-
1
-
-
33751348603
-
Wireless sensor networks- part II: Routing protocols and security issues
-
DOI 10.1109/CCECE.2005.1556879, 1556879, Canadian Conference on Electrical and Computer Engineering 2005
-
Abd-El-Barr ML, Al-Otaibi MM, Youssef MA. Wireless Sensor networks - part II: routing protocols and security issues. In: Proceedings of the Canadian conference on electrical and computer engineering. Saskatoon, Canada; 2005. p. 69-72. (Pubitemid 44801569)
-
(2005)
Canadian Conference on Electrical and Computer Engineering
, vol.2005
, pp. 69-72
-
-
Abd-El-Barr, M.I.1
Al-Otaibi, M.M.2
Youssef, M.A.3
-
2
-
-
84881313532
-
On the vital areas of intrusion detection systems in wireless sensor networks
-
A. Abduvaliyev, A.S.K. Pathan, J. Zhou, R. Roman, and W.C. Wong On the vital areas of intrusion detection systems in wireless sensor networks IEEE Commun Surv Tutor 15 2013 1223 1237
-
(2013)
IEEE Commun Surv Tutor
, vol.15
, pp. 1223-1237
-
-
Abduvaliyev, A.1
Pathan, A.S.K.2
Zhou, J.3
Roman, R.4
Wong, W.C.5
-
3
-
-
13944283393
-
Survey on routing protocols for wireless sensor networks
-
Akkaya K, Younis MA. Survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3:325-49.
-
Ad Hoc Networks
, vol.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.A.2
-
5
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
M. Al Ameen, J. Liu, and K. Kwak Security and privacy issues in wireless sensor networks for healthcare applications J Med Syst 36 2010 93 101
-
(2010)
J Med Syst
, vol.36
, pp. 93-101
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
7
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
J.N. Al-Karaki, and A.E. Kamal Routing techniques in wireless sensor networks: a survey IEEE Wireless Commun 11 2004 6 28
-
(2004)
IEEE Wireless Commun
, vol.11
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
9
-
-
84893385327
-
On wireless sensor networks: Architectures, protocols, applications and management
-
Sydney, Australia
-
Al-Obaisat Y, Braun R. On wireless sensor networks: architectures, protocols, applications and management. In: Proceedings of the 2nd international conference on wireless broadband and ultra wideband communication (AusWireless). Sydney, Australia; 2007. p. 1-11.
-
(2007)
Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communication (AusWireless)
, pp. 1-11
-
-
Al-Obaisat, Y.1
Braun, R.2
-
12
-
-
84873338686
-
Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks
-
N.A. Alrajeh, S. Khan, J. Lloret, and J. Loo Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks Int J Distrib Sens Netw 2013 2013 11
-
(2013)
Int J Distrib Sens Netw
, vol.2013
, pp. 11
-
-
Alrajeh, N.A.1
Khan, S.2
Lloret, J.3
Loo, J.4
-
16
-
-
57649219422
-
Adaptive probabilistic secure routing in mobile wireless sensor networks
-
Split, Croatia
-
Bairaktaris K, Chatzigiannakis I, Liagkou V, Spirakis PG. Adaptive probabilistic secure routing in mobile wireless sensor networks. In: Proceedings of the 16th international conference on SoftCOM 2008 software, telecommunications, and computer networks. Split, Croatia; 2008. p. 208-12.
