-
1
-
-
0033900912
-
Multicast routing algorithms and protocols: a tutorial
-
Sahasrabuddhe LH, Biswanath M. Multicast routing algorithms and protocols: a tutorial. IEEE Networks 2000; 14: 90-102.
-
(2000)
IEEE Networks
, vol.14
, pp. 90-102
-
-
Sahasrabuddhe, L.H.1
Biswanath, M.2
-
2
-
-
77953852618
-
-
Secure sensor network routing: a clean state approach. In Proceedings of CoNEXT'06
-
Parno B, Gaustad E, Luk M. Secure sensor network routing: a clean state approach. In Proceedings of CoNEXT'06, 2006.
-
(2006)
-
-
Parno, B.1
Gaustad, E.2
Luk, M.3
-
3
-
-
10044284351
-
-
LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
4
-
-
85177225747
-
-
SPINS: Security Protocols for Sensor Networks. In Proceedings of MOBICOM'01
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. In Proceedings of MOBICOM'01, 2001.
-
(2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
5
-
-
34547466172
-
-
seven cardinal properties of sensor network broadcast authentication. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06)
-
Mark L, Perrig A, Whillock B. seven cardinal properties of sensor network broadcast authentication. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006.
-
(2006)
-
-
Mark, L.1
Perrig, A.2
Whillock, B.3
-
6
-
-
0041973497
-
-
Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of INFOCOM'03
-
Hu Y-C, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of INFOCOM'03, 2003.
-
(2003)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
7
-
-
18844362199
-
-
Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In Proceedings of Sensys'03 Poster Session
-
Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In Proceedings of Sensys'03 Poster Session, 2003.
-
(2003)
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
8
-
-
70349312266
-
Secure routing in wireless sensor networks
-
IOS Press: Amsterdam, The Netherlands
-
Acs G, Buttyan L. Secure routing in wireless sensor networks. In Wireless Sensor Network Security. IOS Press: Amsterdam, The Netherlands, 2008.
-
(2008)
Wireless Sensor Network Security
-
-
Acs, G.1
Buttyan, L.2
-
9
-
-
84907549442
-
-
Energy aware routing for low energy ad hoc sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference
-
Shah RC, Rabaey JM. Energy aware routing for low energy ad hoc sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference, 2002.
-
(2002)
-
-
Shah, R.C.1
Rabaey, J.M.2
-
10
-
-
84894028534
-
-
Hierarchical power-aware routing in sensor networks. In Proceedings of the DIMACS Workshop on Pervasive Networking
-
Li Q, Aslam J, Rus D. Hierarchical power-aware routing in sensor networks. In Proceedings of the DIMACS Workshop on Pervasive Networking, 2001.
-
(2001)
-
-
Li, Q.1
Aslam, J.2
Rus, D.3
-
11
-
-
84907688804
-
-
Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference
-
Dulman S, Nieberg T, Wu J. Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference, 2003.
-
(2003)
-
-
Dulman, S.1
Nieberg, T.2
Wu, J.3
-
12
-
-
84894041591
-
-
INSENS: INtrusion-tolerant routing in wireless SEnsor NetworkS. In Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS)
-
Deng J, Han R, Mishra S. INSENS: INtrusion-tolerant routing in wireless SEnsor NetworkS. In Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS), 2003.
-
(2003)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
13
-
-
0035727475
-
-
A multipath routing approach for secure data delivery. In Proceedings of Military Communications Conference 2001 (Milcom'01)
-
Lou W, Fang Y. A multipath routing approach for secure data delivery. In Proceedings of Military Communications Conference 2001 (Milcom'01), 2001.
-
(2001)
-
-
Lou, W.1
Fang, Y.2
-
14
-
-
34547477757
-
-
SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06)
-
Wood AD, Fang L, Stankovic JA, He T. SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006.
-
(2006)
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc and Sensor Networks (Elsevier) 2003; 1: 293-315.
-
(2003)
Ad Hoc and Sensor Networks (Elsevier)
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
16
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy
-
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, 2003.
-
(2003)
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
8344262333
-
-
A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04
-
Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04, 2004.
-
(2004)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
18
-
-
3042822764
-
-
Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security
-
Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
-
-
Liu, D.1
Ning, P.2
-
19
-
-
85177497795
-
-
Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00, 2000.
-
(2000)
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
20
-
-
34247573439
-
SENDROM: sensor networks for disaster relief operations management
-
Cayirci E, Coplu T. SENDROM: sensor networks for disaster relief operations management. Wireless Networks 2007; 13: 409-423.
-
(2007)
Wireless Networks
, vol.13
, pp. 409-423
-
-
Cayirci, E.1
Coplu, T.2
-
21
-
-
0034445661
-
-
System architecture directions for network sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
-
Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K. System architecture directions for network sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
-
(2000)
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
22
-
-
0033877788
-
-
Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences
-
Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences, 2000.
-
(2000)
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
|