-
1
-
-
77956303800
-
Wireless sensor network technologies for the information explosion era
-
Springer-Verlag
-
T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010.
-
(2010)
Studies in Computational Intelligence
, vol.278
-
-
Hara, T.1
Zadorozhny, V.I.2
Buchmann, E.3
-
2
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Second Quarter
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks, " IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
-
(2006)
IEEE Comm. Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
3
-
-
34548850872
-
A survey on clustering algorithms for wireless sensor networks
-
A.A. Abbasi and M. Younis, "A Survey on Clustering Algorithms for Wireless Sensor Networks, " Computer Comm., vol. 30, nos. 14/15, pp. 2826-2841, 2007.
-
(2007)
Computer Comm.
, vol.30
, Issue.14-15
, pp. 2826-2841
-
-
Abbasi, A.A.1
Younis, M.2
-
4
-
-
33646589837
-
An application-specific protocol architecture for wireless microsen-sor networks
-
Oct.
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsen-sor Networks, " IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
-
(2002)
IEEE Trans. Wireless Comm.
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
5
-
-
0036964041
-
An analytical model for information retrieval in wireless sensor networks using enhanced apteen protocol
-
Dec.
-
A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, "An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol, " IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
-
(2002)
IEEE Trans. Parallel & Distributed Systems
, vol.13
, Issue.12
, pp. 1290-1302
-
-
Manjeshwar, A.1
Zeng, Q.-A.2
Agrawal, D.P.3
-
6
-
-
34548825399
-
PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks
-
S. Yi et al., "PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks, " Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
-
(2007)
Computer Comm.
, vol.30
, Issue.14-15
, pp. 2842-2852
-
-
Yi, S.1
-
7
-
-
84894531690
-
Design and implementation issues of clustering in wireless sensor networks
-
K. Pradeepa, W.R. Anne, and S. Duraisamy, "Design and Implementation Issues of Clustering in Wireless Sensor Networks, " Int'l J. Computer Applications, vol. 47, no. 11, pp. 23-28, 2012.
-
(2012)
Int'l J. Computer Applications
, vol.47
, Issue.11
, pp. 23-28
-
-
Pradeepa, K.1
Anne, W.R.2
Duraisamy, S.3
-
8
-
-
34547913472
-
SecLEACH-on the security of clustered sensor networks
-
L.B. Oliveira et al., "SecLEACH-On the Security of Clustered Sensor Networks, " Signal Processing, vol. 87, pp. 2882-2895, 2007.
-
(2007)
Signal Processing
, vol.87
, pp. 2882-2895
-
-
Oliveira, L.B.1
-
9
-
-
46749106785
-
Security and performance analysis of a secure clustering protocol for sensor networks
-
P. Banerjee, D. Jacobson, and S. Lahiri, "Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks, " Proc. IEEE Sixth Int'l Symp. Network Computing and Applications (NCA), pp. 145-152, 2007.
-
(2007)
Proc. IEEE Sixth Int'l Symp. Network Computing and Applications (NCA
, pp. 145-152
-
-
Banerjee, P.1
Jacobson, D.2
Lahiri, S.3
-
10
-
-
58049106676
-
A secure routing protocol for cluster-based wireless sensor networks using group key management
-
K. Zhang, C. Wang, and C. Wang, "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management, " Proc. Fourth Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-5, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM
, pp. 1-5
-
-
Zhang, K.1
Wang, C.2
Wang, C.3
-
13
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New Directions in Cryptography, " IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes, " Proc. Advances in Cryptology (CRYPTO), pp. 47-53, 1985.
-
(1985)
Proc. Advances in Cryptology (CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
33845463647
-
New directions in sensor network key management
-
D.W. Carman, "New Directions in Sensor Network Key Management, " Int'l J. Distributed Sensor Networks, vol. 1, pp. 3-15, 2005.
-
(2005)
Int'l J. Distributed Sensor Networks
, vol.1
, pp. 3-15
-
-
Carman, D.W.1
-
16
-
-
78249241819
-
An authentication framework for wireless sensor networks using identity-based signatures
-
R. Yasmin, E. Ritter, and G. Wang, "An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures, " Proc. IEEE Int'l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.
-
(2010)
Proc. IEEE Int'l Conf. Computer and Information Technology (CIT
, pp. 882-889
-
-
Yasmin, R.1
Ritter, E.2
Wang, G.3
-
17
-
-
79551633433
-
A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature
-
H. Lu, J. Li, and H. Kameda, "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature, " Proc. IEEE GLOBECOM, pp. 1-5, 2010.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Lu, H.1
Li, J.2
Kameda, H.3
-
18
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
Sept.
