-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4, 393-422
-
(2002)
Comput. Netw.
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
IEEE Computer Society Press, Los Alamitos, CA
-
Anderson, R., Chan, H., and Perrig, A. 2004. Key infection: Smart trust for smart dust. In Proceedings of IEEE International Conference on Network Protocols (ICNP 2004). IEEE Computer Society Press, Los Alamitos, CA
-
(2004)
Proceedings of IEEE International Conference on Network Protocols (ICNP 2004)
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
3
-
-
0035789267
-
Secure pebblenets
-
ACM, New York
-
Basagni, S., Herrin, K., Bruschi, D., and Rosti, E. 2001. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile ad hoc Networking and Computing. ACM, New York, 156-163
-
(2001)
Proceedings of ACM International Symposium on Mobile ad hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
4
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Lecture Notes in Computer Science, Springer Verlag, New York
-
Blom, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of EUROCRYPT 84. Lecture Notes in Computer Science, Vol. 209. Springer Verlag, New York, 335-338
-
(1985)
Advances in Cryptology: Proceedings of EUROCRYPT 84
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
85028765277
-
-
In Advances in Cryptology - CRYPTO '92. Lecture Notes in Computer Science, Springer-Verlog, New York
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yag, M. 1993. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92. Lecture Notes in Computer Science Vol. 740. Springer-Verlog, New York, 471-486
-
(1993)
Perfectly-secure key distribution for dynamic conferences
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yag, M.6
-
6
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)
-
New York, ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
Buchegger, S. and Boudec, J. L. 2002. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the 3rd ACM, New York, ACM International Symposium on Mobile Ad Hoc Networking and Computing. 226-236
-
(2002)
Proceedings of the 3rd ACM
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.L.2
-
7
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
NAI Labs
-
Carman, D., Krs, P., and Matt B. J. 2000. Constrains and approaches for distributed sensor network security. Tech. rep., NAI Labs
-
(2000)
Tech. rep.
-
-
Carman, D.1
Krs, P.2
Matt, B.J.3
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA 197-213
-
(2003)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
11
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Press
-
Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04. IEEE Computer Society Press, Los Alamitos, CA
-
(2004)
Proceedings of IEEE INFOCOM'04. IEEE Computer Society
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
12
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
ACM, New York
-
Du, W., Deng, J., Han, Y. S., and Varshney, P. 2003. A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). ACM, New York, 42-51
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
13
-
-
33746313270
-
Lad: Localization anomaly detection for wireless sensor networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Du, W., Fang, L., and Ning, P. 2005. Lad: Localization anomaly detection for wireless sensor networks. In Proceedings of the 19th IEEE International Parallel & Distributed Processing Symposium (IPDPS '05). IEEE Computer Society Press, Los Alamitos, CA
-
(2005)
Proceedings of the 19th IEEE International Parallel & Distributed Processing Symposium (IPDPS '05)
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
15
-
-
0022793132
-
How to construct random functions
-
(Oct.)
-
Goldreich, O., Goldwasser, S., and Micali, S. 1986. How to construct random functions. J ACM 33, 4 (Oct.), 792-807
-
(1986)
J ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
16
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUS
-
Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S. 2004. Comparing elliptic curve cryptography and RSA on 8-bit CPUS. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)
-
(2004)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
19
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Hu, Y., Perrig, A., and Johnson, D. 2003. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM2003. IEEE Computer Society Press, Los Alamitos, CA
-
(2003)
Proceedings of INFOCOM2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
28
-
-
33749033368
-
Group-based key predistribution in wireless sensor networks
-
ACM, New York
-
Liu, D., Ning, P., and Du, W. 2005c. Group-based key predistribution in wireless sensor networks. In Proceedings of2005 ACM Workshop on Wireless Security (WiSe 2005). ACM, New York
-
(2005)
Proceedings of2005 ACM Workshop on Wireless Security (WiSe 2005)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
29
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
(Feb.), 41-77
-
Liu, D., Ning, P., and Li, R. 2005d. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Sys. Sec. 8, 1 (Feb.), 41-77
-
(2005)
ACM Trans. Inf. Sys. Sec.
, vol.8
, pp. 1
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
30
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM, New York
-
Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, New York, 255-265
-
(2000)
Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
31
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
IEEE Computer Society Press, Los Alamitos, CA
-
Newsome, J., Shi, R., Song, D., and Perrig, A. 2004. The sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004). IEEE Computer Society Press, Los Alamitos, CA
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
32
-
-
0035684931
-
Ad hoc positioning system (APS)
-
IEEE Computer Society Press, Los Alamitos, CA
-
Niculescu, D. and Nath, B. 2001. Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM'01. IEEE Computer Society Press, Los Alamitos, CA
-
(2001)
Proceedings of IEEE GLOBECOM'01
-
-
Niculescu, D.1
Nath, B.2
-
33
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
IEEE Computer Society Press, Los Alamitos, CA
-
Perrig, A., Canetti, R., Song, D., and Tygar, D. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
34
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Perrig, A., Canetti, R., Song, D., and Tygar, D. 2001a. Efficient and secure source authentication for multicast. In Proceedings of the Network and Distributed System Security Symposium
-
(2001)
Proceedings of the Network and Distributed System Security Symposium
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
35
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Perrig, A., Canetti, R., Song, D., and Tygar, D. 2002. The TESLA broadcast authentication protocol. In RSA Cryptobytes
-
(2002)
RSA Cryptobytes
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
36
-
-
0034771605
-
SPINS: Security protocols for sensornetworks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, D. 2001b. SPINS: Security protocols for sensornetworks. In Proceedings of the 7th Annual International Conference onMobile Computing and Networks
-
(2001)
Proceedings of the 7th Annual International Conference onMobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
37
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
ACM, New York
-
Przydatek, B., Song, D., and Perrig, A. 2003. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSys '03). ACM, New York
-
(2003)
Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSys '03)
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
38
-
-
1542317849
-
Secure verification of location claims
-
ACM, New York
-
Sastry, N., Shankar, U, and Wagner, D. 2003. Secure verification of location claims. In Proceeding of the ACM Workshop on Wireless Security. ACM, New York
-
(2003)
Proceeding of the ACM Workshop on Wireless Security
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
39
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
ACM, New York
-
Shnayder, V., Hempstead, M., Chen, B., Werner-Allen, G., and Welsh, M. 2004. Simulating the power consumption of large-scale sensor network applications. In Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys'04). ACM, New York
-
(2004)
Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys'04)
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Werner-Allen, G.4
Welsh, M.5
-
41
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Wong, D. and Chan, A. 2001. Efficient and mutually authenticated key exchange for low power computing devices. In Proceedings of ASIA CRYPT
-
(2001)
Proceedings of ASIA CRYPT
-
-
Wong, D.1
Chan, A.2
-
42
-
-
0036793924
-
Denial of service in sensornetworks
-
Wood, A. D. and Stankovic, J. A. 2002. Denial of service in sensornetworks. IEEE Compute 35, 10, 54-62
-
(2002)
IEEE Compute
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
43
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM, New York
-
Zhu, S., Setia, S., and Jajodia, S. 2003. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). ACM, New York. 62-72
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
44
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Zhu, S., Setia, S., Jajodia, S., and Ning, P. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of2004 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA
-
(2004)
Proceedings of2004 IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|