-
1
-
-
24944463915
-
Cluster-based routing in wireless sensor networks: Issues and challenge
-
J. ibriq and I. Mahgoub, "Cluster-based routing in wireless sensor networks: issues and challenge", in SPECS'04, 2004, pp. 759-766.
-
(2004)
SPECS'04
, pp. 759-766
-
-
Ibriq, J.1
Mahgoub, I.2
-
4
-
-
0038276034
-
Eavesdropping games: A graph-theoretic approach to privacy in distributed systems
-
M. Franklin, Z. Galil, and M. Yung, "Eavesdropping games: a graph-theoretic approach to privacy in distributed systems", J. ACM, vol. 47, no. 2, pp. 225-243, 2000.
-
(2000)
J. ACM
, vol.47
, Issue.2
, pp. 225-243
-
-
Franklin, M.1
Galil, Z.2
Yung, M.3
-
7
-
-
84892103001
-
-
Online
-
[Online]. Available: http://www.faqs.org/rfcs/rfc1455.html
-
-
-
-
9
-
-
0036953714
-
Using directional antennas for medium access control in ad hoc networks
-
New York: ACM
-
R. R. Choudhury, X. Yang, N. H. Vaidya, and R. Ramanathan, "Using directional antennas for medium access control in ad hoc networks", in MobiCom'02: Proceedings of the 8th annual international conference on Mobile computing and networking. New York: ACM, 2002, pp. 59-70.
-
(2002)
MobiCom'02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 59-70
-
-
Choudhury, R.R.1
Yang, X.2
Vaidya, N.H.3
Ramanathan, R.4
-
10
-
-
0242443783
-
On the capacity improvement of ad hoc wireless networks using directional antennas
-
New York: ACM
-
S. Yi, Y. Pei, and S. Kalyanaraman, "On the capacity improvement of ad hoc wireless networks using directional antennas", in MobiHoc'03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2003, pp. 108-116.
-
(2003)
MobiHoc'03: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 108-116
-
-
Yi, S.1
Pei, Y.2
Kalyanaraman, S.3
-
11
-
-
0242696194
-
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
-
New York: ACM
-
M. Takai, J. Martin, R. Bagrodia, and A. Ren, "Directional virtual carrier sensing for directional antennas in mobile ad hoc networks", in MobiHoc'02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2002, pp. 183-193.
-
(2002)
MobiHoc'02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 183-193
-
-
Takai, M.1
Martin, J.2
Bagrodia, R.3
Ren, A.4
-
13
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
14
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
New York: ACM
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks", in MobiHoc'01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2001, pp. 146-155.
-
(2001)
MobiHoc'01: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
16
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington, DC: IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks", in SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003, p. 197.
-
(2003)
SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig, "Pike: Peer intermediaries for key establishment in sensor networks", in IEEE Infocom, 2005.
-
(2005)
IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
20
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
New York: ACM
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks", in CCS'03: Proceedings of the 10th ACM conference on Computer and communications security. New York: ACM, 2003, pp. 42-51.
-
(2003)
CCS'03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
22
-
-
84892024535
-
-
L. Ma, X. Cheng, F. Liu, M. Rivera, F. An, and J. Li, "ikms: An in-situ key management scheme for wireless sensor networks", 2005.
-
(2005)
Ikms: An In-situ Key Management Scheme for Wireless Sensor Networks
-
-
Ma, L.1
Cheng, X.2
Liu, F.3
Rivera, M.4
An, F.5
Li, J.6
-
24
-
-
84892026817
-
-
Online
-
[Online]. Available: http://www.eweek.com/encyclopedia-term/0, 2542, t=MAC+layeri=46426, 00.asp
-
-
-
-
27
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks", Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
28
-
-
10644269064
-
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Prevention of denial of service attacks and selfishness in mobile ad hoc networks", in Institut Eurecom Research Report RR-02-063, 2002.
-
(2002)
Institut Eurecom Research Report RR-02-063
-
-
Michiardi, P.1
Molva, R.2
-
32
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
New York: ACM
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses", in IPSN'04: Proceedings of the third international symposium on Information processing in sensor networks. New York: ACM, 2004, pp. 259-268.
-
(2004)
IPSN'04: Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
33
-
-
1542360013
-
Detection and handling of mac layer misbehavior in wireless networks
-
P. Kyasanur and N. H. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks." in DSN, 2003, pp. 173-182.
-
(2003)
DSN
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
34
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York: ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", in MobiCom'00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York: ACM, 2000, pp. 255-265.
