-
1
-
-
46449122114
-
Wireless sensor network survey
-
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2292-2330 (2008)
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
2
-
-
85037175440
-
Wireless Sensor Network Security: A Survey
-
Auerbach Pub.
-
Walters, J., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, pp. 367-409. Auerbach Pub. (2007)
-
(2007)
Security in Distributed, Grid, and Pervasive Computing
, pp. 367-409
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
3
-
-
49249085644
-
Transactional Confidentiality in Sensor Networks
-
Pai, S., Bermudez, S., Wicker, S., Meingast, M., Roosta, T., Sastry, S., Mulligan, D.: Transactional Confidentiality in Sensor Networks. IEEE Security & Privacy 6(4), 28-35 (2008)
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Bermudez, S.2
Wicker, S.3
Meingast, M.4
Roosta, T.5
Sastry, S.6
Mulligan, D.7
-
4
-
-
33847297141
-
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
-
Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 113-126 (2005)
-
(2005)
1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005)
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955-1963 (2007)
-
(2007)
26th IEEE International Conference on Computer Communications (INFOCOM 2007)
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
6
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2(2), 159-186 (2006)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
7
-
-
84865583954
-
Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity
-
Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: 1st International Workshop on Security in Computers, Networking and Communications, pp. 1005-1010 (2011)
-
(2011)
1st International Workshop on Security in Computers, Networking and Communications
, pp. 1005-1010
-
-
Ying, B.1
Gallardo, J.R.2
Makrakis, D.3
Mouftah, H.T.4
-
8
-
-
80052215360
-
Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks
-
Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. Springer, Heidelberg
-
Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 190-201. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6843
, pp. 190-201
-
-
Chang, S.1
Qi, Y.2
Zhu, H.3
Dong, M.4
Ota, K.5
-
9
-
-
75149127612
-
Wireless sensor network key management survey and taxonomy
-
Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33(2), 63-75 (2010)
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.2
, pp. 63-75
-
-
Zhang, J.1
Varadharajan, V.2
-
11
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sen. Netw. 1(1/2), 50-63 (2006)
-
(2006)
Int. J. Sen. Netw.
, vol.1
, Issue.1-2
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
12
-
-
70350686263
-
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)
-
Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. Springer, Heidelberg
-
Latif, R., Hussain, M.: Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 732-740. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5576
, pp. 732-740
-
-
Latif, R.1
Hussain, M.2
-
13
-
-
14844303406
-
Source-Location Privacy in Energy-Constrained Sensor Network Routing
-
Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 88-93 (2004)
-
(2004)
2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004)
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
14
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Computer Networks 53(9), 1512-1529 (2009)
-
(2009)
Computer Networks
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
16
-
-
48349110568
-
Location Privacy in Sensor Networks Against a Global Eavesdropper
-
Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: IEEE International Conference on Network Protocols (ICNP 2007), pp. 314-323 (2007)
-
(2007)
IEEE International Conference on Network Protocols (ICNP 2007)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
17
-
-
56749163645
-
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks
-
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks. In: 1st ACM Conference on Wireless Network Security (WiSec 2008), pp. 77-88 (2008)
-
(2008)
1st ACM Conference on Wireless Network Security (WiSec 2008)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
18
-
-
51349086896
-
Towards Statistically Strong Source Anonymity for Sensor Networks
-
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards Statistically Strong Source Anonymity for Sensor Networks. In: 27th IEEE Conference on Computer Communications (INFOCOM 2008), pp. 466-474 (2008)
-
(2008)
27th IEEE Conference on Computer Communications (INFOCOM 2008)
, pp. 466-474
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
19
-
-
79551633151
-
Statistical Framework for Source Anonymity in Sensor Networks
-
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Statistical Framework for Source Anonymity in Sensor Networks. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1-6 (2010)
-
(2010)
IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-6
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
20
-
-
77953961038
-
Increasing base-station anonymity in wireless sensor networks
-
Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks 8(8), 791-809 (2010)
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.8
, pp. 791-809
-
-
Acharya, U.1
Younis, M.2
|