-
1
-
-
84925443479
-
Survey on wireless sensor network technologies for industrial automation: the security and quality of service perspectives
-
Christin D, Mogre PS, Hollick M. Survey on wireless sensor network technologies for industrial automation: the security and quality of service perspectives. Future Internet 2010; 2(2):96-125.
-
(2010)
Future Internet
, vol.2
, Issue.2
, pp. 96-125
-
-
Christin, D.1
Mogre, P.S.2
Hollick, M.3
-
2
-
-
83155184795
-
-
Overview of security issues in wireless sensor networks, in Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM)
-
Modares H, Salleh R, Moravejosharieh A. Overview of security issues in wireless sensor networks, in Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2011; 308-311.
-
(2011)
, pp. 308-311
-
-
Modares, H.1
Salleh, R.2
Moravejosharieh, A.3
-
3
-
-
78651454154
-
-
QoS and security in energy-harvesting wireless sensor networks, in International Conference on Security and Cryptography (SECRYPT)
-
Taddeo AV, Mura M, Ferrante A. QoS and security in energy-harvesting wireless sensor networks, in International Conference on Security and Cryptography (SECRYPT), 2010; 1-10.
-
(2010)
, pp. 1-10
-
-
Taddeo, A.V.1
Mura, M.2
Ferrante, A.3
-
4
-
-
80052224918
-
-
Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on wireless multimedia sensor network, in International Conference on Recent Trends in Information Technology (ICRTIT)
-
Vithya B, Vinayagasundaram G. Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on wireless multimedia sensor network, in International Conference on Recent Trends in Information Technology (ICRTIT), 2011; 444-449.
-
(2011)
, pp. 444-449
-
-
Vithya, B.1
Vinayagasundaram, G.2
-
5
-
-
25844435733
-
-
PIKE: peer intermediaries for key establishment in sensor networks, in INFOCOM
-
Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks, in INFOCOM, 2005.
-
(2005)
-
-
Chan, H.1
Perrig, A.2
-
6
-
-
4544293215
-
-
Location-based pairwise key establishments for static sensor networks, in ACM Workshop on Security in Ad Hoc and Sensor Networks
-
Liu D, Ning P. Location-based pairwise key establishments for static sensor networks, in ACM Workshop on Security in Ad Hoc and Sensor Networks, 2003; 72-82.
-
(2003)
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
7
-
-
28444433009
-
-
Random key predistribution schemes for sensor networks, in IEEE Symposium on Research in Security and Privacy
-
Chan AP, Chan DSH. Random key predistribution schemes for sensor networks, in IEEE Symposium on Research in Security and Privacy, 2003, 197-213.
-
(2003)
, pp. 197-213
-
-
Chan, A.P.1
Chan, D.S.H.2
-
8
-
-
33749033368
-
-
Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security
-
Du W, Liu D, Ning P. Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security, 2005.
-
(2005)
-
-
Du, W.1
Liu, D.2
Ning, P.3
-
9
-
-
66549123136
-
-
An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks, in Proceedings of First International Conference on COMmunication Systems and NETworkS (COMSNETS)
-
Das AK. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks, in Proceedings of First International Conference on COMmunication Systems and NETworkS (COMSNETS), 2009; 1-10.
-
(2009)
, pp. 1-10
-
-
Das, A.K.1
-
10
-
-
0038112369
-
-
John Wiley and Sons, vol. 2, no. 470845295
-
Nicopolitidis P. Wireless Networks, John Wiley and Sons, vol. 2, no. 470845295, 2003.
-
(2003)
Wireless Networks
-
-
Nicopolitidis, P.1
-
11
-
-
34250659309
-
Key management for long lived sensor networks in hostile environments
-
Chorzempa M, Park J-M, Eltoweissy M. Key management for long lived sensor networks in hostile environments. Computer Communications 2007; 30(9):1964-1979.
-
(2007)
Computer Communications
, vol.30
, Issue.9
, pp. 1964-1979
-
-
Chorzempa, M.1
Park, J.-M.2
Eltoweissy, M.3
-
12
-
-
84943753034
-
-
Secure aggregation for wireless networks, in Workshop on Security and Assurance in Ad hoc Networks
-
Hu L, Evans D. Secure aggregation for wireless networks, in Workshop on Security and Assurance in Ad hoc Networks, 2003.
-
(2003)
-
-
Hu, L.1
Evans, D.2
-
13
-
-
84875684075
-
-
Efficient secure aggregation in sensor networks, in Proceedings of the 11th International Conference on High Performance Computing
-
Jadia P, Mathuria A. Efficient secure aggregation in sensor networks, in Proceedings of the 11th International Conference on High Performance Computing, 2004.
-
(2004)
-
-
Jadia, P.1
Mathuria, A.2
-
14
-
-
18844457825
-
-
SIA: secure information aggregation in sensor networks, in 1st International Conference on Embedded Networked Sensor Systems
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks, in 1st International Conference on Embedded Networked Sensor Systems, 2003.
