
-
-
Hu, F.1
Ziobro, J.2
Tillett, J.3
Sharma, N.K.4
-
35
-
-
0028514601
-
Kerberos - an authentication service for computer networks
-
B. C. Neuman and T. Ts'o, Kerberos - an authentication service for computer networks, IEEE Communi- cations Magazine, vol. 32, no. 9, pp. 33-38, 1994.
-
(1994)
IEEE Communi- Cations Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
36
-
-
26444574670
-
Tinysec: A Link Layer Security Architecture For Wireless Sensor Net- Works
-
Baltimore, Maryland, USA. ACM
-
C. Karlof, N. Sastry, and D. Wagner, Tinysec: a link layer security architecture for wireless sensor net- works, in Proc. of the 2nd international conference on Embedded networked sensor systems (SenSys'04), Baltimore, Maryland, USA. ACM, November 2004, pp. 162-175.
-
(2004)
In Proc. of the 2nd International Conference On Embedded Networked Sensor Systems (SenSys'04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
37
-
-
35348897342
-
Minisec: A Secure Sensor Network Communication Architec- Ture
-
Massachusetts, USA. ACM
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, Minisec: a secure sensor network communication architec- ture, in Proc. of the 6th international conference on Information processing in sensor networks (IPSN'07), Cambridge, Massachusetts, USA. ACM, April 2007, pp. 479-488.
-
(2007)
In Proc. of the 6th International Conference On Information Processing In Sensor Networks (IPSN'07), Cambridge
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
38
-
-
4143130875
-
Energy efficient security protocol for wireless sensor networks
-
IEEE, October
-
H. Cam, H. Cam, D. Muthuavinashiappan, S. Ozdemir, and P. Nair, Energy efficient security protocol for wireless sensor networks, in Proc. of the 58th IEEE Semiannual Vehicular Technology Conference (VTC2003-Fall), Orlando, Florida, USA, vol. 5. IEEE, October 2003, pp. 2981-2984.
-
(2003)
Proc. of the 58th IEEE Semiannual Vehicular Technology Conference (VTC2003-Fall), Orlando, Florida, USA
, vol.5
, pp. 2981-2984
-
-
Cam, H.1
Cam, H.2
Muthuavinashiappan, D.3
Ozdemir, S.4
Nair, P.5
-
39
-
-
1542317849
-
-
San Diego, California, USA. ACM
-
N. Sastry, U. Shankar, and D. Wagner, Secure verification of location claims, in Proc. of the 2nd ACM workshop on Wireless security (WiSe'03), San Diego, California, USA. ACM, September 2003, pp. 1-10.
-
(2003)
Secure Verification of Location Claims, In Proc. of the 2nd ACM Workshop On Wireless Security (WiSe'03)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
40
-
-
0034775930
-
Dynamic Fine-grained Localization In Ad-hoc Networks of Sensors
-
Rome, Italy. ACM
-
A. Savvides, C.-C. Han, and M. B. Strivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, in Proc. of the 7th annual International Conference on Mobile Computing and Networking (Mobi- Com'01), Rome, Italy. ACM, July 2001, pp. 166-179.
-
(2001)
In Proc. of the 7th Annual International Conference On Mobile Computing and Networking (Mobi- Com'01)
, pp. 166-179
-
-
Savvides, A.1
Han, C.-C.2
Strivastava, M.B.3
|