-
1
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu, S., Setia, S., and Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62-72. ACM, New York, NY, USA (2003) (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
2
-
-
33745727952
-
Security framework for wireless sensor networks
-
DOI 10.1007/s11277-006-9044-7
-
Prasad, N.R., Alam, M.: Security framework for wireless sensor networks. Wirel. Pers. Commun. 37, 455-469 (2006) (Pubitemid 43999306)
-
(2006)
Wireless Personal Communications
, vol.37
, Issue.3-4
, pp. 455-469
-
-
Prasad, N.R.1
Alam, M.2
-
3
-
-
84861934409
-
How to secure a wireless sensor network Intelligent sensors, sensor networks and information processing conference, 2005
-
Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. Intelligent sensors, sensor networks and information processing conference, 2005. In: Proceedings of the 2005 International Conference on Dec., pp. 89-95 (2005)
-
(2005)
Proceedings of the 2005 International Conference on Dec.
, pp. 89-95
-
-
Law, Y.W.1
Havinga, P.J.M.2
-
4
-
-
80052424887
-
Comprehensible security synthesis for wireless sensor networks
-
ACM, New York, NY, USA
-
Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible security synthesis for wireless sensor networks. In: MidSens '08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks, pp. 19-24. ACM, New York, NY, USA (2008)
-
(2008)
MidSens '08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks
, pp. 19-24
-
-
Ransom, S.1
Pfisterer, D.2
Fischer, S.3
-
5
-
-
58049119736
-
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks
-
Peter, S., Piotrowski, K., Langendorfer, P.: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In: Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pp. 778-785 (2008)
-
(2008)
Local Computer Networks, 2008 LCN 2008. 33rd IEEE Conference on
, pp. 778-785
-
-
Peter, S.1
Piotrowski, K.2
Langendorfer, P.3
-
6
-
-
77952364367
-
Configurable link layer security architecture for wireless sensor networks
-
Jinwala, D., Patel, D., Dasgupta, K.: Configurable link layer security architecture for wireless sensor networks. J. Inform. Assur. Sec. 4(4), 582-603 (2009)
-
(2009)
J. Inform. Assur. Sec.
, vol.4
, Issue.4
, pp. 582-603
-
-
Jinwala, D.1
Patel, D.2
Dasgupta, K.3
-
7
-
-
70449370987
-
A policy based security management architecture for sensor networks
-
de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: Integrated Network Management, 2009. IM'09. IFIP/IEEE International Symposium, pp. 315-318 (2009)
-
(2009)
Integrated Network Management, 2009. IM'09. IFIP/IEEE International Symposium
, pp. 315-318
-
-
De Oliveira, S.1
De Oliveira, T.R.2
Nogueira, J.M.3
-
8
-
-
84861945297
-
WSN link-layer security frameworks
-
Lopez, J., Zhou, J. (eds.) Chap. 6, IOS Press
-
Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, Chap. 6, pp. 142-163. IOS Press (2008)
-
(2008)
Wireless Sensor Network Security
, pp. 142-163
-
-
Krontiris, I.1
Dimitriou, T.2
Soroush, H.3
Salajegheh, M.4
-
9
-
-
0010461175
-
-
(final) DARPA Project report (cryptographic technologies group, trusted information system, NAI Labs)
-
Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security (final). DARPA Project report (cryptographic technologies group, trusted information system, NAI Labs) (2000)
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
10
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162-175. ACM, New York, NY, USA (2004) (Pubitemid 41563357)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
11
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
DOI 10.1145/1236360.1236421, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A secure sensor network communication architecture. In: IPSN '07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 479-488. ACM, New York, NY, USA (2007) (Pubitemid 47582178)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
12
-
-
63149186377
-
Analysis of proposed key establishment protocols in multi-tiered sensor networks
-
Singh, K., Muthukkumarasamy, V.: Analysis of proposed key establishment protocols in multi-tiered sensor networks. J. Netw. 3, 13 (2008)
-
(2008)
J. Netw.
, vol.3
, pp. 13
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
13
-
-
34247224664
-
-
Rensselaer Polytechnic Institute, Troy, New York (technical report)
-
Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: A survey, pp. 05-07. Rensselaer Polytechnic Institute, Troy, New York (2005) (technical report)
-
(2005)
Key Distribution Mechanisms for Wireless Sensor Networks: A Survey
, pp. 05-07
-
-
Camtepe, S.A.1
Yener, B.2
-
14
-
-
84861947852
-
-
Chipcon, CC2420 datasheet rev 1.2. Tech. rep. (2004)
-
Chipcon, CC2420 datasheet rev 1.2. Tech. rep. (2004).