-
(2008)
Proceedings of the 16th International Conference on SoftCOM 2008 Software, Telecommunications, and Computer Networks
, pp. 208-212
-
-
Bairaktaris, K.1
Chatzigiannakis, I.2
Liagkou, V.3
Spirakis, P.G.4
-
17
-
-
79961026345
-
Routing protocols in ad hoc networks: A survey
-
A. Boukerche, B. Turgut, N. Aydin, M.Z. Ahmad, L. Bölöni, and D. Turgut Routing protocols in ad hoc networks: a survey Comput Netw 55 2011 3032 3080
-
(2011)
Comput Netw
, vol.55
, pp. 3032-3080
-
-
Boukerche, A.1
Turgut, B.2
Aydin, N.3
Ahmad, M.Z.4
Bölöni, L.5
Turgut, D.6
-
18
-
-
77949639883
-
An efficient source initiated on-demand data forwarding scheme for wireless sensor networks
-
Macau: Macau Fisherman's Wharf
-
Brandl M, Kellner KH, Posnicek T, Kos A, Mayerhofer C, Fabian C. An efficient source initiated on-demand data forwarding scheme for wireless sensor networks. In Proceedings of the 7th international conference on information, communications and signal processing (ICICS 2009). Macau: Macau Fisherman's Wharf; 2009. p. 1-7.
-
(2009)
Proceedings of the 7th International Conference on Information, Communications and Signal Processing (ICICS 2009)
, pp. 1-7
-
-
Brandl, M.1
Kellner, K.H.2
Posnicek, T.3
Kos, A.4
Mayerhofer, C.5
Fabian, C.6
-
20
-
-
79956094979
-
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
-
Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, and A. Hadjidj Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks J Netw Comput Appl 34 2011 1380 1397
-
(2011)
J Netw Comput Appl
, vol.34
, pp. 1380-1397
-
-
Challal, Y.1
Ouadjaout, A.2
Lasla, N.3
Bagaa, M.4
Hadjidj, A.5
-
22
-
-
0035428428
-
Sensor information networking architecture and applications
-
DOI 10.1109/98.944004
-
S. Chien-Chung, C. Srisathapornphat, and C. Jaikaeo Sensor information networking architecture and applications IEEE Pers Commun 8 2001 52 59 (Pubitemid 33060768)
-
(2001)
IEEE Personal Communications
, vol.8
, Issue.4
, pp. 52-59
-
-
Shen, C.-C.1
Srisathapornphat, C.2
Jaikaeo, C.3
-
23
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
DOI 10.1109/MCOM.2002.1039859
-
H. Deng, W. Li, and D.P. Agrawal Routing security in wireless ad hoc networks IEEE Commun Mag 40 2002 70 75 (Pubitemid 35311948)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
24
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
DOI 10.1016/j.comcom.2005.05.018, PII S0140366405002045
-
J. Deng, R. Han, and S. Mishra INSENS: intrusion-tolerant routing for wireless sensor networks Comput Commun 29 2006 216 230 (Pubitemid 43060026)
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
25
-
-
79953077136
-
An efficient and secure routing protocol for wireless sensor networks using multicasting
-
Hangzhou, China
-
Dhurandher SK, Obaidat MS, Jain G, Ganesh IM, Shashidhar V. An efficient and secure routing protocol for wireless sensor networks using multicasting. In: Proceedings of the IEEE/ACM international conference on green computing and communications (GreenCom 2010) & IEEE/ACM international conference on cyber, physical and social computing (CPSCom 2010). Hangzhou, China; 2010. p. 374-9.
-
(2010)
Proceedings of the IEEE/ACM International Conference on Green Computing and Communications (GreenCom 2010) & IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010)
, pp. 374-379
-
-
Dhurandher, S.K.1
Obaidat, M.S.2
Jain, G.3
Ganesh, I.M.4
Shashidhar, V.5
-
26
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
Kaohsiung, Taiwan: IEEE Computer Society Press
-
Di Pietro R, Mancini LV, Yee Wei L, Etalle S, Havinga P. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. In: Proceedings of the 32nd international conference parallel processing workshops (ICPPW '03). Kaohsiung, Taiwan: IEEE Computer Society Press; 2003. p. 397-406.
