-
1
-
-
38149061688
-
Preventing dos attacks in wireless sensor networks: A repeated game theory approach
-
A. Agah and S. K. Das, "Preventing dos attacks in wireless sensor networks: A repeated game theory approach," International Journal of Network Security, vol. 5, no. 2, pp. 145-153, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 145-153
-
-
Agah, A.1
Das, S.K.2
-
2
-
-
0036688074
-
A survey on sensor networks
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
84886451367
-
Performance analysis of steiner treebased decentralization mechanism (STDM) for privacy protection in wireless sensor networks
-
B. S. Babu, N. Jayashree, and P. Venkataram, "Performance analysis of steiner tree based decentralization mechanism (STDM) for privacy protection in wireless sensor networks," International Journal of Network Security, vol. 15, no. 5, pp. 331-340, 2013.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.5
, pp. 331-340
-
-
Babu, B.S.1
Jayashree, N.2
Venkataram, P.3
-
5
-
-
33845507838
-
Group key distribution via local collaboration in wireless sensor networks
-
A. Chadha, Y. Liu, and S. K. Das, "Group key distribution via local collaboration in wireless sensor networks," in Proceedings of the IEEE Conference on Communications Society, pp. 46-54, 2005.
-
(2005)
Proceedings of the IEEE Conference on Communications Society
, pp. 46-54
-
-
Chadha, A.1
Liu, Y.2
Das, S.K.3
-
6
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
J. Deng, C. Hartung, R. Han, and S. Mishra, "A practical study of transitory master key establishment for wireless sensor networks," in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm'05), pp. 289-299, 2005.
-
(2005)
Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm'05)
, pp. 289-299
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
7
-
-
84874673189
-
A novel dynamic key management scheme based on hamming distance for wireless sensor networks
-
R. Divya and T. Thirumurugan, "A novel dynamic key management scheme based on hamming distance for wireless sensor networks," International Journal of Scienti-c and Engineering Research, vol. 2, pp. 1-12, 2011.
-
(2011)
International Journal of Scienti-c and Engineering Research
, vol.2
, pp. 1-12
-
-
Divya, R.1
Thirumurugan, T.2
-
8
-
-
3543105535
-
Combinatorial optimization of group key management
-
M. Eltoweissy, M. H. Heydari, L. Morales, and I. H. Sudborough, "Combinatorial optimization of group key management," Journal of Network and Systems Management, vol. 12, no. 1, pp. 33-50, 2004.
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
, pp. 33-50
-
-
Eltoweissy, M.1
Heydari, M.H.2
Morales, L.3
Sudborough, I.H.4
-
9
-
-
33646918277
-
Dynamic key management in sensor networks
-
M. Eltoweissy, M. Moharrum, and R. Mukkamala, "Dynamic key management in sensor networks," IEEE Communications Magazine, vol. 44, no. 4, pp. 122-130, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
10
-
-
77950235531
-
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks
-
S. Guo and V. Leung, "A secure and scalable rekeying mechanism for hierarchical wireless sensor networks," IEICE Transactions on Information and Systems, vol. E93D, no. 3, pp. 421-429, 2010.
-
(2010)
IEICE Transactions on Information and Systems
, vol.E93D
, Issue.3
, pp. 421-429
-
-
Guo, S.1
Leung, V.2
-
11
-
-
84874671183
-
Dynamic key management in wireless sensor networks: A survey
-
X. He, M. Niedermeier, and H. de Meer, "Dynamic key management in wireless sensor networks: A survey," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 611-622, 2013.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 611-622
-
-
He, X.1
Niedermeier, M.2
De Meer, H.3
-
12
-
-
79952175802
-
A forward authentication key management scheme for heterogeneous sensor networks
-
J. Y. Huang, I. E. Liao, and H. W. Tang, "A forward authentication key management scheme for heterogeneous sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, no. 6, pp. 1-10, 2011.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, Issue.6
, pp. 1-10
-
-
Huang, J.Y.1
Liao, I.E.2
Tang, H.W.3
-
13
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
14
-
-
84903891394
-
Recent advances and future trends in wireless sensor networks
-
V. Katiyar, N. Chand, and N. Chand, "Recent advances and future trends in wireless sensor networks," International Journal of Applied Engineering Research, vol. 1, no. 3, pp. 330-342, 2010.
