-
1
-
-
84903891394
-
Recent advances and future trends in Wireless Sensor Networks
-
K. Vivek, C. Narottam, C. Naveen, "Recent advances and future trends in Wireless Sensor Networks", International journal of applied engineering research, vol. 1, no. 3, p. 12, 2010.
-
(2010)
International Journal of Applied Engineering Research
, vol.1
, Issue.3
, pp. 12
-
-
Vivek, K.1
Narottam, C.2
Naveen, C.3
-
2
-
-
75149127612
-
Wireless sensor network key management survey and taxonomy
-
[Online]. Available
-
J. Zhang, V. Varadharajan, "Wireless sensor network key management survey and taxonomy", Journal of Network and Computer Applications, vol. 33, no. 2, pp. 63-75, 2010. [Online]. Available: http://dx.doi.org/10.1016/j. jnca.2009.10.001
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.2
, pp. 63-75
-
-
Zhang, J.1
Varadharajan, V.2
-
3
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
[Online]. Available
-
C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://dx.doi.org/10.1016/S1570- 8705(03)00008-8
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
78049298573
-
The price of security in wireless sensor networks
-
[Online]. Available
-
J. Lee, K. Kapitanova, S. H. Son, "The price of security in wireless sensor networks", Computer Networks, vol. 54, no. 17, pp. 2967- 2978, 2010. [Online]. Available: http://dx.doi.org/10.1016 j.comnet.2010.05.011
-
(2010)
Computer Networks
, vol.54
, Issue.17
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
5
-
-
39049146014
-
Defense against outside attacks in wireless sensor networks
-
[Online]. Available
-
S. Tripathy, S. Nandi, "Defense against outside attacks in wireless sensor networks", Computer Communications, vol. 31, no. 4, pp. 818-826, 2008. [Online]. Available: http://dx.doi.org/10.1016/ j.comcom.2007.10.025
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 818-826
-
-
Tripathy, S.1
Nandi, S.2
-
6
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[Online]. Available
-
R. L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. [Online]. Available: http://dx.doi.org/ 10.1145/359340.359342
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
7
-
-
0017018484
-
-
New directions in cryptography [Online]. Available
-
W. Diffie, M. E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, no 6, pp. 10, 1976. [Online]. Available: http://dx.doi.org/10.1109/TIT.1976.1055638
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 10
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM: Washington DC, USA
-
R. Watro, et al., "TinyPK: securing sensor networks with public key technology", in Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM: Washington DC, USA, 2004, pp. 59-64.
-
(2004)
Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 59-64
-
-
Watro, R.1
-
9
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
[Online] Available
-
K. H. M. Wong, et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks", in Proc. of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006, vol. 1, pp. 244-251. [Online]. Available: http://dx.doi.org/10.1109/SUTC.2006.1636182
-
(2006)
Proc. of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 244-251
-
-
Wong, K.H.M.1
-
10
-
-
66549123136
-
An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
-
Bangalore, India
-
A. K. Das, "An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks", in Proc. of the First international conference on COMmunication Systems and NETworks, Bangalore, India, 2009, pp. 653-662.
-
(2009)
Proc. of the First international conference on COMmunication Systems and NETworks
, pp. 653-662
-
-
Das, A.K.1
-
11
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor Networks
-
[Online]. Available
-
M. K. Khan, K. Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Sensors, vol. 10, no 3, pp. 2450-2459, 2010. [Online]. Available: http://dx.doi.org/10. 3390/s100302450
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
12
-
-
78650387249
-
A secure and efficient user authentication protocol for two-tiered wireless sensor networks
-
Beijing
-
R. Fan, et al., "A secure and efficient user authentication protocol for two-tiered wireless sensor networks", in Proc. of the 2nd Pacific-Asia conference on Circuits, Communications and System (PACCS), Beijing, 2010, pp. 425-428.
-
Proc. of the 2nd Pacific-Asia conference on Circuits, Communications and System (PACCS)
, vol.2010
, pp. 425-428
-
-
Fan, R.1
-
13
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
Niagara Falls, ON
-
B. Vaidya, D. Makrakis, H. T. Mouftah, "Improved two-factor user authentication in wireless sensor networks", in Proc. of the IEEE 6th International Conference Wireless and Mobile Computing, Networking and Communications (WiMob), Niagara Falls, ON, 2010, pp. 600-606.
