-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan, and A. Perrig Security and privacy in sensor networks IEEE Computer 36 10 2003 103 105
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
67349219359
-
Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks
-
Y.M. Huang, M.Y. Hsieh, H.C. Chao, S.H. Hung, and J.H. Park Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks IEEE Journal on Selected Areas of Communications 27 4 2009 400 411
-
(2009)
IEEE Journal on Selected Areas of Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
3
-
-
77954801910
-
Adaptive body posture analysis using collaborative multi-sensors for elderly falling detection
-
C.F. Lai, Y.M. Huang, J.H. Park, and H.C. Chao Adaptive body posture analysis using collaborative multi-sensors for elderly falling detection IEEE Intelligent Systems 25 2 March/April 2010 20 30
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.2
, pp. 20-30
-
-
Lai, C.F.1
Huang, Y.M.2
Park, J.H.3
Chao, H.C.4
-
4
-
-
79551563974
-
Detection of cognitive injured body region using multiple triaxial accelerometers for elderly falling
-
C.F. Lai, S.Y. Chang, H.C. Chao, and Y.M. Huang Detection of cognitive injured body region using multiple triaxial accelerometers for elderly falling IEEE Sensors Journal 11 3 2011 763 770
-
(2011)
IEEE Sensors Journal
, vol.11
, Issue.3
, pp. 763-770
-
-
Lai, C.F.1
Chang, S.Y.2
Chao, H.C.3
Huang, Y.M.4
-
11
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerch, L. Xu, and K. EL-Khatib Trust-based security for wireless ad hoc and sensor networks Computer Communications 2007 2413 2427
-
(2007)
Computer Communications
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
12
-
-
67650844989
-
Sensor network security: A survey
-
X. Chen, K. Makki, K. Yen, and N. Pissinou Sensor network security: A survey IEEE Communications Surveys & Tutorials 11 2 2009 52 73
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
14
-
-
79952097418
-
A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory
-
R. Feng, X. Xu, X. Zhou, and J. Wan A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory Sensors 2011 1345 1360
-
(2011)
Sensors
, pp. 1345-1360
-
-
Feng, R.1
Xu, X.2
Zhou, X.3
Wan, J.4
-
15
-
-
35148895900
-
Agent-based trust model in wireless sensor networks
-
H. Chen, H. Wu, X. Zhou, and C. Gao Agent-based trust model in wireless sensor networks 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 2007 119 124
-
(2007)
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, pp. 119-124
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
16
-
-
84863011577
-
Reputation and trust mathematical approach for wireless sensor networks
-
H. Chen, G. Gu, H. Wu, and C. Gao Reputation and trust mathematical approach for wireless sensor networks International Journal of Multimedia and Ubiquitous Engineering 2 3 2007 23 32
-
(2007)
International Journal of Multimedia and Ubiquitous Engineering
, vol.2
, Issue.3
, pp. 23-32
-
-
Chen, H.1
Gu, G.2
Wu, H.3
Gao, C.4
-
18
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, and L. Zhang Statistical en-route filtering of injected false data in sensor networks Proceedings of INFOCOM 2004 839 850
-
(2004)
Proceedings of INFOCOM
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Zhang, L.3
-
20
-
-
33744987127
-
Trust evaluation model for wireless sensor networks
-
J. Hur, Y. Lee, H. Yoon, D. Choi, and S. Jin Trust evaluation model for wireless sensor networks The 7th International Conference on Advanced Communication Technology 2005 491 496
-
(2005)
The 7th International Conference on Advanced Communication Technology
, pp. 491-496
-
-
Hur, J.1
Lee, Y.2
Yoon, H.3
Choi, D.4
Jin, S.5
-
25
-
-
70449718997
-
Selective forwarding attack detection using watermark in WSNs
-
H. Deng, X. Sun, B. Wang, and Y. Cao Selective forwarding attack detection using watermark in WSNs 2009 ISECS International Colloquium on Computing, Communication, Control, and Management 2009 109 113
-
(2009)
2009 ISECS International Colloquium on Computing, Communication, Control, and Management
, pp. 109-113
-
-
Deng, H.1
Sun, X.2
Wang, B.3
Cao, Y.4
-
28
-
-
65549114586
-
Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks
-
I. Maarouf, U. Baroudi, and A.R. Naseer Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks IET Communications 3 5 2009 846 858
-
(2009)
IET Communications
, vol.3
, Issue.5
, pp. 846-858
-
-
Maarouf, I.1
Baroudi, U.2
Naseer, A.R.3
-
29
-
-
67650033246
-