-
(2010)
International Journal of Applied Engineering Research
, vol.1
, Issue.3
, pp. 330-342
-
-
Katiyar, V.1
Chand, N.2
Chand, N.3
-
15
-
-
80052938422
-
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
-
C. T. Li and M. S. Hwang, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks," Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011.
-
(2011)
Information Sciences
, vol.181
, Issue.23
, pp. 5333-5347
-
-
Li, C.T.1
Hwang, M.S.2
-
16
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
-
(2008)
International Journal of Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
17
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
18
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks," International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
19
-
-
33646842495
-
Data sampling control and compression in sensor networks
-
J. Li and J. Li, "Data sampling control and compression in sensor networks," Mobile Ad-hoc and Sensor Networks, vol. 3794, pp. 42-51, 2005.
-
(2005)
Mobile Ad-hoc and Sensor Networks
, vol.3794
, pp. 42-51
-
-
Li, J.1
Li, J.2
-
20
-
-
84903892162
-
Distributed detecting node replication attacks in wireless sensor networks: A survey
-
W. T. Li, T. H. Feng, and M. S. Hwang, "Distributed detecting node replication attacks in wireless sensor networks: A survey," International Journal of Network Security, vol. 16, no. 5, pp. 323-330, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.5
, pp. 323-330
-
-
Li, W.T.1
Feng, T.H.2
Hwang, M.S.3
-
21
-
-
77951448896
-
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
-
C. C. Lo, C. C. Huang, and S. W. Chen, "An efficient and scalable EBS-based batch rekeying scheme for secure group communications," IEEE Military Communications Conference (MILCOM 2009), pp. 1-7, 2009.
-
(2009)
IEEE Military Communications Conference (MILCOM 2009)
, pp. 1-7
-
-
Lo, C.C.1
Huang, C.C.2
Chen, S.W.3
-
22
-
-
84906338116
-
Security issues and sybil attack in wireless sensor networks
-
Pooja Manisha and Yudhvir Singh, "Security issues and sybil attack in wireless sensor networks," International Journal of P2P Network Trends and Technology, vol. 3, no. 1, pp. 7-13, 2013.
-
(2013)
International Journal of P2P Network Trends and Technology
, vol.3
, Issue.1
, pp. 7-13
-
-
Manisha, P.1
Singh, Y.2
-
23
-
-
78249265991
-
Tree based protocol for key management in wireless sensor networks
-
M.-L. Messai, M. Aliouat, and H. Seba, "Tree based protocol for key management in wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2010, no. 59, pp. 1-10, 2010.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2010
, Issue.59
, pp. 1-10
-
-
Messai, M.-L.1
Aliouat, M.2
Seba, H.3
-
24
-
-
57049092255
-
Energy efficient key management (EEKM) protocol for large scale distributed sensor networks
-
K. J. PAEK, U. S. SONG, H. Y. KIM, J. KIM, and J. N. Hwang, "Energy efficient key management (EEKM) protocol for large scale distributed sensor networks," Journal of Information Science and Engineering, vol. 24, no. 6, pp. 1837-1858, 2008.
-
(2008)
Journal of Information Science and Engineering
, vol.24
, Issue.6
, pp. 1837-1858
-
-
Paek, K.J.1
Song, U.S.2
Kim, H.Y.3
Kim, J.4
Hwang, J.N.5
-
26
-
-
77956873542
-
A survey on key management mechanisms for distributed wireless sensor networks
-
M. A. Jr. Simplicio, P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol. 54, no. 15, pp. 2591-2612, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2591-2612
-
-
Simplicio Jr., M.A.1
Barreto, P.S.L.M.2
Margi, C.B.3
Carvalho, T.C.M.B.4
-
27
-
-
84898781643
-
Review on security issues and attacks in wireless sensor networks
-
A. Singla and R. Sachdeva, "Review on security issues and attacks in wireless sensor networks," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, pp. 529-534, 2013.
