-
1
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
DOI 10.1109/TSMCC.2007.905824
-
R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, "On the detection of clones in sensor networks using random key predistribution," IEEE Trans. Syst., Man, Cybern. C, Applicat. Rev., vol. 37, no. 6, pp. 1246-1258, Nov. 2007. (Pubitemid 350130716)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
2
-
-
3042778324
-
Stochastic properties of the random waypoint mobility model
-
C. Bettstetter, H. Hartenstein, and X. P. Costa, "Stochastic properties of the random waypoint mobility model," Wireless Netw., vol. 10, no. 5, pp. 555-567, 2004.
-
(2004)
Wireless Netw
, vol.10
, Issue.5
, pp. 555-567
-
-
Bettstetter, C.1
Hartenstein, H.2
Costa, X.P.3
-
3
-
-
14844367057
-
An improved data stream summary the count-min sketch and its applications
-
G. Cormode and S. Muthukrishnan, "An improved data stream summary the count-min sketch and its applications," J. Algorithms, vol. 55, no. 1, pp. 56-75, 2005.
-
(2005)
J. Algorithms
, vol.55
, Issue.1
, pp. 56-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
4
-
-
37849004592
-
Arandomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
Montreal, Canada
-
M. Conti, R.Di Pietro, L. V. Mancini, andA.Mei, "Arandomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, Canada, 2007, pp. 80-89.
-
(2007)
Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
5
-
-
79960522083
-
Distributed detection of clone attacks in wireless sensor networks
-
Sep./Oct.
-
M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "Distributed detection of clone attacks in wireless sensor networks," IEEE Trans. Depend. Secure Comput., vol. 8, no. 5, pp. 685-698, Sep./Oct. 2012.
-
(2012)
IEEE Trans. Depend. Secure Comput
, vol.8
, Issue.5
, pp. 685-698
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
6
-
-
84855725716
-
Wireless sensor replica detection in mobile environment
-
Hong Kong, China
-
M. Conti, R. D. Pietro, and A. Spognardi, "Wireless sensor replica detection in mobile environment," in Proc. Int. Conf. Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012, pp. 249-264.
-
(2012)
Proc. Int. Conf. Distributed Computing and Networking (ICDCN)
, pp. 249-264
-
-
Conti, M.1
Pietro, R.D.2
Spognardi, A.3
-
7
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
Nice, France
-
H. Choi, S. Zhu, and T. F. La Porta, "SET: Detecting node clones in sensor networks," in Proc. Int. ICST Conf. Security and Privacy in Communication Networks (Securecomm), Nice, France, 2007, pp. 341-350.
-
(2007)
Proc. Int. ICST Conf. Security and Privacy in Communication Networks (Securecomm)
, pp. 341-350
-
-
Choi, H.1
Zhu, S.2
La Porta, T.F.3
-
8
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
DOI 10.1016/j.peva.2005.07.018, PII S0166531605000970, Performance 2005
-
R. Groenevelt, P. Nain, and G. Koole, "The message delay inmobile ad hoc networks," Performance Evaluation, vol. 62, no. 1, pp. 210-228, 2005. (Pubitemid 41240561)
-
(2005)
Performance Evaluation
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
9
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), 2003, pp. 1976-1986.
-
(2003)
Proc IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
10
-
-
70349684548
-
Fast detection of replica node attacks in mobile sensor networks using sequential analysis
-
Brazil
-
J. Ho,M.Wright, and S. K. Das, "Fast detection of replica node attacks in mobile sensor networks using sequential analysis," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Brazil, 2009, pp. 1773-1781.
-
(2009)
Proc IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 1773-1781
-
-
Ho, J.1
Wright, M.2
Das, S.K.3
-
11
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Comput., pp. 153-181, 1996.
-
(1996)
Mobile Comput
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
37749052702
-
Power law and exponential decay of inter contact times between mobile devices
-
Montreal, Canada
-
T. Karagiannis, J. L. Boudec, and M. Vojnovic, "Power law and exponential decay of inter contact times between mobile devices," in Proc. ACM Int. Conf. Mobile Computing and Networking (MobiCom), Montreal, Canada, 2007, pp. 183-194.
-
(2007)
Proc ACM Int. Conf. Mobile Computing and Networking (MobiCom)
, pp. 183-194
-
-
Karagiannis, T.1
Boudec, J.L.2
Vojnovic, M.3
-
14
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
Cambridge,MA, USA
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A secure sensor network communication architecture," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Cambridge,MA, USA, 2007.
-
(2007)
Proc. Int. Conf. Information Processing in Sensor Networks (IPSN)
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
15
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
Missouri, USA
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Missouri, USA, 2008, pp. 245-256.
-
(2008)
Proc. Int. Conf. Information Processing in Sensor Networks (IPSN)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
16
-
-
51849124994
-
Implementing public-key infrastructure for sensor networks
-
D. J. Malan, M. Welsh, and M. D. Smith, "Implementing public-key infrastructure for sensor networks," ACM Trans. Sensor Network, vol. 4, no. 4, pp. 1-23, 2008.
