-
2
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102-114. doi:10.1109/MCOM.2002.1024422.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
84872871627
-
Security in cognitive wireless sensor networks: Challenges and open problems.
-
Retrieved October 22, 2012, from
-
Araujo, A., Blesa, J., Romero, E., & Villanueva, D. (2012). Security in cognitive wireless sensor networks: Challenges and open problems. EURASIP Journal on Wireless Communications and Networking (p. 48). Retrieved October 22, 2012, from http://jwcn.eurasipjournals.com/content/2012/1/48
-
(2012)
EURASIP Journal on Wireless Communications and Networking
, pp. 48
-
-
Araujo, A.1
Blesa, J.2
Romero, E.3
Villanueva, D.4
-
9
-
-
84949938425
-
DoSresistant authentication with client puzzles
-
Cambridge, UK, April 2000. Lecture Notes in Computer Science (LNCS), Springer-Verlag, London, 2001.
-
th Int. Workshop on Security Protocols, Cambridge, UK, April 2000. Lecture Notes in Computer Science (LNCS), Vol 2133, pp. 170- 177, Springer-Verlag, London, 2001.
-
(2001)
th Int. Workshop on Security Protocols
, vol.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
10
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing /IEEE Computer Society [and] IEEE Communications Society, 2(1), 46-55. doi:10.1109/MPRV.2003.1186725.
-
(2003)
IEEE Pervasive Computing /IEEE Computer Society [and] IEEE Communications Society
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
11
-
-
70449471223
-
Cooperative shared spectrum sensing for dynamic cognitive radio networks
-
Dresden, Germany: IEEE
-
Biswas, A. R., Aysal, T. C., Kandeepan, S., Kliazovich, D., & Piesiewicz, R. (2009). Cooperative shared spectrum sensing for dynamic cognitive radio networks. In Proc. of IEEE Int. Conf. on Communications (pp. 1-5). Dresden, Germany: IEEE.
-
(2009)
In Proc. of IEEE Int. Conf. on Communications
, pp. 1-5
-
-
Biswas, A.R.1
Aysal, T.C.2
Kandeepan, S.3
Kliazovich, D.4
Piesiewicz, R.5
-
12
-
-
77955623517
-
Optimal S1SO and M1MO spectral efficiency to minimize hidden-node network interference
-
Bliss, D. W. (2010). Optimal S1SO and M1MO spectral efficiency to minimize hidden-node network interference. IEEE Communications Letters, 14(7), 620-622. doi:10.1109/LCOMM.2010.07.100442.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.7
, pp. 620-622
-
-
Bliss, D.W.1
-
15
-
-
52549109488
-
Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
-
Brown, T. X., & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment. Mobile Networks and Applications, 13(5), 516-532. doi:10.1007/s11036-008-0085-x.
-
(2007)
Mobile Networks and Applications
, vol.13
, Issue.5
, pp. 516-532
-
-
Brown, T.X.1
Sethi, A.2
-
17
-
-
78650759662
-
A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming
-
San Diego, CA: IEEE
-
Burbank, J. L., Hammons, A. R., & Jones, S. D. (2008). A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming. In Proc. of the IEEE Military Communications Conf. (pp. 1-7). San Diego, CA: IEEE.
-
(2008)
In Proc. of the IEEE Military Communications Conf.
, pp. 1-7
-
-
Burbank, J.L.1
Hammons, A.R.2
Jones, S.D.3
-
18
-
-
32644435647
-
Energyefficient secure pattern based data aggregation for wireless sensor networks
-
Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D., & Ozgur Sanli, H. (2006). Energyefficient secure pattern based data aggregation for wireless sensor networks. Computer Communications, 29(4), 446-455. doi:10.1016/j. comcom.2004.12.029.
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Cam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Ozgur Sanli, H.5
-
19
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
-
Castelluccia, C., Chan, A. C-F., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3).
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.3
-
-
Castelluccia, C.1
Chan, A.C-F.2
Mykletun, E.3
Tsudik, G.4
-
21
-
-
36348946492
-
Achieving energy efficiency and QoS for low-rate applications with 802.11e
-
Cavalcanti, D., Schmitt, R., & Soomro, A. (2007). Achieving energy efficiency and QoS for low-rate applications with 802.11e. In Proc. of the IEEE Wireless Communications and Networking Conf., 1, 2143-2148.
-
(2007)
In Proc. of the IEEE Wireless Communications and Networking Conf.
