-
2
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
DOI: 10.1109/TSMCC.2007.905824
-
Brooks, R., P.Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M.T. Kandemir, 2007. On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybernetics, Part C: Appli. Rev., 37: 1246-1258. DOI: 10.1109/TSMCC.2007.905824
-
(2007)
IEEE Trans. Syst. Man Cybernetics Part C: Appli. Rev.
, vol.37
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
3
-
-
33144454801
-
Secure positioning in wireless networks
-
DOI: 10.1109/JSAC.2005.861380
-
Capkun, S. and J.P. Hubaux, 2006. Secure positioning in wireless networks. IEEE J. Sel. Areas Commun., 24: 221-232. DOI: 10.1109/JSAC.2005.861380
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.P.2
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Xplore Press, 10.1109/SECPRI.2003.1199337
-
Chan, H., A. Perrig and D. Song, 2003. Random key predistribution schemes for sensor networks. Proceeding IEEE Symposium on Security and Privacy, May 11-14, IEEE Xplore Press, pp: 197- 213. 10.1109/SECPRI.2003.1199337
-
(2003)
Proceeding IEEE Symposium on Security and Privacy, May 11-14
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
37849004592
-
A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
Sept. 09-14, ACM Press, Montreal, Canada, DOI: 10.1145/1288107.1288119
-
Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2007. A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing, Sept. 09-14, ACM Press, Montreal, Canada, pp: 80-89. DOI: 10.1145/1288107.1288119
-
(2007)
Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing
, pp. 80-89
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
6
-
-
79960522083
-
Distributed detection of clone attacks in wireless sensor networks
-
DOI: 10.1109/TDSC.2010.25
-
Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2010. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Depedable Secure Comput.,8: 685-698. DOI: 10.1109/TDSC.2010.25
-
(2010)
IEEE Trans. Depedable Secure Comput.
, vol.8
, pp. 685-698
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
7
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
Sept. 17-21, IEEE Xplore Press, Nice, France, 10.1109/SECCOM.2007.4550353
-
Heesook, C., Z. Sencun, L. Porta and F. Thomas, 2007. SET: Detecting node clones in sensor networks. Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Sept. 17-21, IEEE Xplore Press, Nice, France, pp: 341-350. 10.1109/SECCOM.2007.4550353
-
(2007)
Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops
, pp. 341-350
-
-
Heesook, C.1
Sencun, Z.2
Porta, L.3
Thomas, F.4
-
8
-
-
33745820773
-
Trust management for resilient wireless sensor networks
-
Dec. 1-2, Springer Berlin Heidelberg, Seoul, Korea, DOI:10.1007/11734727_7
-
Hur, J., Y. Lee, S.M. Hong and H. Yoon, 2005. Trust management for resilient wireless sensor networks. Proceedings of the 8th International Conference on Information Security and Cryptology, Dec. 1-2, Springer Berlin Heidelberg, Seoul, Korea, pp: 56- 68. DOI:10.1007/11734727_7
-
(2005)
Proceedings of the 8th International Conference on Information Security and Cryptology
-
-
Hur, J.1
Lee, Y.2
Hong, S.M.3
Yoon, H.4
-
9
-
-
84874676371
-
The replication attack in wireless sensor networks: Analysis and defenses
-
DOI: 10.1007/978-3-642-17878-8_18
-
Manjula, V. and C. Chellappan, 2011a. The replication attack in wireless sensor networks: Analysis and defenses. Adv. Netw. Commun., 132: 169-178. DOI: 10.1007/978-3-642-17878-8_18
-
(2011)
Adv. Netw. Commun.
, vol.132
, pp. 169-178
-
-
Manjula, V.1
Chellappan, C.2
-
10
-
-
85027414240
-
Replication attack mitigations for static and mobile WSN
-
DOI: 10.5121/ijnsa.2011.3210
-
Manjula, V. and C. Chellappan, 2011b. Replication attack mitigations for static and mobile WSN. Int. J. Netw. Security Appli., 3: 122-133. DOI: 10.5121/ijnsa.2011.3210
-
(2011)
Int. J. Netw. Security Appli.