-
(2003)
Proceedings of the 32nd International Conference Parallel Processing Workshops (ICPPW '03)
, pp. 397-406
-
-
Di Pietro, R.1
Mancini, L.V.2
Yee Wei, L.3
Etalle, S.4
Havinga, P.5
-
27
-
-
84887255066
-
An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks
-
A. Diop, Y. Qi, Q. Wang, and S. Hussain An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks Int J Comput Sci Issues 10 2013 490 500
-
(2013)
Int J Comput Sci Issues
, vol.10
, pp. 490-500
-
-
Diop, A.1
Qi, Y.2
Wang, Q.3
Hussain, S.4
-
28
-
-
77950904615
-
Research on routing protocols in ad hoc networks
-
Shanghai, China
-
Dou N, Yan Z, Yanjuan Z, Mei Y. Research on routing protocols in ad hoc networks. international conference on wireless networks and information systems (WNIS 2009). Shanghai, China; 2009. p. 27-30.
-
(2009)
International Conference on Wireless Networks and Information Systems (WNIS 2009)
, pp. 27-30
-
-
Dou, N.1
Yan, Z.2
Yanjuan, Z.3
Mei, Y.4
-
29
-
-
28444461824
-
Secure cell relay routing protocol for sensor networks
-
9a.6, Conference Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005
-
Du X, Lin F. Secure cell relay routing protocol for sensor networks. In: Proceedings of the 24th IEEE international conference on performance, computing, and communications conference (IPCCC 2005). Phoenix, Arizona; 2005. p. 477-82. (Pubitemid 41729988)
-
(2005)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 477-482
-
-
Du, X.1
Lin, F.2
-
30
-
-
84860890708
-
Survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks
-
S. Ehsan, and B.A. Hamdaoui Survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks IEEE Commun Surv Tutor 14 2011 265 278
-
(2011)
IEEE Commun Surv Tutor
, vol.14
, pp. 265-278
-
-
Ehsan, S.1
Hamdaoui, B.A.2
-
31
-
-
84857815536
-
MTESLA-based secure routing protocol for wireless sensor networks
-
Beirut, Lebanon: ACM
-
El-Bendary N, Hassanien AE, Sedano J, Soliman OS, Ghali NI. mTESLA-based secure routing protocol for wireless sensor networks. In: Proceedings of the first international workshop on security and privacy preserving in e-societies. Beirut, Lebanon: ACM; 2011. p. 34-39.
-
(2011)
Proceedings of the First International Workshop on Security and Privacy Preserving in E-societies
, pp. 34-39
-
-
El-Bendary, N.1
Hassanien, A.E.2
Sedano, J.3
Soliman, O.S.4
Ghali, N.I.5
-
32
-
-
84878625354
-
New trends in secure routing protocols for wireless sensor networks
-
A.M. El-Semary, and M.M. Abdel-Azim New trends in secure routing protocols for wireless sensor networks Int J Distrib Sens Netw 2013 2013 16
-
(2013)
Int J Distrib Sens Netw
, vol.2013
, pp. 16
-
-
El-Semary, A.M.1
Abdel-Azim, M.M.2
-
33
-
-
0034842559
-
Instrumenting the world with wireless sensor networks
-
Estrin D, Girod L, Pottie G, Srivastava M. Instrumenting the world with wireless sensor networks. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP '01). Salt Lake City, UT; 2001. p. 2033-6. (Pubitemid 32838676)
-
(2001)
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
, vol.4
, pp. 2033-2036
-
-
Estrin, D.1
Girod, L.2
Pottie, G.3
Srivastava, M.4
-
34
-
-
77952210302
-
Steiner-based secure multicast routing protocol for wireless sensor network
-
Hainan, China
-
Fan R, Chen J, Fu JQ, Ping LDA. Steiner-based secure multicast routing protocol for wireless sensor network. In: Proceedings of the 2nd international conference on future networks (ICFN 2010). Hainan, China; 2010. p. 159-63.
