-
1
-
-
79953785474
-
Grs: The green, reliability, and security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin. Grs: The green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine, 49(4):28-35, Apr. 2011.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
Mar.
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, 38(4):393-422, Mar. 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
84862810099
-
Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks
-
May
-
A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen. Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks. Computer Networks, 56(7):1951-1967, May. 2012.
-
(1967)
Computer Networks
, vol.56
, Issue.7
, pp. 1951-2012
-
-
Liu, A.1
Ren, J.2
Li, X.3
Chen, Z.4
Shen, X.5
-
4
-
-
77952986444
-
Secure data collection in wireless sensor networks using randomized dispersive routes
-
Jul.
-
T. Shu, M. Krunz, and S. Liu. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9(7):941-954, Jul. 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.7
, pp. 941-954
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
5
-
-
77956217417
-
A randomized countermeasure against parasitic adversaries in wireless sensor networks
-
Sep.
-
P. Papadimitratos, J. Luo, and J. P. Hubaux. A randomized countermeasure against parasitic adversaries in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 28(7):1036-1045, Sep. 2010.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.7
, pp. 1036-1045
-
-
Papadimitratos, P.1
Luo, J.2
Hubaux, J.P.3
-
6
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
Jan.
-
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology, 61(1):86-96, Jan. 2012.
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
7
-
-
80053528646
-
An early warning system against malicious activities for smart grid communications
-
May.
-
Z. M. Fadlullah, M. Fouda, N. Kato, X. Shen, and Y. Nozaki. An early warning system against malicious activities for smart grid communications. IEEE Network, 25(5):50-55, May. 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.5
, pp. 50-55
-
-
Fadlullah, Z.M.1
Fouda, M.2
Kato, N.3
Shen, X.4
Nozaki, Y.5
-
8
-
-
84857789593
-
A dynamic privacy-preserving key management scheme for location based services in vanets
-
Jan.
-
R. Lu, X. Lin, X. Liang, and X. Shen. A dynamic privacy-preserving key management scheme for location based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1):127-139, Jan. 2012.
-
(2012)
IEEE Transactions on Intelligent Transportation Systems
, vol.13
, Issue.1
, pp. 127-139
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
9
-
-
82555196697
-
Becan: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
-
Jan.
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen. Becan: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1):32-43, Jan. 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
10
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Oakland, CA, USA, May. 8-11
-
B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pages 49-63, Oakland, CA, USA, May. 8-11 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
11
-
-
79952798742
-
Random-walk based approach to detect clone attacks in wireless sensor networks
-
Jun.
-
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 28(5):677-691, Jun. 2010.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.5
, pp. 677-691
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
-
12
-
-
77952973912
-
Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
-
Jul.
-
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang. Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Transactions on Mobile Computing, 9(7):913-926, Jul. 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.7
, pp. 913-926
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
Roy, S.4
Wang, L.5
-
13
-
-
79960522083
-
Distributed detection of clone attacks in wireless sensor networks
-
Sep.-Oct.
-
M. Conti, R. Di Pietro, L. Mancini, and A. Mei. Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5):685-698, Sep.-Oct. 2011.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 685-698
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.3
Mei, A.4
-
14
-
-
77958089174
-
Security and privacy in emerging wireless networks
-
Oct.
-
G. H. Cao, J. P. Hubaux, Y. D. Kim, and Y. C. Chao. Security and privacy in emerging wireless networks. IEEE Wireless Communications, 17(5):10-11, Oct. 2010.
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.5
, pp. 10-11
-
-
Cao, G.H.1
Hubaux, J.P.2
Kim, Y.D.3
Chao, Y.C.4
-
15
-
-
84861627279
-
Di-sec: A distributed security framework for heterogeneous wireless sensor networks
-
Orlando, FL, USA, Mar. 25-30
-
M. Valero, S. S. Jung, U. A. Selcuk, Y. S. Li, and R. Beyah. Di-sec: A distributed security framework for heterogeneous wireless sensor networks. In IEEE INFOCOM, pages 585-593, Orlando, FL, USA, Mar. 25-30 2012.
-
(2012)
IEEE INFOCOM
, pp. 585-593
-
-
Valero, M.1
Jung, S.S.2
Selcuk, U.A.3
Li, Y.S.4
Beyah, R.5
-
16
-
-
84859199325
-
A trigger identification service for defending reactive jammers in wsn
-
May.
-
Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai. A trigger identification service for defending reactive jammers in wsn. IEEE Transactions on Mobile Computing, 11(5):793-806, May. 2012.
-
(2012)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.5
, pp. 793-806
-
-
Xuan, Y.1
Shen, Y.2
Nguyen, N.P.3
Thai, M.T.4
-
17
-
-
84861587761
-
Energy-efficient intrusion detection with a barrier of probabilistic sensors
-
Orlando, FL, USA, Mar. 25-30
-
J. Li, J. Chen, and T. H. Lai. Energy-efficient intrusion detection with a barrier of probabilistic sensors. In IEEE INFOCOM, pages 118-126, Orlando, FL, USA, Mar. 25-30 2012.
-
(2012)
IEEE INFOCOM
, pp. 118-126
-
-
Li, J.1
Chen, J.2
Lai, T.H.3
-
18
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
Nov.
-
R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir. On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, 37(6):1246-1258, Nov. 2007.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
19
-
-
61349128574
-
Analysis of per-node traffic load in multi-hop wireless sensor networks
-
Feb.
-
Q. Chen, S. S. Kanhere, and M. Hassan. Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications, 8(2):958-967, Feb. 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.2
, pp. 958-967
-
-
Chen, Q.1
Kanhere, S.S.2
Hassan, M.3
-
20
-
-
80052745543
-
Distributed clone detection in wireless sensor networks: An optimization approach
-
Lucca, IT, Jun. 20-23
-
T. Bonaci, P. Lee, L. Bushnell, and R. Poovendran. Distributed clone detection in wireless sensor networks: An optimization approach. In IEEE WoWMoM, pages 1-6, Lucca, IT, Jun. 20-23 2011.
-
(2011)
IEEE WoWMoM
, pp. 1-6
-
-
Bonaci, T.1
Lee, P.2
Bushnell, L.3
Poovendran, R.4
-
21
-
-
3042738543
-
Software-based attestation for embedded devices
-
Oakland, CA, USA, May. 9-12
-
A. Seshadri, A. Perrig, L. Van Doorn, and P. Khosla. Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy, pages 272-282, Oakland, CA, USA, May. 9-12 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
22
-
-
80051666129
-
Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks
-
Oct.
-
A. Liu, P. Zhang, and Z. Chen. Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10):1327-1355, Oct. 2011.
-
(2011)
Journal of Parallel and Distributed Computing
, vol.71
, Issue.10
, pp. 1327-1355
-
-
Liu, A.1
Zhang, P.2
Chen, Z.3
-
23
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, CA, USA, May 11-14
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, CA, USA, May 11-14 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
24
-
-
76349123798
-
Distributed routing in wireless sensor networks using energy welfare metric
-
May.
-
C. Ok, S. Lee, P. Mitra, and S. Kumara. Distributed routing in wireless sensor networks using energy welfare metric. Information Sciences, 180(9):1656-1670, May. 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1656-1670
-
-
Ok, C.1
Lee, S.2
Mitra, P.3
Kumara, S.4
|