, vol.1
, pp. 2143-2148
-
-
Cavalcanti, D.1
Schmitt, R.2
Soomro, A.3
-
22
-
-
33845808851
-
SIA: Secure information aggregation in sensor networks
-
Chan, H., Perrig, A., Przydatek, B., & Song, D. (2007). SIA: Secure information aggregation in sensor networks. Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks, 15(1), 69-102.
-
(2007)
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 69-102
-
-
Chan, H.1
Perrig, A.2
Przydatek, B.3
Song, D.4
-
25
-
-
42649135628
-
Toward secure distributed spectrum sensing in cognitive radio networks
-
Chen, R., Park, J.-M., Hou, Y. T., & Reed, J. H. (2008b). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50-55. doi:10.1109/MCOM.2008.4481340.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 50-55
-
-
Chen, R.1
Park, J.-M.2
Hou, Y.T.3
Reed, J.H.4
-
26
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Chen, R., Park, J.-M., & Reed, J. H. (2008c). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25-37. doi:10.1109/JSAC.2008.080104.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
30
-
-
27544440245
-
INSENS: intrusion-tolerant routing in wireless sensor networks.
-
Technical report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder, USA, November 2002.
-
Deng, J., Han, R., & Mishra, S. (2002). INSENS: intrusion-tolerant routing in wireless sensor networks. Technical report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder, USA, November 2002.
-
(2002)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
32
-
-
80053502199
-
Security, privacy, and fault-tolerance in wireless sensor networks. Book chapter
-
Bulusu, N., & Jha, S. (Eds.), Artech House.
-
Deng, J., Han, R., & Mishra, S. (2005b). Security, privacy, and fault-tolerance in wireless sensor networks. Book chapter. In Bulusu, N., & Jha, S. (Eds.), Wireless Sensor Networks: A Systems Perspective (pp. 215-234). Artech House.
-
(2005)
Wireless Sensor Networks: A Systems Perspective
, pp. 215-234
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
34
-
-
0842332407
-
A witness-based approach for data fusion assurance in wireless sensor networks
-
San Francisco, CA: IEEE
-
Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proc. of IEEE Global Telecommunications Conf. (pp. 1435-1439). San Francisco, CA: IEEE.
-
(2003)
In Proc. of IEEE Global Telecommunications Conf.
, pp. 1435-1439
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
39
-
-
84872048332
-
Security and privacy of collaborative spectrum sensing in cognitive radio networks.
-
Retrieved October 22, 2012, from
-
Gao, Z., Zhu, H., Li, S., Du, S., & Li, X. (2012). Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wireless Communications. Retrieved October 22, 2012, from http://tdt.sjtu.edu.cn/~hjzhu/Paper/IEEE_WCM.pdf
-
(2012)
IEEE Wireless Communications.
-
-
Gao, Z.1
Zhu, H.2
Li, S.3
Du, S.4
Li, X.5
-
40
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA: USENIX
-
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the 1st Int. Conf. on Mobile Systems, Applications, and Services (pp. 31-43). San Francisco, CA: USENIX.
-
(2003)
In Proc. of the 1st Int. Conf. on Mobile Systems, Applications, and Services
, pp. 31-43
-
-
Gruteser, M.1
Grunwald, D.2
-
48
-
-
51249091375
-
Secure cooperative sensing techniques for cognitive radio systems
-
Beijing, China: IEEE
-
Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2008). Secure cooperative sensing techniques for cognitive radio systems. In Proc. of the IEEE Int. Conf. on Communications (pp. 3006-3410). Beijing, China: IEEE.
-
(2008)
In Proc. of the IEEE Int. Conf. on Communications
, pp. 3006-3410
-
-
Kaligineedi, P.1
Khabbazian, M.2
Bhargava, V.K.3
-
51
-
-
4143117199
-
Secure broadcast in energy-aware wireless sensor networks.
-
Invited Paper, Victoria, British Columbia, Canada, September 2002.
-
Lazos, L., & Poovendran, R. (2002). Secure broadcast in energy-aware wireless sensor networks. In Proc. of the IEEE Int. Symposium on Advances in Wireless Communications (ISWC'02), Invited Paper, Victoria, British Columbia, Canada, September 2002.
-
(2002)
In Proc. of the IEEE Int. Symposium on Advances in Wireless Communications (ISWC'02)
-
-
Lazos, L.1
Poovendran, R.2
-
52
-
-
77951855384
-
Securing cognitive radio networks
-
Leon, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633-652.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.5
, pp. 633-652
-
-
Leon, O.1
Hernandez-Serrano, J.2
Soriano, M.3
-
53
-
-
77953195920
-
Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach
-
Singapore: IEEE
-
Li, H., & Han, Z. (2010). Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach. In Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (pp. 1-12). Singapore: IEEE.
