-
1
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. Leung, "Body area networks: A survey," Mobile Netw. Appl., vol. 16, no. 2, pp. 171-193, 2011.
-
(2011)
Mobile Netw. Appl.
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.5
-
2
-
-
35549002780
-
Addressing security in medical sensor networks
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. HealthNet, 2007, pp. 7-12.
-
(2007)
Proc. HealthNet
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
4
-
-
70449562519
-
IBE-Lite: A lightweight identity-based cryptography for body sensor networks
-
Nov
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
5
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
Oct
-
D. He, J. Bu, S. Zhu, S. Chan, and C. Chen, "Distributed access control with privacy support in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3472-3481, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.1
Bu, J.2
Zhu, S.3
Chan, S.4
Chen, C.5
-
6
-
-
74549185267
-
Collection tree protocol
-
O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, "Collection tree protocol," in Proc. SenSys, 2009, pp. 1-14.
-
(2009)
Proc. SenSys
, pp. 1-14
-
-
Gnawali, O.1
Fonseca, R.2
Jamieson, K.3
Moss, D.4
Levis, P.5
-
7
-
-
0009481412
-
A survey of trust in Internet applications
-
Fourth Quarter
-
T. Grandison and M. Sloman, "A survey of trust in Internet applications," IEEE Commun. Surv. Tutorials, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000.
-
(2000)
IEEE Commun. Surv. Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
8
-
-
17644415405
-
Developing trust in large-scale peer-to-peer systems
-
B. Yu, M. Singh, and K. Sycara, "Developing trust in large-scale peer-to-peer systems," in Proc. IEEE First Symp. Multi-Agent Security and Survivability, 2004, pp. 1-10.
-
(2004)
Proc. IEEE First Symp. Multi-Agent Security and Survivability
, pp. 1-10
-
-
Yu, B.1
Singh, M.2
Sycara, K.3
-
9
-
-
67349129674
-
A secure mobile healthcare system using trust-based multicast scheme
-
May
-
A. Boukerche and Y. Ren, "A secure mobile healthcare system using trust-based multicast scheme," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 387-399, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.4
, pp. 387-399
-
-
Boukerche, A.1
Ren, Y.2
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. Mobicom 2000, pp., 255-265.
-
(2000)
Proc. Mobicom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
11
-
-
33845715578
-
Location verification and trust management for resilient geographic routing
-
K. Liu, N. Ghazaleh, and K. Kang, "Location verification and trust management for resilient geographic routing," J. Parallel Distrib. Comput., vol. 67, no. 2, pp. 215-228, 2007.
-
(2007)
J. Parallel Distrib. Comput.
, vol.67
, Issue.2
, pp. 215-228
-
-
Liu, K.1
Ghazaleh, N.2
Kang, K.3
-
13
-
-
77951542715
-
A trust management scheme for enhancing security in pervasive wireless networks
-
M. K. Denko, T. Sun, I. Woungang, J. Rodrigues, and H.-C. Chao, "A trust management scheme for enhancing security in pervasive wireless networks," in Proc. GLOBECOM, 2009, pp. 1-6.
-
(2009)
Proc. GLOBECOM
, pp. 1-6
-
-
Denko, M.K.1
Sun, T.2
Woungang, I.3
Rodrigues, J.4
Chao, H.-C.5
-
14
-
-
44049090146
-
A trust evaluation method for node cooperation in mobile ad hoc networks
-
K. Wang, M. Wu, and S. Shen, "A trust evaluation method for node cooperation in mobile ad hoc networks," in Proc. 5th Int. Conf. Inf. Technol: New Gen., 2008, pp. 1000-1005.
-
(2008)
Proc. 5th Int. Conf. Inf. Technol: New Gen
, pp. 1000-1005
-
-
Wang, K.1
Wu, M.2
Shen, S.3
-
15
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., 2005, pp. 609-619.
-
(2005)
Proc. IEEE Int. Conf. Distrib. Comput. Syst
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
16
-
-
27644533289
-
The flooding time synchronization protocol
-
M. Maróti, B. Kusy, G. Simon, and A. Lédeczi, "The flooding time synchronization protocol," in Proc. Sensys, 2004, pp. 39-49.
-
(2004)
Proc. Sensys
, pp. 39-49
-
-
Maróti, M.1
Kusy, B.2
Simon, G.3
Lédeczi, A.4
-
18
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inf. Syst. Security, vol. 8, no. 2, pp. 228-258, 2005.
-
(2005)
ACM Trans. Inf. Syst. Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
19
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sens. Netw., vol. 2, no. 4, pp. 500-528, 2006.
-
(2006)
ACM Trans. Sens. Netw.
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
20
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Supp. Syst., vol. 43, no. 2, pp. 618-644, 2005.
-
(2005)
Decis. Supp. Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
21
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
H. Song, L. Xie, S. Zhu, and G. Cao, "Sensor node compromise detection: the location perspective," in Proc. Int. Conf. Wireless Commun. and Mobie Comput., 2007, pp. 242-247.
-
(2007)
Proc. Int. Conf. Wireless Commun. and Mobie Comput
, pp. 242-247
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
22
-
-
84870901428
-
Using wearable sensors for remote healthcare monitoring system
-
A. Abidoye, N. Azeez, A. Adesina, K. Agbele, and H. Nyongesa, "Using wearable sensors for remote healthcare monitoring system," J. Sens. Technol., vol. 1, no. 2, pp. 22-28, 2011.
-
(2011)
J. Sens. Technol.
, vol.1
, Issue.2
, pp. 22-28
-
-
Abidoye, A.1
Azeez, N.2
Adesina, A.3
Agbele, K.4
Nyongesa, H.5
-
24
-
-
79957583041
-
Multimedia traffic security architecture for the internet of things
-
May/Jun
-
L. Zhou and H.-C. Chao, "Multimedia traffic security architecture for the internet of things," IEEE Netw. Mag., vol. 25, no. 3, pp. 35-40, May/Jun. 2011.
-
(2011)
IEEE Netw. Mag.
, vol.25
, Issue.3
, pp. 35-40
-
-
Zhou, L.1
Chao, H.-C.2
-
25
-
-
41549167232
-
A framework for identifying compromised nodes in wireless sensor networks
-
Q. Zhang, T. Yu, and P. Ning, "A framework for identifying compromised nodes in wireless sensor networks," ACM Trans. Inf. Syst. Security, vol. 11, no. 3, pp. 1-37, 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.11
, Issue.3
, pp. 1-37
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
-
26
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May/Jun
-
Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security Privacy, vol. 2, no. 3, pp. 28-39, May/Jun. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
|