An efficient reputation-based routing mechanism for wireless sensor networks: Testing the impact of mobility and hostile nodes
-
N. Lewis, and N. Foukia An efficient reputation-based routing mechanism for wireless sensor networks: Testing the impact of mobility and hostile nodes Sixth Annual Conference on Privacy, Security and Trust 2008 151 155
-
(2008)
Sixth Annual Conference on Privacy, Security and Trust
, pp. 151-155
-
-
Lewis, N.1
Foukia, N.2
-
30
-
-
79951868603
-
Building a trust-aware dynamic routing solution for wireless sensor networks
-
H. Deng, Y. Yang, G. Jin, R. Xu, and W. Shi Building a trust-aware dynamic routing solution for wireless sensor networks IEEE Globecom 2010 Workshop on Heterogeneous, Multi-Hop Wireless and Mobile Networks 2010 153 157
-
(2010)
IEEE Globecom 2010 Workshop on Heterogeneous, Multi-Hop Wireless and Mobile Networks
, pp. 153-157
-
-
Deng, H.1
Yang, Y.2
Jin, G.3
Xu, R.4
Shi, W.5
-
32
-
-
80155154403
-
A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network
-
N. Poolsappasit, and S. Madria A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network 2011 International Conference on Parallel Processing 2011 138 147
-
(2011)
2011 International Conference on Parallel Processing
, pp. 138-147
-
-
Poolsappasit, N.1
Madria, S.2
-
35
-
-
77955025560
-
A reputation-based revising scheme for localization in wireless sensor networks
-
WCNC
-
X. Xu, H. Jiang, L. Huang, H. Xu, and M. Xiao A reputation-based revising scheme for localization in wireless sensor networks IEEE Wireless Communications and Networking Conference WCNC 2010 1 6
-
(2010)
IEEE Wireless Communications and Networking Conference
, pp. 1-6
-
-
Xu, X.1
Jiang, H.2
Huang, L.3
Xu, H.4
Xiao, M.5
-
38
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
M.Y. Hsieh, Y.M. Huang, and H.C. Chao Adaptive security design with malicious node detection in cluster-based sensor networks Computer Communications 30 11-12 2007 2385 2400
-
(2007)
Computer Communications
, vol.30
, Issue.1112
, pp. 2385-2400
-
-
Hsieh, M.Y.1
Huang, Y.M.2
Chao, H.C.3
-
39
-
-
34547321367
-
Trust management problem in distributed wireless sensor networks
-
R.A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y.J. Song Trust management problem in distributed wireless sensor networks 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications 2006 411 414
-
(2006)
12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
, pp. 411-414
-
-
Shaikh, R.A.1
Jameel, H.2
Lee, S.3
Rajput, S.4
Song, Y.J.5
-
40
-
-
70350070568
-
Group-based trust management scheme for clustered wireless sensor networks
-
R.A. Shaikh, H. Jameel, B.J. dAuriol, H. Lee, S. Lee, and Y.J. Song Group-based trust management scheme for clustered wireless sensor networks IEEE Transactions on Parallel and Distributed Systems 20 11 2009 1698 1712
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.11
, pp. 1698-1712
-
-
Shaikh, R.A.1
Jameel, H.2
Dauriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.J.6
-
42
-
-
80054880147
-
A trust model based on Bayes theorem in WSNs
-
WiCOM
-
Z. Liu, Z. Zhang, S. Liu, Y. Ke, and J. Chen A trust model based on Bayes theorem in WSNs 7th International Conference on Wireless Communications, Networking and Mobile Computing WiCOM 2011 1 4
-
(2011)
7th International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Liu, Z.1
Zhang, Z.2
Liu, S.3
Ke, Y.4
Chen, J.5
-
43
-
-
70249102120
-
Malicious node detection in wireless sensor networks using weighted trust evaluation
-
I.M. Atakli, H. Hu, Y. Chen, W.S. Ku, and Z. Su Malicious node detection in wireless sensor networks using weighted trust evaluation Proceedings of the 2008 Spring Simulation Multiconference 2008 836 843
-
(2008)
Proceedings of the 2008 Spring Simulation Multiconference
, pp. 836-843
-
-
Atakli, I.M.1
Hu, H.2
Chen, Y.3
Ku, W.S.4
Su, Z.5
-
51
-
-
84856854398
-
Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation
-
B. Stelte, and A. Matheus Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation Sensors 2011 920 923
-
(2011)
Sensors
, pp. 920-923
-
-
Stelte, B.1
Matheus, A.2
-
54
-
-
77951458841
-
Efficient and distributed detection of node replication attacks in mobile sensor networks
-
VTC Fall
-
C. Yu, C. Lu, and S. Kuo Efficient and distributed detection of node replication attacks in mobile sensor networks Proceedings of Vehicular Technology Conference Fall VTC Fall 2009 1 5
-
(2009)
Proceedings of Vehicular Technology Conference Fall
, pp. 1-5
-
-
Yu, C.1
Lu, C.2
Kuo, S.3
|