-
(2010)
In Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 1-12
-
-
Li, H.1
Han, Z.2
-
55
-
-
36148956575
-
Analysis of ratings on trust inference in the open environment
-
Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in the open environment. Journal on Performance Evaluation, 65(2), 99-128. doi:10.1016/j.peva.2007.04.001.
-
(2008)
Journal on Performance Evaluation
, vol.65
, Issue.2
, pp. 99-128
-
-
Liang, Z.1
Shi, W.2
-
56
-
-
85000276942
-
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
-
Liu, D., & Ning, P. (2004). Multilevel μTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems, 3(4), 800-836. doi:10.1145/1027794.1027800.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
57
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Oakland, CA: IEEE
-
Liu, Y., Ning, P., & Dai, H. (2010). Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Proc. of IEEE Symposium on Security and Privacy (pp. 286-301). Oakland, CA: IEEE.
-
(2010)
In Proc. of IEEE Symposium on Security and Privacy
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
61
-
-
77951429767
-
Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
-
Boston, MA: IEEE
-
Mody, A. N., Reddy, R., Kiernan, T., & Brown, T. X. (2009). Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard. In Proc. of IEEE Military Communications Conference (pp. 1-7). Boston, MA: IEEE.
-
(2009)
In Proc. of IEEE Military Communications Conference
, pp. 1-7
-
-
Mody, A.N.1
Reddy, R.2
Kiernan, T.3
Brown, T.X.4
-
68
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Oakland, CA: IEEE
-
Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proc. of the IEEE Symposium on Security and Privacy (pp. 49-63). Oakland, CA: IEEE.
-
(2005)
In Proc. of the IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
69
-
-
71049125287
-
The research of cross-layer architecture design and security for cognitive radio network
-
Temopil, Ukraine: IEEE
-
Peng, Y., Xiang, F., Long, H., & Peng, J. (2009). The research of cross-layer architecture design and security for cognitive radio network. In Proc. of the Int. Symposium on Information Engineering and Electronic Commerce (pp. 603-607). Temopil, Ukraine: IEEE.
-
(2009)
In Proc. of the Int. Symposium on Information Engineering and Electronic Commerce
, pp. 603-607
-
-
Peng, Y.1
Xiang, F.2
Long, H.3
Peng, J.4
-
70
-
-
58049207983
-
Policy-based spectrum access control for dynamic spectrum access network radios
-
Amsterdam, The Netherlands: Elsevier
-
Perich, F., & McHenry, M. (2009). Policy-based spectrum access control for dynamic spectrum access network radios. Web Semantics: Science, Services and Agents on the World Wide Web, 7(1), 21-227. Amsterdam, The Netherlands: Elsevier.
-
(2009)
Web Semantics: Science, Services and Agents on the World Wide Web
, vol.7
, Issue.1
, pp. 21-227
-
-
Perich, F.1
McHenry, M.2
-
71
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
[Hingham, MA: Kluwer Academic Publishers.]
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. [Hingham, MA: Kluwer Academic Publishers.]. Wireless Networks, 8(5), 521-534. doi:10.1023/A:1016598314198.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
74
-
-
48749130963
-
Scalable, cluster-based anti-replay protection for wireless sensor networks
-
West Point, NY: IEEE
-
th Annual IEEE Systems, Man, and Cybernetics (IEEE SMC'07) Information Assurance Workshop (IAW'07) (pp. 127-134). West Point, NY: IEEE.
-
(2007)
th Annual IEEE Systems, Man, and Cybernetics (IEEE SMC'07) Information Assurance Workshop (IAW'07)
, pp. 127-134
-
-
Raymond, D.R.1
Marchany, R.C.2
Midkiff, S.F.3
-
75
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
Computer Networks: The Int. [Amsterdam, The Netherlands: Elsevier.].
-
Ren, K., Li, T., Wan, Z., Bao, F., Deng, R. H., & Kim, K. (2004). Highly reliable trust establishment scheme in ad hoc networks. Computer Networks: The Int. [Amsterdam, The Netherlands: Elsevier.]. Journal of Computer and Telecommunications Networking, 45(6), 687-699. doi:10.1016/j.comnet. 2004.01.008.
-
(2004)
Journal of Computer and Telecommunications Networking
, vol.45
, Issue.6
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
79
-
-
84944715713
-
Routing security issues in wireless sensor networks: Attacks and defense. Book Chapter
-
Tan, Y. K. (Ed.), Croatia: INTECH Publishers.