-
(2010)
Proceedings of the 2nd International Conference on Future Networks (ICFN 2010)
, pp. 159-163
-
-
Fan, R.1
Chen, J.2
Fu, J.Q.3
Ping, L.D.A.4
-
35
-
-
51249098151
-
Missouri S&T mote-based demonstration of energy monitoring solution for network enabled manufacturing using wireless sensor networks (WSN)
-
IEEE Computer Society
-
Fonda JW, Zawodniok MJ, Jagannathan S, Salour A, Miller DonaldJr. Missouri S&T mote-based demonstration of energy monitoring solution for network enabled manufacturing using wireless sensor networks (WSN). In: Proceedings of the 7th international conference on information processing in sensor networks. IEEE Computer Society; 2008. p. 559-60.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks
, pp. 559-560
-
-
Fonda, J.W.1
Zawodniok, M.J.2
Jagannathan, S.3
Salour, A.4
Donald, M.5
-
36
-
-
84865209827
-
Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks
-
S.M. Gaurav, R.J. D'Souza, and G. Varaprasad Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks IEEE Sens J 12 2012 2941 2949
-
(2012)
IEEE Sens J
, vol.12
, pp. 2941-2949
-
-
Gaurav, S.M.1
D'Souza, R.J.2
Varaprasad, G.3
-
37
-
-
77749259094
-
The research of clustering protocol based on chain routing in WSNs
-
Wuhan, China
-
Gengsheng Z, Xiaohua L, Xingming H, Weidong Z. The research of clustering protocol based on chain routing in WSNs. In: Proceedings of the Asia-Pacific conference on computational intelligence and industrial applications (PACIIA 2009). Wuhan, China; 2009. p. 292-5.
-
(2009)
Proceedings of the Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009)
, pp. 292-295
-
-
Gengsheng, Z.1
Xiaohua, L.2
Xingming, H.3
Weidong, Z.4
-
38
-
-
71049120929
-
Secure routing and aggregation protocol with low energy cost for sensor networks
-
Ternopil, Ukraine
-
Gui N, Ruichuan C, Zhuhua C, Jianbin H, Zhong CA. Secure routing and aggregation protocol with low energy cost for sensor networks. In: Proceedings of the international symposium on information engineering and electronic commerce (IEEC 2009). Ternopil, Ukraine; 2009. p. 79-84.
-
(2009)
Proceedings of the International Symposium on Information Engineering and Electronic Commerce (IEEC 2009)
, pp. 79-84
-
-
Gui, N.1
Ruichuan, C.2
Zhuhua, C.3
Jianbin, H.4
Zhong, C.A.5
-
40
-
-
84878655787
-
Study on the security issues in WSN
-
T. Halim, and M.R.A. Islam Study on the security issues in WSN Int J Comput Appl 53 2012 26 32
-
(2012)
Int J Comput Appl
, vol.53
, pp. 26-32
-
-
Halim, T.1
Islam, M.R.A.2
-
41
-
-
0037968893
-
SPEED: A stateless protocol for real-time communication in sensor networks
-
Providence, Rhode Island, USA
-
He T, Stankovic JA, Lu C, Abdelzaher T. SPEED: a stateless protocol for real-time communication in sensor networks. In: Proceedings of the 23rd international conference on distributed computing systems. Providence, Rhode Island, USA; 2003. p. 46-55.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
, pp. 46-55
-
-
He, T.1
Stankovic, J.A.2
Lu, C.3
Abdelzaher, T.4
-
44
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.C. Hu, A. Perrig, and D.B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks Wirel Netw 11 2005 21 38 (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
45
-
-
84866623726
-
SEC-TEEN: A secure routing protocol for enhanced efficiency in wireless sensor networks
-
K. Elleithy, T. Sobh, Springer New York
-