-
(2010)
Proc. of the IEEE 6th International Conference Wireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
14
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
[Online]. Available
-
A. Das, Kumar, et al., "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks" Journal of Network and Computer Applications, vol. 35, no. 5, pp. 1646-1656, 2012. [Online]. Available: http://dx.doi.org/10.1016/ j.jnca.2012.03.011
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das Kumar, A.1
-
15
-
-
85014416953
-
Improvement of das's two-factor authentication protocol in wireless sensor Networks
-
D. Nyang, M.-K. Lee, "Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks", in Proc. of the CORD Conference, 2009.
-
(2009)
Proc. of the CORD Conference
-
-
Nyang, D.1
Lee, M.-K.2
-
16
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
[Online] Available
-
H.-F. Huang, Y.-F. Chang, C.-H. Liu, "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks", in Proc. of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010, pp. 27-30. [Online]. Available: http://dx.doi.org/10.1109/ IIHMSP.2010.14
-
Proc. of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, vol.2010
, pp. 27-30
-
-
Huang, H.-F.1
Chang, Y.-F.2
Liu, C.-H.3
-
17
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, et al., "An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks", Ad Hoc & Sensor Wireless Networks, vol. 10, no. 4, pp. 361-371, 2010.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
-
18
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
[Online]. Available
-
T. H. Chen, W. K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks", Etri Journal, vol. 32, no. 5, pp. 704- 712, 2010. [Online]. Available: http://dx.doi.org/ 10.4218/etrij.10.1510.0134
-
(2010)
Etri Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
19
-
-
77956882701
-
Wireless sensor networks for healthcare: A survey
-
[Online]. Available
-
H. Alemdar, C. Ersoy, "Wireless sensor networks for healthcare: A survey", Computer Networks, vol. 54, no 15, pp. 2688-2710, 2010. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2010.05.003
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2688-2710
-
-
Alemdar, H.1
Ersoy, C.2
-
20
-
-
0037086890
-
Wireless sensor networks: A survey
-
[Online]. Available
-
I. F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. [Online]. Available: http://dx.doi.org/10.1016/S1389-1286(01)00302-4
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
-
21
-
-
46449122114
-
Wireless sensor network survey
-
[Online]. Available
-
J. Yick, B. Mukherjee, D. Ghosal, "Wireless sensor network survey", Computer Networks, vol. 52, no 12, pp. 2292-2330, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2008.04.002
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
22
-
-
33750127563
-
Current trends in wireless sensor network design
-
[Online]. Available
-
N. Jain, D. P. Agrawal, "Current Trends in Wireless Sensor Network Design", International Journal of Distributed Sensor Networks, vol. 1, no. 1, pp. 101-122, 2005. [Online]. Available: http://dx.doi.org/10.1080/ 15501320590901865
-
(2005)
International Journal of Distributed Sensor Networks
, vol.1
, Issue.1
, pp. 101-122
-
-
Jain, N.1
Agrawal, D.P.2
-
23
-
-
24644489093
-
LHA-SP: Secure protocols for hierarchical wireless sensor networks
-
L. B. Oliveira, W. Hao Cho, A. A. Loureiro, "LHA-SP: secure protocols for hierarchical wireless sensor networks", in Proc. of the 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005, pp. 31-44.
-
(2005)
Proc. of the 9th IFIP/IEEE International Symposium on Integrated Network Management
, pp. 31-44
-
-
Oliveira, L.B.1
Hao Cho, W.2
Loureiro, A.A.3
-
25
-
-
34249276408
-
Threshold password authentication against guessing attacks in Ad hoc networks
-
[Online]. Available
-
Z. Chai, Z. Cao, R. Lu, "Threshold password authentication against guessing attacks in Ad hoc networks", Ad Hoc Networks, vol. 5, no. 7, pp. 1046-1054, 2007. [Online]. Available: http://dx.doi.org/10.1016/j.adhoc.2006.05. 003
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.7
, pp. 1046-1054
-
-
Chai, Z.1
Cao, Z.2
Lu, R.3
-
26
-
-
55749099619
-
On handling insider attacks in wireless sensor networks
-
Technical Report, [Online]. Available
-
C. Krauß, M. Schneider, C. Eckert, "On handling insider attacks in wireless sensor networks", Information Security, Technical Report, vol. 13, no. 3, pp. 165-172, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.istr.2008.10.011
-
(2008)
Information Security
, vol.13
, Issue.3
, pp. 165-172
-
-
Krauß, C.1
Schneider, M.2
Eckert, C.3
-
27
-
-
84859029192
-
The impact of mobility patterns on MANET vulnerability to DDoS Attacks
-
M. Stojanovic, V. Timcenko, "The Impact of Mobility Patterns on MANET Vulnerability to DDoS Attacks", Elektronika ir Elektrotechnika (Electronics and Electrical Engineering), vol. 119, no. 3, pp. 29-34, 2012.
-
(2012)
Elektronika ir Elektrotechnika (Electronics and Electrical Engineering)
, vol.119
, Issue.3
, pp. 29-34
-
-
Stojanovic, M.1
Timcenko, V.2
-
28
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Research Institute
-
T.-H. Chen, W.-K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks", Electronics and Telecommunications Research Institute, vol. 32, no. 9, 2010.
-
Electronics and Telecommunications
, vol.32
, Issue.9
, pp. 2010
-
-
Chen, T.-H.1
Shih, W.-K.2
|