-
1
-
-
84893316353
-
-
Departmental papers, Department of Computer and Information Science, University of Pennsylvania
-
M. Anand, G. Ives, I. Lee. Quantifying Eavesdropping Vulnerability in Sensor Networks. Departmental papers, Department of Computer and Information Science, University of Pennsylvania, 2005.
-
(2005)
Quantifying Eavesdropping Vulnerability in Sensor Networks
-
-
Anand, M.1
Ives, G.2
Lee, I.3
-
2
-
-
84884094440
-
-
(MobiHoc '05). ACM, 2005
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, in: Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05). ACM, 2005, pp. 48-57.
-
Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 48-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
3
-
-
84884114559
-
-
First International Workshop on Peer-to-Peer Systems (IPTPS '02)
-
J.R. Douceur, The sybil attack. in: First International Workshop on Peer-to-Peer Systems (IPTPS '02), 2002.
-
(2002)
The sybil attack.
-
-
Douceur, J.R.1
-
4
-
-
84942426861
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. First International Workshop on Sensor Network Protocols and Applications.
-
C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. First International Workshop on Sensor Network Protocols and Applications. IEEE, 2003, pp. 113-127.
-
(2003)
IEEE
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
5
-
-
3042785862
-
-
Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE
-
J. Newsome, E. Shi, D. Song, A. Perrig. The sybil attack in sensor networks: analysis & defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE, 2004, pp. 259-268.
-
(2004)
The sybil attack in sensor networks: analysis & defenses.
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
51849119602
-
Defending wireless sensor networks from radio interference through channel adaptation, ACM Trans.
-
W. Xu, W. Trappe, Y. Zhang, Defending wireless sensor networks from radio interference through channel adaptation, ACM Trans. Sensor Network 4(4), 18-34.
-
Sensor Network
, vol.4
, Issue.4
, pp. 18-34
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
7
-
-
60749131639
-
-
International Conference on Mechtronic and Embedded Systems and Applications, MESA. IEEE
-
Sun Zheng, Xiao-guang Zhang, Hui Li, Anqi Li. The application of TinyOS beaconing WSN routing protocol in mine safety monitoring. International Conference on Mechtronic and Embedded Systems and Applications, MESA. IEEE, 2008, pp. 415-419.
-
(2008)
The application of TinyOS beaconing WSN routing protocol in mine safety monitoring
, pp. 415-419
-
-
Zheng, S.1
Zhang, X.G.2
Li, H.3
Li, A.4
-
9
-
-
0036738266
-
SPINS: Security protocols for sensor
-
Perrig A., Szewczyk R., Tygar J., Wen V., Culler D. SPINS: Security protocols for sensor. Wireless Networks 2002, 8(5):521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
11
-
-
84884014378
-
-
Zigbee Specification
-
Z. Alliance, Zigbee Specification, 2013. <>. http://www.zigbee.org/Specifications.aspx.
-
(2013)
-
-
Alliance, Z.1
-
13
-
-
33646581008
-
-
Third IEEE International Conference on Pervasive Computing and Communications. IEEE
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz. Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications. IEEE, 2005, pp. 324-328.
-
(2005)
Energy analysis of public-key cryptography for wireless sensor networks.
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
14
-
-
14844304757
-
-
2nd ACM Workshop on Security of ad hoc and Sensor Networks. ACM
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: securing sensor networks with public key technology. 2nd ACM Workshop on Security of ad hoc and Sensor Networks. ACM, 2004, pp. 59-64.
-
(2004)
TinyPK: securing sensor networks with public key technology.
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn C.Kruus, P.5
-
15
-
-
1542286901
-
Fast Authenticated Key Establishment Protocols for Organizing Sensor Networks.
-
ACM
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang. Fast Authenticated Key Establishment Protocols for Organizing Sensor Networks. Workshop on Sensor Networks and Applications (WSNA). ACM, 2003, pp. 141-150.
-
(2003)
Workshop on Sensor Networks and Applications (WSNA)
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
16
-
-
28244469017
-
Analysis and improvement of an authenticated key exchange protocol for sensor networks
-
Tian X., Wong D., Zhu.R. Analysis and improvement of an authenticated key exchange protocol for sensor networks. Commun. Lett. (IEEE) 2005, 9(11):970-972.
-
(2005)
Commun. Lett. (IEEE)
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.2
Zhu, R.3
-
17
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks.
-
IEEE
-
K. Ren, W. Lou, Y. Zhang, Multi-user broadcast authentication in wireless sensor networks. Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2012, pp. 223-232.
-
(2012)
Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks.
, pp. 223-232
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
18
-
-
0019292439
-
Protocols for public key cryptosystems.
-
IEEE
-
R.C. Merkle, Protocols for public key cryptosystems. Symposium on Security and Privacy. IEEE, 1980, pp. 122-134.
-
(1980)
Symposium on Security and Privacy.
, pp. 122-134
-
-
Merkle, R.C.1
-
19
-
-
0036806148
-
Compressed bloom filters.