-
Sen, J. (2010a). Routing security issues in wireless sensor networks: Attacks and defense. Book Chapter. In Tan, Y. K. (Ed.), Sustainable Wireless Sensor Networks (pp. 279-309). Croatia: INTECH Publishers. doi:10.5772/12952.
-
(2010)
Sustainable Wireless Sensor Networks
, pp. 279-309
-
-
Sen, J.1
-
80
-
-
79960292287
-
An efficient and user privacypreserving routing protocol for wireless mesh networks
-
Special Issue on Networks and Distributed Systems
-
Sen, J. (2010b). An efficient and user privacypreserving routing protocol for wireless mesh networks. International Journal on Scalable Computing: Practice and Experience. Special Issue on Networks and Distributed Systems, 11(4), 345-358.
-
(2010)
International Journal on Scalable Computing: Practice and Experience.
, vol.11
, Issue.4
, pp. 345-358
-
-
Sen, J.1
-
81
-
-
85138406381
-
Reputation-and trust-based systems for wireless self-organizing networks
-
A-S.K. Pathan (ed.), Aurbach Publication, Book Chapter No 5, CRC Press, Taylor & Francis Group, USA, 2010
-
Sen, J. (2010c). Reputation-and trust-based systems for wireless self-organizing networks. Book Chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, A-S.K. Pathan (ed.), Aurbach Publication, Book Chapter No 5, pp. 91- 122, CRC Press, Taylor & Francis Group, USA, 2010.
-
(2010)
Book Chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
, pp. 91-122
-
-
Sen, J.1
-
83
-
-
48349133930
-
A distributed protocol for detection of packet dropping attack in mobile ad hoc networks
-
Penang, Malaysia: IEEE
-
Sen, J., Chandra, M. G., Balamuralidhar, P., Harihara, S. G., & Reddy, H. (2007a). A distributed protocol for detection of packet dropping attack in mobile ad hoc networks. In Proc. of the IEEE Int. Conf. on Telecom and Malaysia Int. Conf. on Communications (ICT-MICC'07) (pp. 75-80). Penang, Malaysia: IEEE.
-
(2007)
In Proc. of the IEEE Int. Conf. on Telecom and Malaysia Int. Conf. on Communications (ICT-MICC'07)
, pp. 75-80
-
-
Sen, J.1
Chandra, M.G.2
Balamuralidhar, P.3
Harihara, S.G.4
Reddy, H.5
-
85
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Oakland, CA: IEEE
-
Seshadri, A., & Perrig, A. Van Doorn, L., & Khosla, P. (2004). SWATT: Software-based attestation for embedded devices. In Proc. of the IEEE Symposium on Security and Privacy (pp. 272-282). Oakland, CA: IEEE.
-
(2004)
In Proc. of the IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
87
-
-
11144340927
-
Designing secure sensor networks
-
Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications Magazine, 11(6), 38-43. doi:10.1109/MWC.2004.1368895.
-
(2004)
IEEE Wireless Communications Magazine
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
88
-
-
84944803090
-
-
National Science Foundation (NSF) Workshop Report, March 2009.
-
Steenkiste, P., Sicker, D., Minden, G., & Raychaudhuri, D. (2009). Future Directions in Cognitive Radio Network Research. National Science Foundation (NSF) Workshop Report, March 2009.
-
(2009)
Future Directions in Cognitive Radio Network Research.
-
-
Steenkiste, P.1
Sicker, D.2
Minden, G.3
Raychaudhuri, D.4
-
91
-
-
77949345490
-
Evolutionary cooperative spectrum sensing game: How to collaborate
-
Wang, B., Liu, K. J. R., & Clancy, T. C. (2010). Evolutionary cooperative spectrum sensing game: How to collaborate. IEEE Transactions on Communications, 58(3), 890-900. doi:10.1109/TCOMM.2010.03.090084.
-
(2010)
IEEE Transactions on Communications
, vol.58
, Issue.3
, pp. 890-900
-
-
Wang, B.1
Liu, K.J.R.2
Clancy, T.C.3
-
92
-
-
77951594186
-
CatchIt: Detect malicious nodes in collaborative spectrum sensing
-
Honolulu, HI: IEEE
-
Wang, W., Li, H., Sun, Y., & Han, Z. (2009b). CatchIt: Detect malicious nodes in collaborative spectrum sensing. In Proc. of the IEEE Global Telecommunications Conf. (pp. 1-6). Honolulu, HI: IEEE.
