-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
85027929506
-
Component-based localization in sparse wireless networks
-
Apr
-
X. Wang, J. Luo, Y. Liu, S. Li, and D. Dong, "Component-based localization in sparse wireless networks," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 540-548, Apr. 2011.
-
(2011)
IEEE/ACM Transactions On Networking
, vol.19
, Issue.2
, pp. 540-548
-
-
Wang, X.1
Luo, J.2
Liu, Y.3
Li, S.4
Dong, D.5
-
3
-
-
84863126291
-
Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks
-
Feb
-
R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, "Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 61, no.2, pp. 716-725, Feb. 2012.
-
(2012)
IEEE Transactions On Vehicular Technology
, vol.61
, Issue.2
, pp. 716-725
-
-
Deng, R.1
Chen, J.2
Yuen, C.3
Cheng, P.4
Sun, Y.5
-
4
-
-
84872043672
-
Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks
-
Dec
-
P. Cheng, R. Deng, and J. Chen, "Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks," IEEE Wireless Communications, vol.19,no.6, pp. 100-105, Dec. 2012.
-
(2012)
IEEE Wireless Communications
, vol.19
, Issue.6
, pp. 100-105
-
-
Cheng, P.1
Deng, R.2
Chen, J.3
-
5
-
-
84876059826
-
An attack tree based risk assessment for location privacy in wireless sensor networks
-
Sep. 21-23
-
R. Jiang, J. Luo, and X. Wang, "An attack tree based risk assessment for location privacy in wireless sensor networks," in Proc. of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, Sep. 21-23, 2012.
-
(2012)
Proc. of 8th IEEE International Conference On Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Jiang, R.1
Luo, J.2
Wang, X.3
-
6
-
-
84862217559
-
Security issues on machine to machine communications
-
Feb
-
C. Lai, H. Li, Y. Zhang, and J. Cao, "Security issues on machine to machine communications," KSII Transaction on Internet and Information Systems, vol. 6, no. 2, pp. 498-514, Feb. 2012.
-
(2012)
KSII Transaction On Internet and Information Systems
, vol.6
, Issue.2
, pp. 498-514
-
-
Lai, C.1
Li, H.2
Zhang, Y.3
Cao, J.4
-
7
-
-
84861478182
-
A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks
-
June
-
M. Wen, J. Li, Z. Yin, et al., "A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks," Journal of Computational Information Systems, vol. 8, no.6, pp. 2417-2424, June, 2012.
-
(2012)
Journal of Computational Information Systems
, vol.8
, Issue.6
, pp. 2417-2424
-
-
Wen, M.1
Li, J.2
Yin, Z.3
-
8
-
-
64249083197
-
A key management protocol with robust continuity for sensor networks
-
Apr
-
M. Wen, Y. Zheng, W. Ye, K. Chen, and W. Qiu, "A key management protocol with robust continuity for sensor networks," Computer Standards & Interfaces, vol. 31, no. 4, pp. 642-647, Apr. 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 642-647
-
-
Wen, M.1
Zheng, Y.2
Ye, W.3
Chen, K.4
Qiu, W.5
-
9
-
-
84883420493
-
A Novel Group Access Authentication and Key Agreement Protocol For Machine-type Communication
-
C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication," Transactions on Emerging Telecommunications Technologies, 2013.
-
(2013)
Transactions on Emerging Telecommunications Technologies
-
-
Lai, C.1
Li, H.2
Li, X.3
Cao, J.4
-
10
-
-
82555196697
-
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
-
Jan
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, Jan. 2012.
-
(2012)
IEEE Trans. On Parallel and Distributed Systems
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
11
-
-
0345565893
-
A survey of key management for secure group communication
-
Sep
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
12
-
-
81055124247
-
LEP: A lightweight key management scheme based on EBS and polynomial for wireless sensor networks
-
Sep. 14-16
-
R. Jiang, J. Luo, F. Tu, and J. Zhong, "LEP: A lightweight key management scheme based on EBS and polynomial for wireless sensor networks," in Proc. of IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, Sep. 14-16, 2011.
