-
2
-
-
0036688074
-
A survey on sensor networks
-
DOI 10.1109/MCOM.2002.1024422
-
Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E., A survey on sensor networks. IEEE Communications Magazine 2002 40 8 102 105 2-s2.0-0036688074 10.1109/MCOM.2002.1024422 (Pubitemid 34962720)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-105
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
46449122114
-
Wireless sensor network survey
-
2-s2.0-46449122114 10.1016/j.comnet.2008.04.002
-
Yick J., Mukherjee B., Ghosal D., Wireless sensor network survey. Computer Networks 2008 52 12 2292 2330 2-s2.0-46449122114 10.1016/j.comnet.2008. 04.002
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
4
-
-
38149062124
-
Security in wireless sensor networks
-
2-s2.0-38149062124 10.1002/wcm.422
-
Giruka V. C., Singhal M., Royalty J., Varanasi S., Security in wireless sensor networks. Wireless Communications and Mobile Computing 2008 8 1 1 24 2-s2.0-38149062124 10.1002/wcm.422
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.C.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
5
-
-
4243082091
-
Security in wireless sensor networks
-
2-s2.0-4243082091 10.1145/990680.990707
-
Perrig A., Stankovic J., Wagner D., Security in wireless sensor networks. Communications of the ACM 2004 47 6 53 57 2-s2.0-4243082091 10.1145/990680.990707
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
6
-
-
49749084392
-
Security in wireless sensor networks
-
2-s2.0-49749084392 10.1109/MWC.2008.4599222
-
Du X., Chen H. H., Security in wireless sensor networks. IEEE Wireless Communications 2008 15 4 60 66 2-s2.0-49749084392 10.1109/MWC.2008.4599222
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.4
, pp. 60-66
-
-
Du, X.1
Chen, H.H.2
-
8
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
2-s2.0-0036738266 10.1023/A:1016598314198
-
Perrig A., Szewczyk R., Tygar J. D., Wen V., Culler D. E., SPINS: security protocols for sensor networks. Wireless Networks 2002 8 5 521 534 2-s2.0-0036738266 10.1023/A:1016598314198
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
9
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
-
2-s2.0-69949155644
-
Li C. T., Hwang M. S., Chu Y. P., An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks. International Journal of Innovative Computing, Information and Control 2009 5 8 2107 2124 2-s2.0-69949155644
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
10
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
-
Li C. T., Hwang M. S., Chu Y. P., A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 2008 31 12 2803 2814 2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
11
-
-
84858252750
-
Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks
-
Das A. K., Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks. International Journal of Network Security 2012 14 1 1 21
-
(2012)
International Journal of Network Security
, vol.14
, Issue.1
, pp. 1-21
-
-
Das, A.K.1
-
12
-
-
69949134676
-
Authenticated reliable and semi-reliable communication in wireless sensor networks
-
Dressler F., Authenticated reliable and semi-reliable communication in wireless sensor networks. International Journal of Network Security 2008 7 1 61 68
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 61-68
-
-
Dressler, F.1
-
14
-
-
76549106506
-
Vulnerabilities and attacks in wireless sensor networks
-
Lansdale, Pa, USA IOS Press Cryptology & Information Security Series (CIS)
-
Benenson Z., Cholewinski P. M., Freiling F. C., Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security 2008 Lansdale, Pa, USA IOS Press 22 43 Cryptology & Information Security Series (CIS)
-
(2008)
Wireless Sensors Networks Security
, pp. 22-43
-
-
Benenson, Z.1
Cholewinski, P.M.2
Freiling, F.C.3
-
17
-
-
34248339107
-
Modeling adaptive node capture attacks in multi-hop wireless networks
-
DOI 10.1016/j.adhoc.2007.01.002, PII S1570870507000133, Wireless Mesh Networks
-
Tague P., Poovendran R., Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 2007 5 6 801 814 2-s2.0-34248339107 10.1016/j.adhoc.2007.01.002 (Pubitemid 46729710)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
19
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
Wood A. D., Stankovic J. A., Denial of service in sensor networks. Computer 2002 35 10 54 62 2-s2.0-0036793924 10.1109/MC.2002.1039518 (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
20
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
2-s2.0-38349154579 10.1109/MPRV.2008.6
-
Raymond D. R., Midkiff S. F., Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Computing 2008 7 1 74 81 2-s2.0-38349154579 10.1109/MPRV.2008.6
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
21
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, USA
-
Bellardo J., Savage S., 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of USENIX Security Symposium 2003 Washington, DC, USA 15 28
-
(2003)
Proceedings of USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
22
-
-
33947309586
-
Analysis of area-congestion-based DDoS attacks in ad hoc networks
-
DOI 10.1016/j.adhoc.2006.04.002, PII S1570870506000229
-
Gu Q., Liu P., Chu C. H., Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 2007 5 5 613 625 2-s2.0-33947309586 10.1016/j.adhoc.2006.04.002 (Pubitemid 46437457)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.5
, pp. 613-625
-
-
Gu, Q.1
Liu, P.2
Chu, C.-H.3
-
23
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July 2001 ACM Press 2-s2.0-0034771605
-
Perrig A., Szewczyk R., Wen V., Culler D., Tygar J. D., SPINS: security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01) July 2001 ACM Press 189 199 2-s2.0-0034771605
-
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
26
-
-
33750351971
-
A key management scheme for large scale distributed sensor networks
-
Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
-
Kim Y. H., Lee H., Lee D. H., Lim J., A key management scheme for large scale distributed sensor networks. 4217 Proceedings of the IFIP TC6 11th International Conference (PWC '06) 2006 Springer 437 446 Lecture Notes in Computer Science (Pubitemid 44617834)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4217
, pp. 437-446
-
-
Kim, Y.H.1
Lee, H.2
Lee, D.H.3
Lim, J.4
-
27
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
2-s2.0-46749130059 10.1016/j.comnet.2008.04.016
-
Chen Y., Chou J. S., Sun H. M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 2008 52 12 2373 2380 2-s2.0-46749130059 10.1016/j.comnet.2008.04.016
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
28
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
2-s2.0-78751649779 10.1016/j.comcom.2010.05.011
-
Yeh T. C., Wu C. H., Tseng Y. M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 2011 34 3 337 341 2-s2.0-78751649779 10.1016/j.comcom.2010.05.011
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.C.1
Wu, C.H.2
Tseng, Y.M.3
-
31
-
-
79952574261
-
A light-weight authentication scheme for wireless sensor networks
-
2-s2.0-79952574261 10.1016/j.adhoc.2010.08.020
-
Delgado-Mohatar O., Fúster-Sabater A., Sierra J. M., A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks 2011 9 5 727 735 2-s2.0-79952574261 10.1016/j.adhoc.2010.08.020
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.5
, pp. 727-735
-
-
Delgado-Mohatar, O.1
Fúster-Sabater, A.2
Sierra, J.M.3
|