-
(2009)
In Proc. of the IEEE Global Telecommunications Conf.
, pp. 1-6
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
94
-
-
24144490816
-
Lifetime optimization of sensor networks under physical attacks
-
Wang, X., Gu, W., Chellappan, S., Schoseck, K., & Xuan, D. (2005). Lifetime optimization of sensor networks under physical attacks. In Proc. of IEEE Int. Conf. on Communications, 5, 3295-3301.
-
(2005)
In Proc. of IEEE Int. Conf. on Communications
, vol.5
, pp. 3295-3301
-
-
Wang, X.1
Gu, W.2
Chellappan, S.3
Schoseck, K.4
Xuan, D.5
-
95
-
-
65349177825
-
Sensor network configuration under physical attacks
-
Wang, X., Gu, W., Schosek, K., Chellappan, S., & Xuan, D. (2009a). Sensor network configuration under physical attacks. International Journal of Ad Hoc and Ubiquitous Computing, 4(3/4), 174-182.
-
(2009)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.4
, Issue.3-4
, pp. 174-182
-
-
Wang, X.1
Gu, W.2
Schosek, K.3
Chellappan, S.4
Xuan, D.5
-
96
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54-62. doi:10.1109/MC.2002.1039518.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
98
-
-
70349653799
-
Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks
-
Barcelona, Spain: IEEE
-
th Vehicular Technology Conf. (pp. 1-5). Barcelona, Spain: IEEE.
-
(2009)
th Vehicular Technology Conf.
, pp. 1-5
-
-
Xu, S.1
Shang, Y.2
Wang, H.3
-
101
-
-
77951486373
-
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
-
Boston, MA: IEEE Press
-
Yu, F. R., Tang, H., Huang, M., Li, Z., & Mason, P. C. (2009). Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In Proc. of the IEEE Military Communications Conf. (pp. 1143-1149). Boston, MA: IEEE Press.
-
(2009)
In Proc. of the IEEE Military Communications Conf.
, pp. 1143-1149
-
-
Yu, F.R.1
Tang, H.2
Huang, M.3
Li, Z.4
Mason, P.C.5
-
102
-
-
70349185618
-
A survey of spectrum sensing algorithms for cognitive radio applications
-
Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys & Tutorials, 11(1), 116-130. doi:10.1109/SURV.2009.090109.
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.1
, pp. 116-130
-
-
Yucek, T.1
Arslan, H.2
-
103
-
-
73049083486
-
Anti-jamming coding techniques with application to cognitive radio
-
Yue, G., & Wang, X. (2009). Anti-jamming coding techniques with application to cognitive radio. IEEE Transactions on Wireless Communications, 8(12), 5996-6007. doi:10.1109/TWC.2009.12.081627.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.12
, pp. 5996-6007
-
-
Yue, G.1
Wang, X.2
-
104
-
-
77949356469
-
Reputation-based cooperative spectrum sensing with trusted nodes assistance
-
Zeng, K., Pawelczak, P., & Cabric, D. (2010). Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Communications Letters, 14(3), 226-228. doi:10.1109/LCOMM.2010.03.092240.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.3
, pp. 226-228
-
-
Zeng, K.1
Pawelczak, P.2
Cabric, D.3
-
106
-
-
77954019396
-
A PHY-layer authentication approach for transmitter identification in cognitive radio networks
-
Shenzhen, China: IEEE
-
Zhao, C., Xie, L., Jiang, X., Huang, L., & Yao, Y. (2010). A PHY-layer authentication approach for transmitter identification in cognitive radio networks. In Proc. of the Int. Conf. on Communications and Mobile Computing (pp. 154-158). Shenzhen, China: IEEE.
-
(2010)
In Proc. of the Int. Conf. on Communications and Mobile Computing
, pp. 154-158
-
-
Zhao, C.1
Xie, L.2
Jiang, X.3
Huang, L.4
Yao, Y.5
-
107
-
-
70449468191
-
A new cooperative detection technique with malicious user suppression
-
Dresden, Germany: IEEE
-
Zhao, T., & Zhao, Y. (2009). A new cooperative detection technique with malicious user suppression. In Proc. of the IEEE Int. Conf. on Communications (pp. 2754-2758). Dresden, Germany: IEEE.