-
(2003)
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
15
-
-
84875646500
-
-
Cryptographic apparatus and method, U.S. Patent US42007701980.
-
Merkle RC, Cryptographic apparatus and method, U.S. Patent US42007701980.
-
-
-
Merkle, R.C.1
-
16
-
-
84875683862
-
-
SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in ACM MOBIHOC
-
Yang Y, Wang X, Zhu S, Cao G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in ACM MOBIHOC, 2006.
-
(2006)
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
17
-
-
33845747795
-
-
Secure hierarchical in-network aggregation in sensor networks, in 13th ACM conference on Computer and communications security
-
Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks, in 13th ACM conference on Computer and communications security, 2006.
-
(2006)
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
18
-
-
3042785862
-
-
The Sybil attack in sensor networks: analysis and defences, in Third International Symposium on Information Processing in Sensor Networks
-
Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis and defences, in Third International Symposium on Information Processing in Sensor Networks, 2004; 259-268.
-
(2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
19
-
-
84875663118
-
-
The performance of dynamic group-based key establishment (DGKE) under node capture attacks in wireless sensor networks, in 2nd Conference on Advances in Computer Security and Forensics (ACSF)
-
Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. The performance of dynamic group-based key establishment (DGKE) under node capture attacks in wireless sensor networks, in 2nd Conference on Advances in Computer Security and Forensics (ACSF), 2007.
-
(2007)
-
-
Kifayat, K.1
Merabti, M.2
Shi, Q.3
Llewellyn-Jones, D.4
-
20
-
-
85037175440
-
-
Wireless sensor networks security: a survey, security in distributed, grid, and pervasive computing
-
Walters JP, Liang Z, Shi W, Chaudhary V. Wireless sensor networks security: a survey, security in distributed, grid, and pervasive computing, 367-410, 2007.
-
(2007)
, pp. 367-410
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
21
-
-
33746874914
-
-
On the forward and backward secrecy of HLL group key exchange mechanism, in Proceedings of the Fifth International Conference on Computer and Information Technology
-
Chang C, Lee J, Chen C. On the forward and backward secrecy of HLL group key exchange mechanism, in Proceedings of the Fifth International Conference on Computer and Information Technology, 2005; 702-705.
-
(2005)
, pp. 702-705
-
-
Chang, C.1
Lee, J.2
Chen, C.3
-
22
-
-
8344262333
-
-
A key management scheme for wireless sensor networks using deployment knowledge, in IEEE INFOCOM
-
Du W, Deng J, Han YS, Chen S, Varshney P. A key management scheme for wireless sensor networks using deployment knowledge, in IEEE INFOCOM, 2004.
-
(2004)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
23
-
-
70350642087
-
-
Fully homomorphic encryption using ideal lattices, in 41st ACM Symposium on Theory of Computing (STOC)
-
Gentry C. Fully homomorphic encryption using ideal lattices, in 41st ACM Symposium on Theory of Computing (STOC), 2009.
-
(2009)
-
-
Gentry, C.1
-
24
-
-
3142716056
-
-
Order preserving encryption for numeric data, in ACM International Conference on Management of Data (SIGMOD)
-
Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data, in ACM International Conference on Management of Data (SIGMOD), 2004; 563 - 574.
-
(2004)
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
25
-
-
33744499939
-
-
Secure comparison of encrypted data in wireless sensor networks, in WiOpt
-
Acharya M, Girao J, Westhoff V. Secure comparison of encrypted data in wireless sensor networks, in WiOpt, 2005; 47-53.
-
(2005)
, pp. 47-53
-
-
Acharya, M.1
Girao, J.2
Westhoff, V.3
-
26
-
-
8344262333
-
-
A key management scheme for wireless sensor networks using deployment knowledge, in INFOCOM
-
Du W, Deng J, Han Y, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge, in INFOCOM, 2004.
-
(2004)
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.K.5
-
27
-
-
0033877788
-
-
Energy-efficient communication protocol for wireless microsensor networks, in Hawaiian International Conference On Systems Science On Systems Science
-
Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks, in Hawaiian International Conference On Systems Science On Systems Science, 2000.
-
(2000)
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
28
-
-
33749033368
-
-
Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security (WiSec)
-
Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security (WiSec), 2005.
-
(2005)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
29
-
-
33750297758
-
-
State-based key management scheme for wireless sensor networks, in IEEE Mobile Ad hoc and Sensor Systems Conference
-
Park J, Kim Z, Kim K. State-based key management scheme for wireless sensor networks, in IEEE Mobile Ad hoc and Sensor Systems Conference, 2005.
-
(2005)
-
-
Park, J.1
Kim, Z.2
Kim, K.3
-
30
-
-
85030460443
-
-
A threshold cryptosystem without a trusted party, in EUROCRYPT;
-
Pedersen TP. A threshold cryptosystem without a trusted party, in EUROCRYPT; 1991; 522-526.
-
(1991)
, pp. 522-526
-
-
Pedersen, T.P.1
|