-
(2011)
Proc. of IEEE International Conference On Signal Processing, Communications and Computing
, pp. 1-5
-
-
Jiang, R.1
Luo, J.2
Tu, F.3
Zhong, J.4
-
13
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Transactions On Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
15
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
Oct. 6-9
-
R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. of IEEE International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 6-9, 2003.
-
(2003)
Proc. of IEEE International Conference On Parallel Processing Workshops
, pp. 397-406
-
-
Di Pietro, R.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
16
-
-
33847274741
-
A level key infrastructure for secure and efficient group communication in wireless sensor network
-
Sept
-
J.-H. Huang, J. Buckingham, and R. Han, "A level key infrastructure for secure and efficient group communication in wireless sensor network," in Proc. of the IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 249-260, Sept. 2005.
-
(2005)
Proc. of the IEEE First International Conference On Security and Privacy For Emerging Areas In Communications Networks
, pp. 249-260
-
-
Huang, J.-H.1
Buckingham, J.2
Han, R.3
-
17
-
-
73349089638
-
Topological key hierarchy for energy-efficient group key management in wireless sensor networks
-
Jan
-
J.-H. Son, J.-S. Lee, and S.-W. Seo, "Topological key hierarchy for energy-efficient group key management in wireless sensor networks," Wireless personal communications, vol. 52, no. 2, pp. 359-382, Jan. 2010.
-
(2010)
Wireless Personal Communications
, vol.52
, Issue.2
, pp. 359-382
-
-
Son, J.-H.1
Lee, J.-S.2
Seo, S.-W.3
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sept
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.E.5
-
19
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Second Quarter
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
-
(2006)
IEEE Communications Surveys Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
20
-
-
36849062175
-
Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
-
Oct
-
M. Shi, X. Shen, Y. Jiang, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 38-46, Oct. 2007.
-
(2007)
IEEE Wireless Communications
, vol.1
, Issue.5
, pp. 38-46
-
-
Shi, M.1
Shen, X.2
Jiang, Y.3
Lin, C.4
-
21
-
-
27644451730
-
The mote revolution: Low power wireless sensor network devices
-
J. Polastre, R. Szewczyk, C. Sharp, and D. Culler, "The mote revolution: Low power wireless sensor network devices," in Proc. of IEEE HotChips 16, vol. 16, pp. 22-24, 2004.
-
(2004)
Proc. of IEEE HotChips 16
, vol.16
, pp. 22-24
-
-
Polastre, J.1
Szewczyk, R.2
Sharp, C.3
Culler, D.4
-
22
-
-
50249155380
-
Energy efficient clustering algorithms for wireless sensor networks
-
May 19-23
-
D. Wei, S. Kaplan, and H. A. Chan, "Energy efficient clustering algorithms for wireless sensor networks," in Proc. of IEEE International Conference on Communications Workshops, pp. 236-240, May 19-23, 2008.
-
(2008)
Proc. of IEEE International Conference On Communications Workshops
, pp. 236-240
-
-
Wei, D.1
Kaplan, S.2
Chan, H.A.3
-
23
-
-
77954250864
-
Practical data transmission in cluster-based sensor networks
-
June
-
D.-Y. Kim, J. Cho, and B.-S. Jeong, Practical data transmission in cluster-based sensor networks. KSII Transactions on Internet and Information Systems (TIIS), vol. 4, no. 3 pp. 224-242, June 2010.
-
(2010)
KSII Transactions On Internet and Information Systems (TIIS)
, vol.4
, Issue.3
, pp. 224-242
-
-
Kim, D.-Y.1
Cho, J.2
Jeong, B.-S.3
-
24
-
-
77955360993
-
TESP2: Timed efficient source privacy preservation scheme for wireless sensor networks
-
May 23-27
-
R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed efficient source privacy preservation scheme for wireless sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-6, May 23-27, 2010.
-
(2010)
Proc. of IEEE International Conference On Communications (ICC)
, pp. 1-6
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
25
-
-
77952053188
-
MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks
-
June
-
X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Communications and Mobile Computing (Wiley), vol. 10, no. 6, pp. 843-856, June, 2010.
-
(2010)
Wireless Communications and Mobile Computing (Wiley)
, vol.1
, Issue.6
, pp. 843-856
-
-
Lin, X.1
Lu, R.2
Shen, X.3
|