-
(2009)
In Proc. of the IEEE Int. Conf. on Communications
, pp. 2754-2758
-
-
Zhao, T.1
Zhao, Y.2
-
108
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Zhou, Y., Fang, Y., & Zhang, Y. (2009). Securing wireless sensor networks: A survey. IEEE Communications Survey Tutorials, 10(3), 6-28. doi:10.1109/COMST.2008.4625802.
-
(2009)
IEEE Communications Survey Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
110
-
-
78751615533
-
Two types of attacks against cognitive radio network MAC protocols.
-
Wuhan, Hubei, China.
-
Zhu, L., & Zhou, H. (2008). Two types of attacks against cognitive radio network MAC protocols. In Proc. of Int. Conf. on Computer Science and Software Engineering (pp. 1110-1113). Wuhan, Hubei, China.
-
(2008)
In Proc. of Int. Conf. on Computer Science and Software Engineering
, pp. 1110-1113
-
-
Zhu, L.1
Zhou, H.2
-
112
-
-
33744499939
-
Secure comparison of encrypted data in wireless sensor networks.
-
Riva del Garda, Trentino, Italy, April 2005.
-
rd International Symposium on Modeling and Optimization in Mobile Ad hoc and Wireless Networks (WIOPT'05), pp. 47-53, Riva del Garda, Trentino, Italy, April 2005.
-
(2005)
rd International Symposium on Modeling and Optimization in Mobile Ad hoc and Wireless Networks (WIOPT'05)
, pp. 47-53
-
-
Acharya, M.1
Girao, J.2
Westhoff, D.3
-
113
-
-
21644434924
-
Security in ad hoc networks: a general intrusion detection architecture enhancing trust-based approaches.
-
Ciudad Real, Spain, ICEIS Press, April 2002.
-
st International Workshop on Wireless Information Systems (WIS'02), Ciudad Real, Spain, pp. 1-12, ICEIS Press, April 2002.
-
(2002)
st International Workshop on Wireless Information Systems (WIS'02)
, pp. 1-12
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Puttini, R.5
-
114
-
-
0002380073
-
Tamper resistance - a cautionary note
-
Oakland, California, USA, November, 1996
-
nd USENIX Workshop on Electronic Commerce (WOEC'96), Vol 2, pp. 1, Oakland, California, USA, November, 1996.
-
(1996)
nd USENIX Workshop on Electronic Commerce (WOEC'96)
, vol.2
, pp. 1
-
-
Anderson, R.1
Kuhn, M.G.2
-
115
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures.
-
Atlanta, Georgia, USA, September 2002. ACM Press.
-
st ACM Workshop on Wireless Security (WISe'02)- Co-located with ACM MobiCom'02, pp. 21-30, Atlanta, Georgia, USA, September 2002. ACM Press.
-
(2002)
st ACM Workshop on Wireless Security (WISe'02)- Co-located with ACM MobiCom'02
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
116
-
-
85084161952
-
PGP in constrained wireless devices
-
Denver, Colorado, USA, August 2000
-
Brown, M., Cheung, D., Hankerson, D., Hernandez, J. L., Kirkup, M., & Menezes, A. (2000). PGP in constrained wireless devices. In Proceedings of the 9th USENIX Security Symposium (SSYM'00), Vol 9, pp. 19, Denver, Colorado, USA, August 2000.
-
(2000)
In Proceedings of the 9th USENIX Security Symposium (SSYM'00)
, vol.9
, pp. 19
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
117
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks.
-
Florence, Italy, May 2006.
-
th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'06), pp. 120-130, Florence, Italy, May 2006.
-
(2006)
th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'06)
, pp. 120-130
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
118
-
-
77956574096
-
Challenges in intrusion detection for wireless ad-hoc networks
-
Orlando, Florida, USA, January 2003
-
Brutch, P., & Ko, C. (2003). Challenges in intrusion detection for wireless ad-hoc networks. In Proceedings of the Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), p. 368, Orlando, Florida, USA, January 2003.
-
(2003)
In Proceedings of the Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
, pp. 368
-
-
Brutch, P.1
Ko, C.2
-
120
-
-
4143130875
-
Energy-efficient security protocol for wireless sensor networks
-
Orlando, Florida, USA, October 2003
-
th IEEE Vehicular Technology Conference (IEEE VTC'03- Fall), Orlando, Florida, USA, Vol 5, pp. 2981-2984, October 2003.
-
(2005)
th IEEE Vehicular Technology Conference (IEEE VTC'03- Fall)
, vol.5
, pp. 2981-2984
-
-
Cam, H.1
Multhuavinashiappan, D.2
Nair, P.3
-
121
-
-
47649129348
-
Secure differential data aggregation for wireless sensor networks.