A. Ibrahim, A. Tamer, and A. Abdelshakour SEC-TEEN: a secure routing protocol for enhanced efficiency in wireless sensor networks K. Elleithy, T. Sobh, Innovations and advances in computer, information, systems sciences, and engineering 2013 Springer New York 621 631
-
(2013)
Innovations and Advances in Computer, Information, Systems Sciences, and Engineering
, pp. 621-631
-
-
Ibrahim, A.1
Tamer, A.2
Abdelshakour, A.3
-
51
-
-
84993803009
-
An efficient detection model of selective forwarding attacks in wireless mesh networks
-
Y. Xiang, M. Pathan, X. Tao, H. Wang, Springer Berlin Heidelberg
-
S. Khanam, H. Saleem, and A.S. Pathan An efficient detection model of selective forwarding attacks in wireless mesh networks Y. Xiang, M. Pathan, X. Tao, H. Wang, Internet and distributed computing systems 2012 Springer Berlin Heidelberg 1 14
-
(2012)
Internet and Distributed Computing Systems
, pp. 1-14
-
-
Khanam, S.1
Saleem, H.2
Pathan, A.S.3
-
52
-
-
84866341880
-
Improvement of assurance including security for wireless sensor networks using dispersed data transmission
-
E. Kohno, T. Okazaki, M. Takeuchi, T. Ohta, Y. Kakuda, and M. Aida Improvement of assurance including security for wireless sensor networks using dispersed data transmission J Comput Syst Sci 78 2012 1703 1715
-
(2012)
J Comput Syst Sci
, vol.78
, pp. 1703-1715
-
-
Kohno, E.1
Okazaki, T.2
Takeuchi, M.3
Ohta, T.4
Kakuda, Y.5
Aida, M.6
-
55
-
-
33751183522
-
A secure alternate path routing in sensor networks
-
S.B. Lee, and Y.H. Choi A secure alternate path routing in sensor networks Comput Commun 30 2006 153 165
-
(2006)
Comput Commun
, vol.30
, pp. 153-165
-
-
Lee, S.B.1
Choi, Y.H.2
-
57
-
-
67650471608
-
Energy balancing clustering algorithm for wireless sensor network
-
Wuhan, China
-
Li LY, Jiang XL, Zhong SH, Hu L. Energy balancing clustering algorithm for wireless sensor network. In: Proceedings of the international conference on networks security, wireless communications and trusted computing (NSWCTC 2009). Wuhan, China; 2009. p. 61-4.
-
(2009)
Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)
, pp. 61-64
-
-
Li, L.Y.1
Jiang, X.L.2
Zhong, S.H.3
Hu, L.4
-
58
-
-
51949089156
-
PEGASIS: Power efficient gathering in sensor information systems
-
Big Sky, Montana
-
Lindsey S, Raghavendra CS. PEGASIS: power efficient gathering in sensor information systems. In: Proceedings of the IEEE aerospace conference. Big Sky, Montana; 2002. p. 1125-30.
-
(2002)
Proceedings of the IEEE Aerospace Conference
, pp. 1125-1130
-
-
Lindsey, S.1
Raghavendra, C.S.2
-
59
-
-
84885518065
-
-
John Wiley & Sons, Inc
-
H. Liu, A. Nayak, and I. Stojmenovic Applications, models, problems, and solution strategies. wireless sensor and actuator networks 2010 John Wiley & Sons, Inc 1 32
-
(2010)
Applications, Models, Problems, and Solution Strategies. Wireless Sensor and Actuator Networks
, pp. 1-32
-
-
Liu, H.1
Nayak, A.2
Stojmenovic, I.3
-
60
-
-
33746375987
-
H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
-
DOI 10.1109/TVT.2006.877707
-
W. Lou, and Y. Kwon H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks IEEE Trans Veh Technol 55 2006 1320 1330 (Pubitemid 44111427)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1320-1330
-
-
Lou, W.1
Kwon, Y.2
-
61
-
-
79959869963
-
Secure multi-path in sensor networks
-
Sydney, Australia: ACM
-
Lu F, Geng L, Chia LT, Liang Y.C Secure multi-path in sensor networks. In: Proceedings of the 5th international conference on embedded networked sensor systems. Sydney, Australia: ACM; 2007. p. 413-4.