-
(2013)
International Journal of Advanced Research in Computer Science and Software Engineering
, vol.3
, Issue.4
, pp. 529-534
-
-
Singla, A.1
Sachdeva, R.2
-
28
-
-
84874885967
-
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
-
H. S. Soliman and M. Omari, "Application of synchronous dynamic encryption system (SDES) in wireless sensor networks," International Journal of Network Security, vol. 3, no. 2, pp. 160-171, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 160-171
-
-
Soliman, H.S.1
Omari, M.2
-
29
-
-
75749084065
-
Muqami+: a scalable and locally distributed key management scheme for clustered sensor networks
-
M. K. R. R. Syed, H. Lee, S. Lee, and Y. K. Lee, "Muqami+: a scalable and locally distributed key management scheme for clustered sensor networks," Annuals of Telecommunications, vol. 65, no. 1-2, pp. 101-116, 2010.
-
(2010)
Annuals of Telecommunications
, vol.65
, Issue.1-2
, pp. 101-116
-
-
Syed, M.K.R.R.1
Lee, H.2
Lee, S.3
Lee, Y.K.4
-
30
-
-
74349125018
-
A gabased keymanagement scheme in hierarchical wireless sensor networks
-
C. L. Wang, T. P. Hong, G. Horng, and W. H. Wang, "A gabased keymanagement scheme in hierarchical wireless sensor networks," International Journal of Innovative. Computing, Information and Control, vol. 5, pp. 4693-4702, 2009.
-
(2009)
International Journal of Innovative. Computing, Information and Control
, vol.5
, pp. 4693-4702
-
-
Wang, C.L.1
Hong, T.P.2
Horng, G.3
Wang, W.H.4
-
31
-
-
78651566095
-
Lightweight key renewals for cluster sensor networks
-
G. Wang, S. Kim, D. Kang, and D. Choi, "Lightweight key renewals for cluster sensor networks," Journal of Networks, vol. 5, no. 3, pp. 300-312, 2010.
-
(2010)
Journal of Networks
, vol.5
, Issue.3
, pp. 300-312
-
-
Wang, G.1
Kim, S.2
Kang, D.3
Choi, D.4
-
33
-
-
77958579747
-
An efficient scheme for removing compromised sensor nodes from wireless sensor networks
-
Y. Wang, B. Ramamurthy, X. Zou, and Y. Xue, "An efficient scheme for removing compromised sensor nodes from wireless sensor networks," Security and Communication Networks, vol. 3, no. 4, pp. 320-333, 2010.
-
(2010)
Security and Communication Networks
, vol.3
, Issue.4
, pp. 320-333
-
-
Wang, Y.1
Ramamurthy, B.2
Zou, X.3
Xue, Y.4
-
34
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
35
-
-
33646921841
-
Locationaware combinatorial key management scheme for clustered sensor networks
-
M. Younis, K. Ghumman, and M. Eltoweissy, "Locationaware combinatorial key management scheme for clustered sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 8, pp. 865-882, 2006.
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.1
Ghumman, K.2
Eltoweissy, M.3
-
36
-
-
79952143873
-
EDDK: energyefficient distributed deterministic key management for wireless sensor networks
-
X. Zhang, J. He, and Q. Wei, "EDDK: energyefficient distributed deterministic key management for wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2011:765143 doi:10.1155/2011/765143, 2011.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, pp. 765143
-
-
Zhang, X.1
He, J.2
Wei, Q.3
-
37
-
-
84879384267
-
A secret sharingbased key management in hierarchical wireless sensor network
-
Y. Zhang, C. Wu, J. Cao, and X. Li, "A secret sharingbased key management in hierarchical wireless sensor network," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-7, 2013.
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
, pp. 1-7
-
-
Zhang, Y.1
Wu, C.2
Cao, J.3
Li, X.4
-
38
-
-
64049117542
-
Predistribution and local collaborationbased group rekeying for wireless sensor networks
-
W. Zhanga, S. Zhub, and G. Caob, "Predistribution and local collaborationbased group rekeying for wireless sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1229-1242, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.6
, pp. 1229-1242
-
-
Zhanga, W.1
Zhub, S.2
Caob, G.3
-
39
-
-
10044284351
-
Leap: efficient security mechanisms for largescale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for largescale distributed sensor networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), pp. 62-72, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
40
-
-
33847120377
-
Leap+: efficient security mechanisms for largescale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap+: efficient security mechanisms for largescale distributed sensor networks," ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|