-
S. Phoha, T. F. La Porta, & C. Griffin (eds.), Willey-IEEE Press.
-
Cam, H., Ozdemir, S., Sanli, H. O., & Nair, P. (2004). Secure differential data aggregation for wireless sensor networks. Book Chapter in Sensor Network Operation, S. Phoha, T. F. La Porta, & C. Griffin (eds.), Willey-IEEE Press.
-
(2004)
Book Chapter in Sensor Network Operation
-
-
Cam, H.1
Ozdemir, S.2
Sanli, H.O.3
Nair, P.4
-
122
-
-
0242678584
-
Self-organized public key management for mobile ad hoc networks
-
Capkun, S., Buttyan, L., & Hubaux, J.-P. (2003, January). Self-organized public key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 52-64. doi:10.1109/TMC.2003.1195151.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
123
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H., & Perrig, A. (2003, October). Security and privacy in sensor networks. IEEE Computer, 36(Issue 10), 103-105. doi:10.1109/MC.2003.1236475.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
124
-
-
0038487088
-
Random key predistribution schemes for sensor networks.
-
Berkeley, California, USA, May 2003, IEEE Computer Society Press
-
Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy (S & P'03), Berkeley, California, USA, p.197-213, May 2003. IEEE Computer Society Press.
-
(2003)
In Proceedings of the IEEE Symposium on Security and Privacy (S & P'03)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
127
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005a, May). A pairwise key predistribution scheme for wireless sensor networks. [TISSEC]. ACM Transactions on Information and System Security, 8(Issue 2), 228-258. doi:10.1145/1065545.1065548.
-
(2005)
[TISSEC]. ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
128
-
-
49749084392
-
Security in wireless sensor networks
-
Du, X., & Chen, H.-C. (2008, August). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/MWC.2008.4599222.
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.4
, pp. 60-66
-
-
Du, X.1
Chen, H.-C.2
-
129
-
-
0036992249
-
Framework for security and privacy in automotive telematics.
-
Atlanta, Georgia, USA, September 2002. ACM Press.
-
nd ACM International Workshop on Mobile Commerce (WMC'02)-Co-located with MobiCom'02, Atlanta, Georgia, USA, pp. 25-32, September 2002. ACM Press.
-
(2000)
nd ACM International Workshop on Mobile Commerce (WMC'02)-Co-located with MobiCom'02
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
130
-
-
85118764552
-
Using classification to protect the integrity of spectrum measurements in white space networks.
-
San Diego, California, USA, February 2011, Internet Society Press
-
th Annual Network and Distributed System Security Symposium (NDSS'11), San Diego, California, USA, February 2011. Internet Society Press.
-
(2011)
th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Fatemieh, O.1
Farhadi, A.2
Chandra, R.3
Gunter, C.A.4
-
131
-
-
23944459661
-
Public key cryptography in sensor networks-revisited
-
Heidelberg, Germany, August 2004. Lecture Notes in Computer Science (LNCS), Springer-Verlag, Heidelberg, Germany 2005
-
st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, August 2004. Lecture Notes in Computer Science (LNCS), Vol 3313, pp. 2-18, Springer-Verlag, Heidelberg, Germany 2005.
-
(2004)
st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'04)
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
132
-
-
24144459865
-
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
Seoul, Korea, May 2005
-
Girao, J., Westhoff, D., & Schneider, M. (2005). CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC'05), Vol 5, pp. 3044-3049, Seoul, Korea, May 2005.
-
(2005)
In Proceedings of the IEEE International Conference on Communications (ICC'05)
, vol.5
, pp. 3044-3049
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
133
-
-
70350055213
-
An architecture for secure software defined radio.
-
Nice, France, April 2009.
-
Li, C., Raghunathan, A., & Jha, N. K. (2009). An architecture for secure software defined radio. In Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE'09), pp. 448-453, Nice, France, April 2009.
-
(2009)
In Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE'09)
, pp. 448-453
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
134
-
-
29844451556
-
Enforcing cooperative resource sharing in untrusted peerto- peer environment
-
Liang, Z., & Shi, W. (2005, December). Enforcing cooperative resource sharing in untrusted peerto- peer environment. [MONET]. ACM Journal of Mobile Networks and Applications, 10(Issue 6), 971-983. doi:10.1007/s11036-005-4453-5.
-
(2005)
[MONET]. ACM Journal of Mobile Networks and Applications
, vol.10
, Issue.6
, pp. 971-983
-
-
Liang, Z.1
Shi, W.2
-
135
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks.