-
(2007)
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems
, pp. 413-414
-
-
Lu, F.1
Geng, L.2
Chia, L.T.3
Liang, Y.C.4
-
63
-
-
64449088975
-
SeRWA: A secure routing protocol against wormhole attacks in sensor networks
-
Madria S, Yin J. SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 1051-63.
-
Ad Hoc Networks
, pp. 1051-1063
-
-
Madria, S.1
Yin, J.2
-
71
-
-
34548042955
-
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.014, PII S0140366407001727
-
N. Nasser, and Y. Chen SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks Comput Commun 30 2007 2401 2412 (Pubitemid 47285289)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2401-2412
-
-
Nasser, N.1
Chen, Y.2
-
72
-
-
84977940222
-
-
AFRICON Windhoek, Namibia
-
G. Niezen, G.P. Hancke, I.J. Rudas, and L. Horvath Comparing wireless sensor network routing protocols 2007 AFRICON Windhoek, Namibia 1 7
-
(2007)
Comparing Wireless Sensor Network Routing Protocols
, pp. 1-7
-
-
Niezen, G.1
Hancke, G.P.2
Rudas, I.J.3
Horvath, L.4
-
73
-
-
48749108657
-
Secure routing in sensor networks
-
Vancouver, British Columbia, Canada
-
Nikjoo SM, Tehrani AS, Kumarawadu P. Secure routing in sensor networks. In: Proceedings of the Canadian conference on electrical and computer engineering (CCECE 2007). Vancouver, British Columbia, Canada; 2007. p. 978-81.
-
(2007)
Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE 2007)
, pp. 978-981
-
-
Nikjoo, S.M.1
Tehrani, A.S.2
Kumarawadu, P.3
-
74
-
-
24644489093
-
LHA-SP: Secure protocols for hierarchical wireless sensor networks
-
DOI 10.1109/INM.2005.1440767, 1440767, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
-
Oliveira LB, Wong HC, Loureiro AA. LHA-SP: secure protocols for hierarchical wireless sensor networks. In: Proceedings of the 9th IFIP/IEEE international symposium on integrated network management (IM 2005). Nice, France; 2005. p. 31-44. (Pubitemid 43804443)
-
(2005)
2005 9th IFIP/IEEE International Symposium on Integrated Network Management, IM 2005
, vol.2005
, pp. 31-44
-
-
Oliveira, L.B.1
Wong, H.C.2
Loureiro, A.A.3
-
75
-
-
49049107778
-
SEIF: Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks
-
Barcelona, Spain
-
Ouadjaout A, Challal Y, Lasla N, Bagaa M. SEIF: secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks. In: Proceedings of the 3rd international conference on availability, reliability and security (ARES 2008). Barcelona, Spain; 2008. p. 503-8.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008)
, pp. 503-508
-
-
Ouadjaout, A.1
Challal, Y.2
Lasla, N.3
Bagaa, M.4
-
77
-
-
79952081338
-
Wireless sensor networks and its routing protocols: A comparative study
-
Bhopal, India
-
Pal S, Bhattacharyya D, Tomar GS, Kim T. Wireless sensor networks and its routing protocols: a comparative study. In: Prpceedings of the international conference on computational intelligence and communication networks (CICN 2010). Bhopal, India; 2010. p. 314-9.