-
(2000)
MobiCom'00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
35
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks", Wirel. Netw., vol. 9, no. 5, pp. 545-556, 2003.
-
(2003)
Wirel. Netw.
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
37
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Deventer, The Netherlands, The Netherlands: Kluwer, B. V.
-
P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", in Proceedings of the IFIP TC6/TC11 6th joint working conference on communications and multimedia security. Deventer, The Netherlands, The Netherlands: Kluwer, B. V., 2002, pp. 107-121.
-
(2002)
Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
39
-
-
84948142128
-
Multiple access in ad-hoc wireless lans with noncooperative stations
-
J. Konorski, "Multiple access in ad-hoc wireless lans with noncooperative stations." in NET-WORKING, 2002, pp. 1141-1146.
-
(2002)
NET-WORKING
, pp. 1141-1146
-
-
Konorski, J.1
-
40
-
-
14844282678
-
On cheating in csma/ca ad hoc networks
-
M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On cheating in csma/ca ad hoc networks", in EPFL Technical Report, 2004.
-
(2004)
EPFL Technical Report
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
-
41
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, "Swatt: Software-based attestation for embedded devices." in IEEE Symposium on Security and Privacy, 2004, pp. 272-282.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
44
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures", Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 293-315, September 2003.
-
(2003)
Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
45
-
-
0003657779
-
-
D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin, and S. Wicker, "An empirical study of epidemic algorithms in large scale multihop wireless networks", 2002.
-
(2002)
An Empirical Study of Epidemic Algorithms in Large Scale Multihop Wireless Networks
-
-
Ganesan, D.1
Krishnamachari, B.2
Woo, A.3
Culler, D.4
Estrin, D.5
Wicker, S.6
-
47
-
-
0013043106
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly- resilient, energy-efficient multipath routing in wireless sensor networks", SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 4, pp. 11-25, 2001.
-
(2001)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.5
, Issue.4
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
48
-
-
4444237581
-
Spread: Enhancing data confidentiality in mobile ad hoc networks
-
W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing data confidentiality in mobile ad hoc networks", in IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
50
-
-
33845920022
-
Models of authentication in ad hoc networks and their related network properties
-
Online
-
K. Hoeper and G. Gong, "Models of authentication in ad hoc networks and their related network properties", in Tech Reports, 2004. [Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2004/cacr2004-03.pdf
-
(2004)
Tech Reports
-
-
Hoeper, K.1
Gong, G.2
-
51
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
J. Binkley and W. Trost, "Authenticated ad hoc routing at the link layer for mobile systems", Wirel. Netw., vol. 7, no. 2, pp. 139-145, 2001.
-
(2001)
Wirel. Netw.
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
Trost, W.2
-
54
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
Online
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: security protocols for sensor netowrks", in Mobile Computing and Networking, 2001, pp. 189-199. [Online]. Available: citeseer.ist.psu.edu/ perrig01spins.html
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
55
-
-
84961572484
-
Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks
-
jun, Online
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks", in 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02), jun 2002, pp. 3-13. [Online]. Available: citeseer.ist.psu.edu/hu02sead.html
-
(2002)
4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
56
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
MobiCom, Sept. 2002, in press. Online
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks", in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), Sept. 2002, (in press). [Online]. Available: citeseer.ist.psu.edu/article/ hu02ariadne.html
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
59
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi and A. Perrig, "Designing secure sensor networks", IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
60
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks", Wirel. Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
63
-
-
25844521520
-
Localized fault-tolerant event boundary detection in sensor networks
-
Miami, FL, March
-
M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks", in Proceedings of IEEE INFOCOM, Miami, FL, March 2005.
-
(2005)
Proceedings of IEEE INFOCOM
-
-
Ding, M.1
Chen, D.2
Xing, K.3
Cheng, X.4
-
64
-
-
14344259796
-
Distributed deviation detection in sensor networks
-
T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed deviation detection in sensor networks", SIGMOD Rec., vol. 32, no. 4, pp. 77-82, 2003.
-
(2003)
SIGMOD Rec.
, vol.32
, Issue.4
, pp. 77-82
-
-
Palpanas, T.1
Papadopoulos, D.2
Kalogeraki, V.3
Gunopulos, D.4
-
65
-
-
0036986435
-
Efficient tracing of failed nodes in sensor networks
-
New York: ACM
-
J. Staddon, D. Balfanz, and G. Durfee, "Efficient tracing of failed nodes in sensor networks", in WSNA'02: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. New York: ACM, 2002, pp. 122-130.
-
(2002)
WSNA'02: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 122-130
-
-
Staddon, J.1
Balfanz, D.2
Durfee, G.3
|