-
1
-
-
56949096891
-
Group-based intrusion detection system in wireless sensor networks
-
Guorui Li, Jingsha He, Yingfang Fu, "Group-based intrusion detection system in wireless sensor networks," Computer Communications, vol. 31, pp. 4324-4332, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 4324-4332
-
-
Li, G.1
He, J.2
Fu, Y.3
-
2
-
-
64449088975
-
SeRWA: A secure routing protocol against wormhole attacks in sensor networks
-
S. Madria, Jian Yin, "SeRWA: a secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, pp. 1051-1063, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 1051-1063
-
-
Madria, S.1
Yin, J.2
-
3
-
-
40049089636
-
A general key seed management and assignment model for wireless sensor networks and application
-
Tao Feng, Jianfeng Ma, "A general key seed management and assignment model for wireless sensor networks and application," Journal of Computer Research and Development, vol. 45, no. 1, pp. 146-153, 2008.
-
(2008)
Journal of Computer Research and Development
, vol.45
, Issue.1
, pp. 146-153
-
-
Feng, T.1
Ma, J.2
-
4
-
-
34547637688
-
Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system
-
P. Resnick, R. Zeckhauser, "Trust among strangers in internet transactions: empirical analysis of eBay's reputation system," Advances in Applied Microeconomics, vol. 11, pp. 127-157, 2002.
-
(2002)
Advances in Applied Microeconomics
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
5
-
-
18844362199
-
Secure location: Routing on trust and isolating compromised sensors in location-aware sensor networks
-
Los Angeles, California, USA 5-7 November
-
S. Tanachaiwiwat, P. Dave, R. H. Bhindwale, "Secure location: routing on trust and isolating compromised sensors in location-aware sensor networks," In: 1st ACM Conf. Embedded Networked Sensor Systems (SenSys 2003), Los Angeles, California, USA, pp. 324-325, 5-7 November 2003.
-
(2003)
1st ACM Conf. Embedded Networked Sensor Systems (SenSys 2003)
, pp. 324-325
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.H.3
-
6
-
-
27544433189
-
TIBFIT: Trust index based fault tolerance for ability data faults in sensor
-
Piscataway: IEEE Computer Society
-
M. D. Krasniewski, P. Varadharajan, B. Rabeler, "TIBFIT: trust index based fault tolerance for ability data faults in sensor," In Proc. of the Int'1 Conf. on Dependable Systems and Networks (DSN). Piscataway: IEEE Computer Society, pp. 672-681, 2005.
-
(2005)
Proc. of the Int'1 Conf. on Dependable Systems and Networks (DSN)
, pp. 672-681
-
-
Krasniewski, M.D.1
Varadharajan, P.2
Rabeler, B.3
-
7
-
-
33745820773
-
Trust management for resilient wireless sensor networks
-
Berlin, Heidelberg: Springer-Verlag
-
J. Hur, Y. Lee, S. M. Hong, H. Yoon, "Trust management for resilient wireless sensor networks," In Proc. of the ICISC 2005. LNCS 3935, Berlin, Heidelberg: Springer-Verlag, pp. 56-68, 2006.
-
(2006)
Proc. of the ICISC 2005. LNCS
, vol.3935
, pp. 56-68
-
-
Hur, J.1
Lee, Y.2
Hong, S.M.3
Yoon, H.4
-
8
-
-
84907936141
-
Functional-trust based security data aggregation method in wireless sensor networks
-
Yinghong Mo, Cheng Zhong, Jinhui Tang, Xihua Wu, "Functional-trust based security data aggregation method in wireless sensor networks," Journal of Chinese Computer Systems, vol. 31, no. 1, pp. 80-84, 2011.
-
(2011)
Journal of Chinese Computer Systems
, vol.31
, Issue.1
, pp. 80-84
-
-
Mo, Y.1
Zhong, C.2
Tang, J.3
Wu, X.4
-
9
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li, "Trust mechanisms in wireless sensor networks: attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
10
-
-
84856274467
-
Design and implementation of TARF: A trust-aware routing framework for WSNs
-
Guoxing Zhan, Weisong Shi, J. Deng, "Design and implementation of TARF: a trust-aware routing framework for WSNs," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 184-197
-
-
Zhan, G.1
Shi, W.2
Deng, J.3
-
11
-
-
84864271933
-
A secure routing protocol for wireless sensor networks with consideration of energy efficiency
-
Maui, Hawaii, USA, 16-20April
-
HueiWen Ferng, D. Rachmarini, "A secure routing protocol for wireless sensor networks with consideration of energy efficiency," In Proc. of 2012 IEEE Network Operations and Management Symposium, Maui, Hawaii, USA, pp. 105-112, 16-20April 2012.
-
(2012)
Proc. of 2012 IEEE Network Operations and Management Symposium
, pp. 105-112
-
-
Ferng, H.1
Rachmarini, D.2
-
12
-
-
84881033095
-
Secured fuzzy based routing framework for dynamic wireless sensor networks
-
Nagercoil, India, 20-21 March
-
I. Sakthidevi, E. Srievidhyajanani, "Secured fuzzy based routing framework for dynamic wireless sensor networks," In Proc. of 2013 International Conference on Circuits, Power and Computing Technologies, Nagercoil, India, pp. 1041-1046, 20-21 March 2013.
-
(2013)
Proc. of 2013 International Conference on Circuits, Power and Computing Technologies
, pp. 1041-1046
-
-
Sakthidevi, I.1
Srievidhyajanani, E.2
-
13
-
-
84873959722
-
A real-time empirical study of BIOSARP based wireless sensor network testbed
-
Taipei, China, 28-31 October
-
K. Saleem, N. Fisal, M. A. Baharudin, "A real-time empirical study of BIOSARP based wireless sensor network testbed," In Proc. of 11th IEEE Sensors, Taipei, China, pp. 1-4, 28-31 October 2012.
-
(2012)
Proc. of 11th IEEE Sensors
, pp. 1-4
-
-
Saleem, K.1
Fisal, N.2
Baharudin, M.A.3
-
14
-
-
84878718640
-
Analysis of secure LEACH-based clustering protocols in wireless sensor networks
-
M. Masdari, S. M. Bazarchi, M. Bidaki, "Analysis of secure LEACH-based clustering protocols in wireless sensor networks," Journal of Network and Computer Applications, vol. 36, no. 4, pp. 1243-1260, 2013.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.4
, pp. 1243-1260
-
-
Masdari, M.1
Bazarchi, S.M.2
Bidaki, M.3
-
15
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
San Diego, California, USA, 5-6 February
-
L. Hu, D. Evans, "Using directional antennas to prevent wormhole attacks," In Proc. of 11th Annual Network and Distributed System Security Symposium, San Diego, California, USA, pp. 131-141, 5-6 February 2004.
-
(2004)
Proc. of 11th Annual Network and Distributed System Security Symposium
, pp. 131-141
-
-
Hu, L.1
Evans, D.2
-
16
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
17
-
-
0033749075
-
Performance analysis of the IEEE 802. 11 distributed coordination function
-
G. Bianchi, "Performance analysis of the IEEE 802. 11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535-547, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
|