-
(2010)
Prpceedings of the International Conference on Computational Intelligence and Communication Networks (CICN 2010)
, pp. 314-319
-
-
Pal, S.1
Bhattacharyya, D.2
Tomar, G.S.3
Kim, T.4
-
79
-
-
57849119211
-
SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks
-
A.S. Pathan, and C. Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks Ann Telecommun 63 2008 529 541
-
(2008)
Ann Telecommun
, vol.63
, pp. 529-541
-
-
Pathan, A.S.1
Hong, C.2
-
80
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. In: Proceedings of the 7th annual international conference on mobile computing and networking. Rome, Italy: ACM; 2001. p. 189-99. (Pubitemid 33006715)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
81
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler SPINS: security protocols for sensor networks Wirel Netw 8 2002 521 534
-
(2002)
Wirel Netw
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
83
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K.A. Jha Study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Trans Mob Comput 5 2006 128 143 (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
85
-
-
34250187127
-
OEDSR: Optimized energy-delay sub-network routing in wireless sensor network
-
1673167, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
-
Ratnaraj S, Jagannathan S, Rao V. OEDSR: optimized energy-delay sub-network routing in wireless sensor network. In: Proceedings of the IEEE international conference on networking, sensing and control (ICNSC 2006). Florida, USA; 2006. p. 330-5. (Pubitemid 46900508)
-
(2006)
Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
, pp. 330-335
-
-
Ratnaraj, S.1
Jagannathan, S.2
Rao, V.3
-
86
-
-
55849152101
-
Countering sinkhole and black hole attacks on sensor networks using dynamic trust management
-
Marrakech, Morocco
-
Roy SD, Singh SA, Choudhury S, Debnath NC. Countering sinkhole and black hole attacks on sensor networks using dynamic trust management. In: Proceedings of the IEEE symposium on computers and communications (ISCC 2008). Marrakech, Morocco; 2008. p. 537-42.
-
(2008)
Proceedings of the IEEE Symposium on Computers and Communications (ISCC 2008)
, pp. 537-542
-
-
Roy, S.D.1
Singh, S.A.2
Choudhury, S.3
Debnath, N.C.4
-
88
-
-
84884618134
-
Secure routing protocol for mobile wireless sensor network
-
San Antonio, TX, USA
-
Sarma, AHKD, Kar BA, Mall CR. Secure routing protocol for mobile wireless sensor network. In: Proceedings of the IEEE sensors applications symposium (SAS). San Antonio, TX, USA; 2011. p. 93-9.
-
(2011)
Proceedings of the IEEE Sensors Applications Symposium (SAS)
, pp. 93-99
-
-
Sarma, A.H.K.D.1
Kar, B.A.2
Mall, C.R.3
-
89
-
-
78549239709
-
Survey on wireless sensor network security
-
J.A. Sen Survey on wireless sensor network security Int J Commun Netw Inf Secur (IJCNIS) 1 2009 59 82
-
(2009)
Int J Commun Netw Inf Secur (IJCNIS)
, vol.1
, pp. 59-82
-
-
Sen, J.A.1
-
90
-
-
84879690590
-
Multipath routing techniques in wireless sensor networks: A survey
-
K. Sha, J. Gehlot, and R. Greve Multipath routing techniques in wireless sensor networks: a survey Wirel Pers Commun 70 2013 807 829
-
(2013)
Wirel Pers Commun
, vol.70
, pp. 807-829
-
-
Sha, K.1
Gehlot, J.2
Greve, R.3
-
91
-
-
11144340927
-
Designing secure sensor networks
-
DOI 10.1109/MWC.2004.1368895
-
E. Shi, and A. Perrig Designing secure sensor networks IEEE Wirel Commun Mag 11 2004 38 43 (Pubitemid 40021188)
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
92
-
-
84898781643
-
Review on security issues and attacks in wireless sensor networks
-
A. Singla, and R. Sachdeva Review on security issues and attacks in wireless sensor networks Int J Adv Res Comput Sci Softw Eng 3 2013 529 534
-
(2013)
Int J Adv Res Comput Sci Softw Eng
, vol.3
, pp. 529-534
-
-
Singla, A.1
Sachdeva, R.2
-
93
-
-
77955467415
-
Survey on secure multipath routing protocols in WSNs
-
E. Stavrou, and A.A. Pitsillides Survey on secure multipath routing protocols in WSNs Comput Netw 54 2010 2215 2238
-
(2010)
Comput Netw
, vol.54
, pp. 2215-2238
-
-
Stavrou, E.1
Pitsillides, A.A.2
-
95
-
-
78649948308
-
WSN-based solutions for security and surveillance
-
Paris, France
-
Viani F, Oliveri G, Donelli M, Lizzi L, Rocca P, Massa A. WSN-based solutions for security and surveillance. In: Proceedings of the European wireless technology conference (EuWIT 2010). Paris, France; 2010. p. 285-8.