-
-
-
-
15
-
-
61649123623
-
Secfleck: A public key technology platform for wireless sensor networks
-
Lecture Notes in Computer Science, Springer, Berlin/Heidelberg ISBN: 978-3-642-00223-6
-
Hu, W., Corke, P., Shih, W., Overs, L.: Secfleck: A public key technology platform for wireless sensor networks. Wireless Sensor Networks Book Series. Lecture Notes in Computer Science, vol. 5432, pp. 296-311. Springer, Berlin/Heidelberg (2009). ISBN: 978-3-642-00223-6
-
(2009)
Wireless Sensor Networks Book Series
, vol.5432
, pp. 296-311
-
-
Hu, W.1
Corke, P.2
Shih, W.3
Overs, L.4
-
16
-
-
33745855808
-
Tampering with motes: Real-world physical attacks on wireless sensor networks
-
DOI 10.1007/11734666-9, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings
-
Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC), pp. 104-118 (2006) (Pubitemid 44029561)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3934
, pp. 104-118
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
17
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of 2003
-
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of 2003 IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, pp. 113-127 (2003)
-
(2003)
IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wirel. Netw. 8, 521-534 (2002)
-
(2002)
Wirel. Netw.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
20
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S. C.: Sizzle: A standardsbased end-to-end security architecture for the embedded internet. In: Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference, pp. 247-256 (8-12 March 2005) (Pubitemid 43727934)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
21
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM, New York, NY, USA
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47. ACM, New York, NY, USA (2002)
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
22
-
-
0038487088
-
Random key predistribution schemes for sensor networks SP '03
-
IEEE Computer Society, Washington, DC, USA
-
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC, USA (2003)
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
23
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52-61. ACM, New York, NY, USA (2003) (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
24
-
-
84861947138
-
-
ZigBee Alliance Zigbee specification v1.0 (2004)
-
ZigBee Alliance, Zigbee specification v1.0 (2004)
-
-
-
-
25
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Cryptogr. 28(2), 119-134 (2003)
-
(2003)
Des. Codes Cryptogr.
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
27
-
-
84861947142
-
-
OpenSSL website.
-
OpenSSL website. http://www.openssl.org
-
-
-
-
28
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
DOI 10.1145/1138127.1138130
-
Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw 2, 65-93 (2006) (Pubitemid 43925113)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
29
-
-
84861947137
-
-
Berlin, Technische Universität, Crossbow Inc., Arched Rock Corporation, T2: A second generation OS for embedded sensor networks. Tech. rep.
-
Levis, P., Gay, D., Handziski, V., Hauer, J.-H., Greenstein, B., Turon, M., Hui, J., Klues, K., Sharp, C., Szewczyk, R., Polastre, J., Buonadonna, P., Nachman, L., Tolle, G., Culler, D., Wolisz, A.: Berlin, Technische Universität, Crossbow Inc., Arched Rock Corporation, T2: A second generation OS for embedded sensor networks. Tech. rep. (2005)
-
(2005)
Technische Universität, Crossbow Inc
-
-
Levis, P.1
Gay, D.2
Handziski, V.3
Hauer, J.-H.4
Greenstein, B.5
Turon, M.6
Hui, J.7
Klues, K.8
Sharp, C.9
Szewczyk, R.10
Polastre, J.11
Buonadonna, P.12
Nachman, L.13
Tolle, G.14
Culler, D.15
Wolisz, A.16
-
30
-
-
84861947141
-
-
Realtime Technologies LTD Shimmer-wireless sensor platform (2010)
-
Realtime Technologies LTD, Shimmer-wireless sensor platform. http://www.shimmer-research. com/wp-content/uploads/2010/08/Shimmer-2R- Capabilities-Overview.pdf (2010)
-
-
-
-
35
-
-
0347747244
-
-
UCLA Computer Science Technical Report UCLA/CSD-TR 02-0013
-
Ganesan, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: Complex behavior at scale: An experimental study of low-power wireless sensor networks. UCLA Computer Science Technical Report UCLA/CSD-TR 02-0013 (2002)
-
(2002)
Complex Behavior at Scale: An Experimental Study of Low-Power Wireless Sensor Networks
-
-
Ganesan, D.1
Krishnamachari, B.2
Woo, A.3
Culler, D.4
Estrin, D.5
Wicker, S.6
-
36
-
-
84861947856
-
-
NIST (National Institute of Standards and Technology), Special publication 800-57 part1. Tech. rep. (2007)
-
NIST (National Institute of Standards and Technology), Special publication 800-57 part1. Tech. rep. (2007)
-
-
-
|