-
1
-
-
0036688074
-
A survey on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, "Directed diffusion for wireless sensor networking," IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 2-16, 2003.
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
3
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in Proc. 2004 ACM SenSys, pp. 81-94.
-
Proc. 2004 ACM SenSys
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
4
-
-
0033877788
-
Energyefficient communication protocol for wireless microsensor networks
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, " Energyefficient communication protocol for wireless microsensor networks," in Proc. 2000 Hawaii International Conference on System Sciences, vol. 2, 2000.
-
(2000)
Proc. 2000 Hawaii International Conference on System Sciences
, vol.2
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
5
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, "TinyPK: Securing sensor networks with public key technology," in Proc. 2004 ACM SASN, pp. 59-64.
-
Proc. 2004 ACM SASN
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
6
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
7
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
8
-
-
85000276942
-
Multilevel "TESLA: Broadcast authentication for distributed sensor networks
-
ACM
-
D. Liu and P. Ning, "Multilevel "TESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embeded Computing Syst., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
Trans. Embeded Computing Syst.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
9
-
-
50949090446
-
BABRA: Batch-based broadcast authentication in wireless sensor networks
-
Y. Zhou and Y. Fang, "BABRA: Batch-based broadcast authentication in wireless sensor networks," in Proc. 2006 IEEE GLOBECOM, pp. 1-5.
-
Proc. 2006 IEEE GLOBECOM
, pp. 1-5
-
-
Zhou, Y.1
Fang, Y.2
-
10
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks," ACM Trans. Sensor Networking, vol. 4, no. 1, pp. 1-35, 2008.
-
(2008)
ACM Trans. Sensor Networking
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
11
-
-
77954163084
-
Secure and efficient broadcast authentication in wireless sensor networks
-
T. Kwon and J. Hong, "Secure and efficient broadcast authentication in wireless sensor networks," IEEE Trans. Computers, vol. 59, no. 8, pp. 1120-1133, 2010.
-
(2010)
IEEE Trans. Computers
, vol.59
, Issue.8
, pp. 1120-1133
-
-
Kwon, T.1
Hong, J.2
-
12
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou, K. Zeng, and P. Moran, "On broadcast authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.4
-
13
-
-
51249105540
-
Defending DoS attacks on broadcast authentication in wireless sensor networks
-
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Defending DoS attacks on broadcast authentication in wireless sensor networks," in Proc. 2008 IEEE ICC, pp. 1653-1657.
-
Proc. 2008 IEEE ICC
, pp. 1653-1657
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
14
-
-
84889351757
-
How to sign digital streams
-
R. Gennaro and P. Rohatgi, "How to sign digital streams," in Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science, 1997, vol. 1294, pp. 180-197.
-
(1997)
Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science
, vol.1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
15
-
-
0032594123
-
Digital signatures for flows and multicasts
-
C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 502-513, 1999.
-
(1999)
IEEE/ ACM Trans. Networking
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.2
-
16
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. 2000 IEEE Symposium on Security and Privacy, pp. 56-73.
-
Proc. 2000 IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
20
-
-
35448965082
-
Two tier secure routing protocol for heterogeneous sensor networks
-
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two tier secure routing protocol for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3395-3401, 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
21
-
-
62949194452
-
A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
-
-, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1223-1229, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1223-1229
-
-
Du, X.1
-
22
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors," in Information and Communication Security, Lecture Notes in Computer Science, 2006, vol. 4307, pp. 519-528.
-
(2006)
Information and Communication Security, Lecture Notes in Computer Science
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
23
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
K. M. Finnigin, B. E. Mullins, R. A. Raines, and H. B. Potoczny, "Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks," Int"l J. Security and Networks, vol. 2, no. 3, pp. 260-271, 2007.
-
(2007)
Int"l J. Security and Networks
, vol.2
, Issue.3
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
25
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
H. Chen, Y. Xiao, X. Hong, F. Hu, and J. L. Xie, "A survey of anonymity in wireless communication systems," Security and Commun. Networks, vol. 2, no. 5, pp. 427-444, 2009.
-
(2009)
Security and Commun. Networks
, vol.2
, Issue.5
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.L.5
-
26
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Commun., vol. 30, no. 11, pp. 2314-2341, 2007.
-
(2007)
Computer Commun.
, vol.30
, Issue.11
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
27
-
-
79551621944
-
A distributed public key caching scheme in large wireless networks
-
Y. Kong, J. Deng, and S. Tate, "A distributed public key caching scheme in large wireless networks," in Proc. 2010 IEEE GLOBECOM, pp. 1-5.
-
Proc. 2010 IEEE GLOBECOM
, pp. 1-5
-
-
Kong, Y.1
Deng, J.2
Tate, S.3
-
30
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. 2008 IEEE IPSN, pp. 245-256.
-
Proc. 2008 IEEE IPSN
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
32
-
-
70349668850
-
Lightweight remote image management for secure code dissemination in wireless sensor networks
-
A. Liu, P. Ning, and C. Wang, "Lightweight remote image management for secure code dissemination in wireless sensor networks," in Proc. 2009 IEEE INFOCOM, pp. 1242-1250.
-
Proc. 2009 IEEE Infocom
, pp. 1242-1250
-
-
Liu, A.1
Ning, P.2
Wang, C.3
|