-
1
-
-
10644250089
-
Security considerations i n ad hoc sensor networks
-
F . Hu and N. Sharma, " Security considerations i n ad hoc sensor networks," Ad Hoc Networks. vol. 3, pp. 69-89, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, pp. 69-89
-
-
Hu, F.1
Sharma, N.2
-
2
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wireless networks, vol. 1 1 , pp. 2 1-3 8 , 2005.
-
(2005)
Wireless Networks
, vol.11
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
3
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y. Hu, D. Johnson, and A. Perrig, " SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, " Ad Hoc Networks, vol. 1 , pp. 1 75-1 92, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
5
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
S. Vi, P. Naldurg, and R. Kravets, " Security-aware ad hoc routing for wireless networks, " Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 299-3 02, 2001 .
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 299-302
-
-
Vi, S.1
Naldurg, P.2
Kravets, R.3
-
6
-
-
84874432724
-
-
DARPA Project report, (Cryptographic Technologies Group, Trusted lriformation System. NAI Labs)
-
D. Cannan, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security (final)," DARPA Project report, (Cryptographic Technologies Group, Trusted lriformation System. NAI Labs), vol. 1 , pp. 1 , 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security (Final)
, vol.1
, pp. 1
-
-
Cannan, D.1
Kruus, P.2
Matt, B.3
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, " Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1 , pp. 293-3 1 5, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
A. Pathan, H. Lee, and C. Hong, " Security in wireless sensor networks: issues and challenges," Advanced Communication Technology, 2006. ICA CT 2006. The 8th International Coriference, vol. 2, pp. 6-1 048, 2006.
-
(2006)
Advanced Communication Technology, 2006. ICA CT 2006. The 8th International Coriference
, vol.2
, pp. 6-1048
-
-
Pathan, A.1
Lee, H.2
Hong, C.3
-
9
-
-
77950866308
-
Trust management systems for wireless sensor networks: Best practices
-
J. Lopez, R. Roman, 1. Agudo, and C. Fernandez-Gago, " Trust management systems for wireless sensor networks: Best practices," Computer Communications. vol. 33, pp. 1 086-1 093 , 2010.
-
(2010)
Computer Communications
, vol.33
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
10
-
-
24744432675
-
Seltpolicing mobile ad hoc networks by reputation systems
-
S Buchegger and J. Y. Le Boudee, " Seltpolicing mobile ad hoc networks by reputation systems," Communications Magazine. IEEE. vol. 43, pp. 1 0 1-1 07, 2005.
-
(2005)
Communications Magazine. IEEE
, vol.43
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.Y.2
-
14
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
-
Q. He, D. Wu, and P. Khosla, " SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks, " Wireless Communications and Networking Conference, 2004. WCNC 2004 IEEE, vol. 2, pp. 825-830, 2004.
-
(2004)
Wireless Communications and Networking Conference, 2004. WCNC 2004 IEEE
, vol.2
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, " Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of the 6th annual international coriference on Mobile computing and networking. pp. 255-265, 2000.
-
(2000)
Proceedings of the 6th Annual International Coriference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
16
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, " The sybil attack in sensor networks: analysis & defenses, " Proceedings of the 3rd international symposium on lriformation processing in sensor networks, pp. 259-268, 2004.
-
(2004)
Proceedings of the 3rd International Symposium on Lriformation Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
20
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire TinyOS applications
-
P . Levis, N. Lee, M. Welsh, and D . Culler, " TOSSIM: Accurate and scalable simulation of entire TinyOS applications," Proceedings of the I st international coriference on Embedded networked sensor systems, pp. 1 26-1 3 7, 2003.
-
(2003)
Proceedings of the i St International Coriference on Embedded Networked Sensor Systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
|