, vol.3
, pp. 122-133
-
-
Manjula, V.1
Chellappan, C.2
-
11
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr. 26-27, ACM Press, Berkeley, CA, USA.,DOI: 10.1145/984622.984660
-
Newsome, J., E. Shi, D. Song and A. Perrig, 2004. The sybil attack in sensor networks: Analysis and defenses. Proceedings of the 3rd International Symposium Information Processing in Sensor Networks, Apr. 26-27, ACM Press, Berkeley, CA, USA., pp: 259-268.DOI: 10.1145/984622.984660
-
(2004)
Proceedings of the 3rd International Symposium Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
May 8-11, IEEE Xplore Press, DOI: 10.1109/SP.2005.8
-
Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, IEEE Xplore Press, pp: 49-63. DOI: 10.1109/SP.2005.8
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
13
-
-
0034775930
-
Dynamic fine-grained localization in Ad-Hoc networks of sensors
-
Jul. 16-21, ACM Press, Rome, Italy, DOI: 10.1145/381677.381693
-
Savvides, A., C.C. Han and M. Srivastava, 2001. Dynamic fine-grained localization in Ad-Hoc networks of sensors. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Jul. 16-21, ACM Press, Rome, Italy, pp: 166-179. DOI: 10.1145/381677.381693
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 166-179
-
-
Savvides, A.1
Han, C.C.2
Srivastava, M.3
-
14
-
-
84899335165
-
Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks
-
Nov. 17-19, ACM Press, Maui, HI, USA
-
Sei, Y. and S. Honiden, 2008. Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Proceedings of the 4th Annual International Conference on Wireless Internet, Nov. 17-19, ACM Press, Maui, HI, USA.
-
(2008)
Proceedings of the 4th Annual International Conference on Wireless Internet
-
-
Sei, Y.1
Honiden, S.2
-
15
-
-
70349103764
-
Reporter node determination of replicated node detection in wireless sensor networks
-
Jan. 15-16, ACM Press, Suwon, Republic of Korea,DOI: 10.1145/1516241.1516340
-
Sei, Y. and S. Honiden, 2009. Reporter node determination of replicated node detection in wireless sensor networks. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Jan. 15-16, ACM Press, Suwon, Republic of Korea, pp: 566-573.DOI: 10.1145/1516241.1516340
-
(2009)
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
, pp. 566-573
-
-
Sei, Y.1
Honiden, S.2
-
16
-
-
51849154670
-
Real- time detection of clone attacks in wireless sensor networks
-
Jun. 17-20, IEEE Xplore Press, Beijin, DOI: 10.1109/ICDCS.2008.55
-
Xing, K., F. Liu, X. Cheng and D.H.C. Du, 2008. Real- time detection of clone attacks in wireless sensor networks. Proceedings of the 28th International Conference on Distributed Computing Systems, Jun. 17-20, IEEE Xplore Press, Beijing,pp: 3-10. DOI: 10.1109/ICDCS.2008.55
-
(2008)
Proceedings of the 28th International Conference on Distributed Computing Systems
, pp. 3-10
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.H.C.4
-
17
-
-
79952798742
-
Random-walk based approach to detect clone attacks in wireless sensor networks
-
DOI: 10.1109/JSAC.2010.100606
-
Zeng, Y. J. Cao, S. Zhang, S. Guo and L. Xie, 2010. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J. Sel. Areas Commun., 28: 677-691. DOI: 10.1109/JSAC.2010.100606
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, pp. 677-691
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
18
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
Dec. 10-14, IEEE Xplore Press, Miami Beach, FL., DOI: 10.1109/ACSAC.2007.26
-
Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, Dec. 10-14, IEEE Xplore Press, Miami Beach, FL., pp: 257-267. DOI: 10.1109/ACSAC.2007.26
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference
, pp. 257-267
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
-
19
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Oct. 27-30, ACM Press, Washington, DC, USA.,DOI: 10.1145/948109.948120
-
Zhu, S., S. Setia and S. Jajodia, 2003. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 27-30, ACM Press, Washington, DC, USA., pp: 62-72.DOI: 10.1145/948109.948120
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|