-
San Diego, California, USA, February 2003.
-
th Annual Network and Distributed System Security Symposium (NDSS'03), pp. 263-276, San Diego, California, USA, February 2003.
-
(2003)
th Annual Network and Distributed System Security Symposium (NDSS'03)
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
136
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
-
Santa Clara, USA, October 2004.
-
st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, pp. 71-80, Santa Clara, USA, October 2004.
-
(2004)
st IEEE International Conference on Sensor and Ad Hoc Communications and Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
137
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel.
-
San Francisco, California, USA, September 2008.
-
th ACM International Conference on Mobile Computing and Networking (MobiCom'08), pp. 128-139, San Francisco, California, USA, September 2008.
-
(2008)
th ACM International Conference on Mobile Computing and Networking (MobiCom'08)
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
138
-
-
48749130963
-
Scalable, cluster-based anti-replay protection for wireless sensor networks.
-
West Point, New York, June 2007.
-
th Annual IEEE Systems, Man, and Cybernetics (IEEE SMC'07) Information Assurance Workshop (IAW'07), pp. 127-134, West Point, New York, June 2007.
-
(2007)
th Annual IEEE Systems, Man, and Cybernetics (IEEE SMC'07) Information Assurance Workshop (IAW'07)
, pp. 127-134
-
-
Raymond, D.R.1
Marchany, R.C.2
Midkiff, S.F.3
-
140
-
-
1542317849
-
Secure verification of location claims.
-
San Diego, California, USA, September 2003.
-
nd ACM Workshop on Wireless Security(WiSE'03)-\Co-located with MobiCom 2003 Conference, pp. 1-10, San Diego, California, USA, September 2003.
-
(2003)
nd ACM Workshop on Wireless Security(WiSE'03)-\Co-located with MobiCom 2003 Conference
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
141
-
-
58049113451
-
Hammer model threat assessment of cognitive radio denial of service attacks.
-
Chicago, Illinois, USA, October 2008.
-
rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08), pp. 1-12, Chicago, Illinois, USA, October 2008.
-
(2008)
rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08)
, pp. 1-12
-
-
Sethi, A.1
Brown, T.X.2
-
142
-
-
77956262504
-
Achieving cooperative spectrum sensing in wireless cognitive radio networks
-
Special Issue on Cognitive Radio Technologies and Systems
-
Song, C., & Zhang, Q. (2009, April). Achieving cooperative spectrum sensing in wireless cognitive radio networks. ACM SIGMOBILE Mobile Computing and Communications Review (MC2R). Special Issue on Cognitive Radio Technologies and Systems, 13(Issue 2), 14-25.
-
(2009)
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R).
, vol.13
, Issue.2
, pp. 14-25
-
-
Song, C.1
Zhang, Q.2
-
143
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation
-
Westhoff, D., Girao, J., & Acharya, M. (2006, October). Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(Issue 10), 1417-1431. doi:10.1109/TMC.2006.144.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
144
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks.
-
Urbana-Champaign, Illinois, USA, May 2005.
-
th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05), pp. 46-57, Urbana-Champaign, Illinois, USA, May 2005.
-
(2005)
th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
145
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Yong, W., Attebury, G., & Ramamurthy, B. (2006, April). A survey of security issues in wireless sensor networks. IEEE Communications Survey Tutorials, 8(Issue 2), 2-33. doi:10.1109/COMST.2006.315852.
-
(2006)
IEEE Communications Survey Tutorials
, vol.8
, Issue.2
, pp. 2-33
-
-
Yong, W.1
Attebury, G.2
Ramamurthy, B.3
-
146
-
-
77952690897
-
Cognitive wireless sensor networks: emerging topics and recent challenges
-
Toronto, Canada, September 2009
-
Zahmati, A. S., Hussain, S., Fernando, X., & Grami, A. (2009). Cognitive wireless sensor networks: emerging topics and recent challenges. In Proceedings of the IEEE International Conference on Science and Technology for Humanity (TIC-STH), Vol 1, pp. 593-596, Toronto, Canada, September 2009.
-
(2009)
In Proceedings of the IEEE International Conference on Science and Technology for Humanity (TIC-STH)
, vol.1
, pp. 593-596
-
-
Zahmati, A.S.1
Hussain, S.2
Fernando, X.3
Grami, A.4
-
147
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks.
-
Oakland, California, USA, May 2004.
-
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004b). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, pp. 259-271, Oakland, California, USA, May 2004.
-
(2004)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|