-
Edited by ACM.
-
M. Mitzenmacher, Compressed bloom filters. Edited by ACM. Transactions on Networking 10 (5) (2002) 604-612.
-
(2002)
Transactions on Networking
, vol.10
, Issue.5
, pp. 604-612
-
-
Mitzenmacher, M.1
-
20
-
-
77953034949
-
Efficient implementation of elliptic curve cryptography in wireless sensors
-
Aranha D., Dahab R., López J., Oliveira L. Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 2010, 4(2):169-187.
-
(2010)
Adv. Math. Commun.
, vol.4
, Issue.2
, pp. 169-187
-
-
Aranha, D.1
Dahab, R.2
López, J.3
Oliveira, L.4
-
22
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag, Berlin, 471-486
-
Blundo C., Santis A.D., Herzberg A., Kutten S. Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology-Crypto '92 1992, Springer-Verlag, Berlin, 471-486.
-
(1992)
Advances in Cryptology-Crypto '92
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
-
25
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks.
-
ACM
-
W. Du, J. Deng, Y. Han, P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003). ACM, 2003, pp. 42-51.
-
(2003)
Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
27
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
Springer-Verlag, 294-307
-
Lee J., Stinson D. Deterministic key predistribution schemes for distributed sensor networks. Lecture Notes in Computer Science 2005, 3357. Springer-Verlag, 294-307.
-
(2005)
Lecture Notes in Computer Science
, vol.3357
-
-
Lee, J.1
Stinson, D.2
-
28
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe S., Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE Trans. Networking (IEEE) 2007, 15(2):346-358.
-
(2007)
IEEE Trans. Networking (IEEE)
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.1
Yener, B.2
-
29
-
-
11144277843
-
Routing techniques in wireless sensor networks: a survey
-
Al-Karaki J.N., Kamal A.E. Routing techniques in wireless sensor networks: a survey. Wireless Commun. (IEEE) 2004, 11:6-28.
-
(2004)
Wireless Commun. (IEEE)
, vol.11
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
30
-
-
0013043106
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
Ganesan D., Govindan R., Shenker S., Estrin D. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Commun. Rev. (ACM SIGMOBILE) 2001, 5(4):10-24.
-
(2001)
Mobile Comput. Commun. Rev. (ACM SIGMOBILE)
, vol.5
, Issue.4
, pp. 10-24
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
32
-
-
25844505160
-
Exploiting heterogeneity in sensor networks.
-
IEEE
-
M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S. Singh. Exploiting heterogeneity in sensor networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 2005, pp. 878-890.
-
(2005)
24th Annual Joint Conference of the IEEE Computer and Communications Societies.
, pp. 878-890
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
Rangarajan, A.4
Liu, Y.5
Singh, S.6
-
34
-
-
85031307530
-
Highly dynamic destination sequenced distance-vector routing for mobile computers
-
Perkins C., Bhagwat P. Highly dynamic destination sequenced distance-vector routing for mobile computers. ACM's Comput. Commun. Rev. (ACM) 1994, 234-244.
-
(1994)
ACM's Comput. Commun. Rev. (ACM)
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
36
-
-
84884095509
-
Dynamic sourcerrouting
-
Kulwer Academic Press, 153-181
-
Johnson D., Maltz D. Dynamic sourcerrouting. Mobile Computing 1996, Kulwer Academic Press, 153-181.
-
(1996)
Mobile Computing
-
-
Johnson, D.1
Maltz, D.2
-
37
-
-
0035415758
-
The performance of query control scheme for the zone routing protocol
-
Haas Z., Pearlman M. The performance of query control scheme for the zone routing protocol. Trans. Networking (IEEE) 2001, 427-438.
-
(2001)
Trans. Networking (IEEE)
, pp. 427-438
-
-
Haas, Z.1
Pearlman, M.2
-
39
-
-
70449525340
-
Detecting sybil attacks in wireless sensor networks using neighboring information
-
December
-
Ssu Kuo-Feng, Wei-Tong Wang, Wen-Chung Chang Detecting sybil attacks in wireless sensor networks using neighboring information. Comput. Networks (Elsevier) December 2009, 53(18):3042-3056.
-
(2009)
Comput. Networks (Elsevier)
, vol.53
, Issue.18
, pp. 3042-3056
-
-
Ssu, K.-F.1
Wei-Tong, W.2
Wen-Chung, C.3
-
42
-
-
2342537739
-
Joint scheduling and power control for wireless ad hoc networks
-
ElBatt T., Ephremides A. Joint scheduling and power control for wireless ad hoc networks. IEEE Trans. Wireless Commun. 2004, 3(1):74-85.
-
(2004)
IEEE Trans. Wireless Commun.
, vol.3
, Issue.1
, pp. 74-85
-
-
ElBatt, T.1
Ephremides, A.2
-
43
-
-
84883922279
-
-
Std.802.15.4, IEEE. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). IEEE Press
-
Std.802.15.4, IEEE. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). IEEE Press, 2003.
-
(2003)
-
-
|