-
J. Sun et al., "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks, " IEEE Trans. Parallel & Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
-
(2010)
IEEE Trans. Parallel & Distributed Systems
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
-
19
-
-
85028913061
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali, "On-Line/Off-Line Digital Signatures, " Proc. Advances in Cryptology (CRYPTO), pp. 263-275, 1990.
-
(1990)
Proc. Advances in Cryptology (CRYPTO
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
20
-
-
33746327817
-
Online/offline signatures and multisignatures for aodv and dsr routing security
-
S. Xu, Y. Mu, and W. Susilo, "Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security, " Proc. 11th Australasian Conf. Information Security and Privacy, pp. 99-110, 2006.
-
(2006)
Proc. 11th Australasian Conf. Information Security and Privacy
, pp. 99-110
-
-
Xu, S.1
Mu, Y.2
Susilo, W.3
-
21
-
-
77955088735
-
Efficient online/offline identity-based signature for wireless sensor network
-
J. Liu et al., "Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network, " Int'l J. Information Security, vol. 9, no. 4, pp. 287-296, 2010.
-
(2010)
Int'l J. Information Security
, vol.9
, Issue.4
, pp. 287-296
-
-
Liu, J.1
-
23
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " Ad Hoc Networks, vol. 1, nos. 2/3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
25
-
-
84894513711
-
An introduction to the theory of groups, fourth ed
-
Verlag
-
J.J. Rotman, An Introduction to the Theory of Groups, fourth ed. Springer-Verlag, 1994.
-
(1994)
Springer
-
-
Rotman, J.J.1
-
26
-
-
0002139049
-
The discrete logarithm problem
-
K.S. McCurley, "The Discrete Logarithm Problem, " Proc. Symp. Applied Math., Programming Computer Science, vol. 42, pp. 49-74, 1990.
-
(1990)
Proc. Symp. Applied Math., Programming Computer Science
, vol.42
, pp. 49-74
-
-
McCurley, K.S.1
-
27
-
-
35248901398
-
A secure signature scheme from bilinear maps
-
D. Boneh, I. Mironov, and V. Shoup, "A Secure Signature Scheme from Bilinear Maps, " Proc. RSA Conf. The Cryptographers' Track (CT-RSA), pp. 98-110, 2003.
-
(2003)
Proc. RSA Conf. The Cryptographers' Track CT-RSA
, pp. 98-110
-
-
Boneh, D.1
Mironov, I.2
Shoup, V.3
-
29
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, " Proc. Second Ann. Int'l Conf Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 109-117, 2005.
-
(2005)
Proc. Second Ann. Int'l Conf Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
30
-
-
77949834033
-
A novel energy efficient routing algorithm for hierarchically clustered wireless sensor networks
-
H. Lu, J. Li, and G. Wang, "A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks, " Proc. Fourth Int'l Conf. Frontier of Computer Science and Technology (FCST), pp. 565-570, 2009.
-
(2009)
Proc. Fourth Int'l Conf. Frontier of Computer Science and Technology (FCST
, pp. 565-570
-
-
Lu, H.1
Li, J.2
Wang, G.3
-
31
-
-
70449477091
-
A hierarchical clustering-based routing protocol for wireless sensor networks supporting multiple data aggregation qualities
-
Y. Jia, L. Zhao, and B. Ma, "A Hierarchical Clustering-Based Routing Protocol for Wireless Sensor Networks Supporting Multiple Data Aggregation Qualities, " IEEE Trans. Parallel & Distributed Systems, vol. 4, nos. 1/2, pp. 79-91, 2008.
-
(2008)
IEEE Trans. Parallel & Distributed Systems
, vol.4
, Issue.1-2
, pp. 79-91
-
-
Jia, Y.1
Zhao, L.2
Ma, B.3
-
32
-
-
84894552782
-
-
OMNeT++ Community
-
"OMNeT++, " OMNeT++ Community, http://www.omnetpp.org/, 2013.
-
(2013)
OMNeT++
-
-
-
33
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
Oct.
-
B. Sun et al., "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks, " IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007.
-
(2007)
IEEE Wireless Comm. Magazine
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
-
36
-
-
85000276942
-
Multilevel/itesla: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multilevel/iTESLA: Broadcast Authentication for Distributed Sensor Networks, " ACM Trans. Embedded Computing Systems, vol. 3, pp. 800-836, 2004.
-
(2004)
ACM Trans. Embedded Computing Systems
, vol.3
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
37
-
-
84894597195
-
-
Crossbow Technology
-
"Crossbow Stargate, " Crossbow Technology, http://bullseye. xbow. com:81/Products/productdetails.aspx?sid=229, 2013.
-
(2013)
Crossbow Stargate
-
-
|