-
(2008)
ACM Trans. Sensor Network
, vol.4
, Issue.4
, pp. 1-23
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
17
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
Berkeley, CA, USA
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Berkeley, CA, USA, 2004, pp. 259-268.
-
(2004)
Proc. Int. Conf. Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2005, pp. 49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
20
-
-
4143077026
-
Scaling laws for capacity and delay in wireless ad hoc networks with random mobility
-
Paris, France
-
G. Sharma and R. Mazumdar, "Scaling laws for capacity and delay in wireless ad hoc networks with random mobility," in Proc. IEEE Int. Conf. Communications (ICC), Paris, France, 2004, pp. 3869-3873.
-
(2004)
Proc. IEEE Int. Conf. Communications (ICC)
, pp. 3869-3873
-
-
Sharma, G.1
Mazumdar, R.2
-
21
-
-
72449171946
-
Double rulings for information brokerage in sensor networks
-
Dec
-
R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks," IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1902-1915, Dec. 2009.
-
(2009)
IEEE/ACM Trans. Netw
, vol.17
, Issue.6
, pp. 1902-1915
-
-
Sarkar, R.1
Zhu, X.2
Gao, J.3
-
22
-
-
77953307472
-
From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
-
SanDiego,CA, USA
-
K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, 2010, pp. 1-9.
-
(2010)
Proc IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 1-9
-
-
Xing, K.1
Cheng, X.2
-
23
-
-
51849154670
-
Real time detection of clone attack in wireless sensor networks
-
Beijing, China
-
K. Xing, F. Liu, X. Cheng, and D. Du, "Real time detection of clone attack in wireless sensor networks," in Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS), Beijing, China, 2008, pp. 3-10.
-
(2008)
Proc IEEE Int. Conf. Distributed Computing Systems (ICDCS)
, pp. 3-10
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.4
-
24
-
-
51749102693
-
A localization technique for mobile sensor networks using archived anchor information
-
California, USA
-
J. Yi, J. Koo, and H. Cha, "A localization technique for mobile sensor networks using archived anchor information," in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 64-72.
-
(2008)
Proc IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON)
, pp. 64-72
-
-
Yi, J.1
Koo, J.2
Cha, H.3
-
25
-
-
51749098253
-
Mobile sensor network resilient against node replication attacks
-
California, USA (poster)
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Mobile sensor network resilient against node replication attacks," in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, 2008, pp. 597-599, (poster).
-
(2008)
Proc IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON)
, pp. 597-599
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
26
-
-
77951458841
-
Efficient and distributed detection of node replication attacks in mobile sensor networks
-
Anchorage, AK, USA
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall), Anchorage, AK, USA, 2009, pp. 1-5.
-
(2009)
Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall)
, pp. 1-5
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
27
-
-
77955667914
-
Noninteractive pairwise key establishment for sensor networks
-
Sep.
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Noninteractive pairwise key establishment for sensor networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556-569, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 556-569
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
28
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Hong Kong, China
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004, pp. 2446-2457.
-
(2004)
Proc IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
29
-
-
79957487965
-
Practical and secure multidimensional query framework in tiered sensor networks
-
Jun.
-
C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo, "Practical and secure multidimensional query framework in tiered sensor networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 241-255, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 241-255
-
-
Yu, C.-M.1
Tsou, Y.-T.2
Lu, C.-S.3
Kuo, S.-Y.4
-
30
-
-
77952973912
-
Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
-
Jul.
-
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, "Localized multicast: Efficient and distributed replica detection in large-scale sensor networks," IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913-926, Jul. 2010.
-
(2010)
IEEE Trans. Mobile Comput
, vol.9
, Issue.7
, pp. 913-926
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
Roy, S.4
Wang, L.5
-
31
-
-
79952798742
-
Random-walk based approach to detect clone attacks in wireless sensor networks
-
Jun.
-
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 677-691, Jun. 2010.
-
(2010)
IEEE J. Sel. Areas Commun
, vol.28
, Issue.5
, pp. 677-691
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
32
-
-
71949128840
-
Memory efficient protocols for detecting node replication attacks in wireless sensor networks
-
Princeton, NJ, USA
-
M. Zhang, V. Khanapure, S. Chen, and X. Xiao, "Memory efficient protocols for detecting node replication attacks in wireless sensor networks," in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, 2009, pp. 284-293.
-
(2009)
Proc IEEE Int. Conf. Network Protocols (ICNP)
, pp. 284-293
-
-
Zhang, M.1
Khanapure, V.2
Chen, S.3
Xiao, X.4
-
33
-
-
39049087772
-
Supporting secure communication and data collection in mobile sensor networks
-
Barcelona, Spain
-
L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Barcelona, Spain, 2006, pp. 1-12.
-
(2006)
Proc IEEE Int. Conf. Computer Communications (INFOCOM)
, pp. 1-12
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
-
34
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
Oakland, CA, USA
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2004, pp. 259-271.
-
(2004)
Proc IEEE Symp. Security and Privacy (S&P)
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|