-
1
-
-
84875051385
-
A highly scalable key pre-distribution scheme for wireless sensor networks
-
Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh. 2013. A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications 12, 2, 948-959.
-
(2013)
IEEE Transactions on Wireless Communications
, vol.12
, Issue.2
, pp. 948-959
-
-
Bechkit, W.1
Challal, Y.2
Bouabdallah, A.3
Tarokh, V.4
-
2
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Springer
-
Rolf Blom. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology. Springer, 335-338.
-
(1985)
Advances in Cryptology
, pp. 335-338
-
-
Blom, R.1
-
7
-
-
0141621107
-
Meshed multipath routing with selective forwarding: An efficient strategy in wireless sensor networks
-
Swades De, Chunming Qiao, and Hongyi Wu. 2003. Meshed multipath routing with selective forwarding: An efficient strategy in wireless sensor networks. Computer Networks 43, 4, 481-497.
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 481-497
-
-
De, S.1
Qiao, C.2
Wu, H.3
-
8
-
-
49249123418
-
Multipath key establishment for wireless sensor networks using just-enough redundancy transmission
-
Jing Deng and Yunghsiang S. Han. 2008. Multipath key establishment for wireless sensor networks using just-enough redundancy transmission. IEEE Transactions on Dependable and Secure Computing 5, 3, 177-190.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.3
, pp. 177-190
-
-
Deng, J.1
Han, Y.S.2
-
10
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod K. Varshney. 2006. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing 3, 1, 62-77.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
11
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili. 2005. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 8, 2, 228-258.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
15
-
-
62349105999
-
IPDA: An integrityprotecting private data aggregation scheme for wireless sensor networks
-
Wenbo He, Hoang Nguyen, Xue Liuy, Klara Nahrstedt, and Tarek Abdelzaher. 2008. iPDA: An integrityprotecting private data aggregation scheme for wireless sensor networks. In Proceedings of the IEEE Military Communications Conference (MILCOM'08). 1-7.
-
(2008)
Proceedings of the IEEE Military Communications Conference (MILCOM'08).
, pp. 1-7
-
-
He, W.1
Nguyen, H.2
Liuy, X.3
Nahrstedt, K.4
Abdelzaher, T.5
-
17
-
-
84891375453
-
Adaptive random key distribution schemes for wireless sensor networks
-
Springer
-
Shih-I Huang, Shiuhpyng Shieh, and S. Y.Wu. 2005. Adaptive random key distribution schemes for wireless sensor networks. In Computer Security in the 21st Century. Springer, 91-105.
-
(2005)
Computer Security in the 21st Century
, pp. 91-105
-
-
Huang, S.-I.1
Shieh, S.2
Wu, S.Y.3
-
18
-
-
0020175940
-
The complexity of finding maximum disjoint paths with length constraints
-
Alon Itai, Yehoshua Perl, and Yossi Shiloach. 2006. The complexity of finding maximum disjoint paths with length constraints. Networks 12, 3, 277-286.
-
(2006)
Networks
, vol.12
, Issue.3
, pp. 277-286
-
-
Itai, A.1
Perl, Y.2
Shiloach, Y.3
-
20
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2, 293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
21
-
-
74849098550
-
Precise positioning with wireless sensor nodes: Monitoring natural hazards in all terrains
-
Joshua D. Kenney, Donald R. Poole, Gregory C. Willden, Ben A. Abbott, Alan P. Morris, Ronald N. McGinnis, and David A. Ferrill. 2009. Precise positioning with wireless sensor nodes: Monitoring natural hazards in all terrains. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC'09). 722-727.
-
(2009)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC'09)
, pp. 722-727
-
-
Kenney, J.D.1
Poole, D.R.2
Willden, G.C.3
Abbott, B.A.4
Morris, A.P.5
McGinnis, R.N.6
Ferrill, D.A.7
-
23
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Donggang Liu, Peng Ning, and Rongfang Li. 2005. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 8, 1, 41-77.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
25
-
-
47049108659
-
Air pollution monitoring and mining based on sensor grid in London
-
Yajie Ma, Mark Richards, Moustafa Ghanem, Yike Guo, and John Hassard. 2008. Air pollution monitoring and mining based on sensor grid in London. Sensors 8, 6, 3601-3623.
-
(2008)
Sensors
, vol.8
, Issue.6
, pp. 3601-3623
-
-
Ma, Y.1
Richards, M.2
Ghanem, M.3
Guo, Y.4
Hassard, J.5
-
26
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian Perrig, John Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
28
-
-
34548043438
-
Pair-wise path key establishment in wireless sensor networks
-
Jang-Ping Sheu and Jui-Che Cheng. 2007. Pair-wise path key establishment in wireless sensor networks. Computer Communications 30, 11, 2365-2374.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2365-2374
-
-
Sheu, J.-P.1
Cheng, J.-C.2
-
30
-
-
77956873542
-
A survey on key management mechanisms for distributed wireless sensor networks
-
Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Cintia B. Margi, and Tereza C. M. B. Carvalho. 2010. A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks 54, 15, 2591-2612.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2591-2612
-
-
Simplício, M.A.1
Barreto, P.S.L.M.2
Margi, C.B.3
Carvalho, T.C.M.B.4
-
31
-
-
33645115901
-
Deploying a wireless sensor network on an active volcano
-
Geoffrey Werner-Allen, Konrad Lorincz, Mario Ruiz, Omar Marcillo, Jeff Johnson, Jonathan Lees, and Matt Welsh. 2006. Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 10, 2, 18-25.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 18-25
-
-
Werner-Allen, G.1
Lorincz, K.2
Ruiz, M.3
Marcillo, O.4
Johnson, J.5
Lees, J.6
Welsh, M.7
-
33
-
-
80052911053
-
Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission
-
Jiang Wu and Douglas R. Stinson. 2011. Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission. IEEE Transactions on Dependable and Secure Computing 8, 6, 929-937.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.6
, pp. 929-937
-
-
Wu, J.1
Stinson, D.R.2
-
34
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41-47.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
38
-
-
79953815867
-
A secure key establishment protocol for ZigBee wireless sensor networks
-
Ender Yüksel, Hanne Riis Nielson, and Flemming Nielson. 2011. A secure key establishment protocol for ZigBee wireless sensor networks. Computer Journal 54, 4, 589-601.
-
(2011)
Computer Journal
, vol.54
, Issue.4
, pp. 589-601
-
-
Yüksel, E.1
Nielson, H.R.2
Nielson, F.3
|