-
(2010)
Proceedings of the European Wireless Technology Conference (EuWIT 2010)
, pp. 285-288
-
-
Viani, F.1
Oliveri, G.2
Donelli, M.3
Lizzi, L.4
Rocca, P.5
Massa, A.6
-
96
-
-
43749092764
-
Secure LEACH routing protocol based on low-power cluster-head selection algorithm for wireless sensor networks
-
Xiamen, China
-
Wang J, Yang G, Chen S, Sun Y. Secure LEACH routing protocol based on low-power cluster-head selection algorithm for wireless sensor networks. In: Proceedings of the international symposium on intelligent signal processing and communication systems (ISPACS 2007). Xiamen, China; 2007. p. 341-4.
-
(2007)
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2007)
, pp. 341-344
-
-
Wang, J.1
Yang, G.2
Chen, S.3
Sun, Y.4
-
97
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
A. Wood, and J.A. Stankovic Denial of service in sensor networks Computer 35 2002 54 62 (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
98
-
-
34547477757
-
SIGF: A family of configurable, secure routing protocols for wireless sensor networks
-
DOI 10.1145/1180345.1180351, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Wood AD, Fang L, Stankovic JA, He T. SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In: Proceedings of the 4th ACM workshop on security of ad hoc and sensor networks. Alexandria, Virginia, USA: ACM; 2006. p. 35-48. (Pubitemid 47168557)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 35-48
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
99
-
-
35148900222
-
Survivable and efficient clustered keying in wireless sensor network
-
Qingdao, China
-
Xizheng Z. Survivable and efficient clustered keying in wireless sensor network. In: Proceedings of the 8th ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD 2007). Qingdao, China; 2007. p. 688-93.
-
(2007)
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing (SNPD 2007)
, pp. 688-693
-
-
Xizheng, Z.1
-
102
-
-
3042647758
-
Survey of secure wireless ad hoc routing
-
H. Yih-Chun, and A.A. Perrig Survey of secure wireless ad hoc routing IEEE Secur Priv 2 2004 28 39
-
(2004)
IEEE Secur Priv
, vol.2
, pp. 28-39
-
-
Yih-Chun, H.1
Perrig, A.A.2
-
103
-
-
56949088196
-
Survey of security issues in wireless sensor networks
-
W. Yong, A. Garhan, and R.A. Byrav Survey of security issues in wireless sensor networks IEEE Commun Surv Tutor 8 2006 2 23
-
(2006)
IEEE Commun Surv Tutor
, vol.8
, pp. 2-23
-
-
Yong, W.1
Garhan, A.2
Byrav, R.A.3
-
107
-
-
84878001206
-
Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks
-
J. Zhou Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks Int J Distrib Sens Netw 2013 2013 17
-
(2013)
Int J Distrib Sens Netw
, vol.2013
, pp. 17
-
-
Zhou, J.1
-
108
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on computer and communications security. Washington D.C., USA: ACM; 2003. p. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
109
-
-
84898832009
-
-
[last accessed 19.08.13].
-
IBM zEnterprise technical guide. Available at: http://www.redbooks.ibm. com/redbooks/pdfs/sg248049.pdf [last accessed 19.08.13].
-
IBM ZEnterprise Technical Guide
-
-
|