-
1
-
-
43149116953
-
Space-efficient identity based encryptionwithout pairings
-
Dan Boneh, Craig Gentry, and Michael Hamburg. Space-efficient identity based encryptionwithout pairings. In IEEE FOCS, pages 647–657, 2007.
-
(2007)
IEEE FOCS
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
2
-
-
29844437116
-
Localization and routing in sensor networks by local angle information
-
Jehoshua Bruck, Jie Gao, and Anxiao (Andrew) Jiang. Localization and routing in sensor networks by local angle information. In ACM MOBIHOC, pages 181–192, 2005.
-
(2005)
ACM MOBIHOC
, pp. 181-192
-
-
Bruck, J.1
Gao, J.2
Jiang, A.3
-
4
-
-
85066747604
-
Local leader election, signal strength aware flooding, and routeless routing
-
Gilbert Chen, Joel W. Branch, and Boleslaw K. Szymanski. Local leader election, signal strength aware flooding, and routeless routing. In IEEE IPDPS, page 244.1, 2005.
-
(2005)
IEEE IPDPS
, pp. 2441
-
-
Chen, G.1
Branch, J.W.2
Szymanski, B.K.3
-
5
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In ACM MobiHoc, pages 80–89, 2007.
-
(2007)
ACM MobiHoc
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
6
-
-
57349117607
-
Self-monitoring for sensor networks
-
Dezun Dong, Yunhao Liu, and Xiangke Liao. Self-monitoring for sensor networks. In ACM MobiHoc, pages 431–440, 2008.
-
(2008)
ACM MobiHoc
, pp. 431-440
-
-
Dong, D.1
Liu, Y.2
Liao, X.3
-
7
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
8
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Brad Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM, pages 243–254, 2000.
-
(2000)
ACM MOBICOM
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
9
-
-
40049091352
-
On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
-
Jooyoung Lee and Douglas R. Stinson. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur., 1(2):1094–9224, 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.2
, pp. 1094-9224
-
-
Lee, J.1
Stinson, D.R.2
-
10
-
-
42149172778
-
Group-based key predistribution for wireless sensor networks
-
Donggang Liu, Peng Ning, and Wenliang Du. Group-based key predistribution for wireless sensor networks. ACM Trans. Sen. Netw., 4(2):1550–4859, 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.2
, pp. 1550-4859
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
11
-
-
34548299969
-
Envirostore: A cooperative storage system for disconnected operation in sensor networks
-
Liqian Luo, Chengdu Huang, Tarek F. Abdelzaher, and Jack Stankovic. Envirostore: A cooperative storage system for disconnected operation in sensor networks. In IEEE INFOCOM, pages 1802–1810, 2007.
-
(2007)
IEEE INFOCOM
, pp. 1802-1810
-
-
Luo, L.1
Huang, C.2
Abdelzaher, T.F.3
Stankovic, J.4
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MOBICOM, pages 255–265, 2000.
-
(2000)
ACM MOBICOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses. In ACM IPSN, pages 259–268, 2004.
-
(2004)
ACM IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
14
-
-
41849094781
-
Mitigating dos attacks against broadcast authentication in wireless sensor networks
-
Peng Ning, An Liu, and Wenliang Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1):1–35, 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
15
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE S&P, pages 49–63, 2005.
-
(2005)
IEEE S&P
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
16
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In ACM MOBICOM, pages 189–199, 2001.
-
(2001)
ACM MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
17
-
-
38349177828
-
Secure and fault-tolerant event boundary detection in wireless sensor networks
-
Kui Ren, Kai Zeng, and Wenjing Lou. Secure and fault-tolerant event boundary detection in wireless sensor networks. IEEE Transactions on Wireless Communications, 7:354–363, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, pp. 354-363
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84 on Advances in cryptology, pages 47–53, 1985.
-
(1985)
CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
34547442398
-
Stardust: A flexible architecture for passive localization in wireless sensor networks
-
Radu Stoleru, Pascal Vicaire, Tian He, and John A. Stankovic. Stardust: A flexible architecture for passive localization in wireless sensor networks. In ACM SENSYS, pages 57–70, 2006.
-
(2006)
ACM SENSYS
, pp. 57-70
-
-
Stoleru, R.1
Vicaire, P.2
He, T.3
Stankovic, J.A.4
-
20
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
Hailun Tan, Sanjay Jha, Diet Ostry, John Zic, and Vijay Sivaraman. Secure multi-hop network programming with multiple one-way key chains. In ACM WiSec, pages 183–193, 2008.
-
(2008)
ACM WiSec
, pp. 183-193
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
21
-
-
0036793924
-
Denial of service in sensor networks
-
Anthony D. Wood and John A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54–62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
22
-
-
33144479525
-
SCAN: Self-organized network layer security in mobile ad hoc networks
-
Hao Yang, James Shu, Xiaoqiao Meng, and Songwu Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261–273, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
23
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, and Sankardas Roy. Efficient distributed detection of node replication attacks in sensor networks. In IEEE ACSAC, pages 257–267, 2007.
-
(2007)
IEEE ACSAC
, pp. 257-267
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
|