-
3
-
-
35248892909
-
Towards a flexible trust establishment framework for sensor networks
-
Aivaloglou, E., Gritzalis, S., & Skianis, C. (2007). Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems, 35, 207–213.
-
(2007)
Telecommunication Systems
, vol.35
, pp. 207-213
-
-
Aivaloglou, E.1
Gritzalis, S.2
Skianis, C.3
-
4
-
-
84875496390
-
A survey on sensor-cloud: Architecture, applications, and approaches
-
Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013). A survey on sensor-cloud: Architecture, applications, and approaches. International Journal of Distributed Sensor Networks, 2013.
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
-
-
Alamri, A.1
Ansari, W.S.2
Hassan, M.M.3
Hossain, M.S.4
Alelaiwi, A.5
Hossain, M.A.6
-
5
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
Boukerche, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30, 2413–2427.
-
(2007)
Computer Communications
, vol.30
, pp. 2413-2427
-
-
Boukerche, A.1
Xu, L.2
El-Khatib, K.3
-
6
-
-
52049119700
-
Securing wireless sensor networks: security architectures
-
Boyle, D., & Newe, T. (2008). Securing wireless sensor networks: security architectures. Journal of Networks, 3, 65–77.
-
(2008)
Journal of Networks
, vol.3
, pp. 65-77
-
-
Boyle, D.1
Newe, T.2
-
7
-
-
84861017329
-
Enhancing sink-location privacy in wireless sensor networks through k-anonymity
-
Chai, G., Xu, M., Xu, W., & Lin, Z. (2012). Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks, 2012.
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
-
-
Chai, G.1
Xu, M.2
Xu, W.3
Lin, Z.4
-
8
-
-
24644488697
-
SENSE: A wireless sensor network simulator
-
Chen, G., Branch, J., Pflug, M., Zhu, L., & Szymanski, B. (2005). SENSE: A wireless sensor network simulator. Advances in Pervasive Computing and Networking, 249–267.
-
(2005)
Advances in Pervasive Computing and Networking
, pp. 249-267
-
-
Chen, G.1
Branch, J.2
Pflug, M.3
Zhu, L.4
Szymanski, B.5
-
9
-
-
84921068731
-
On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks
-
Published online 28 January 2014
-
Chen, H., & Lou, W. (2014). On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive and Mobile Computing. http://dx.doi.org/10.1016/j.pmcj.2014.01.006. Published online 28 January 2014.
-
(2014)
Pervasive and Mobile Computing
-
-
Chen, H.1
Lou, W.2
-
10
-
-
84861929653
-
Configuration tool for a wireless sensor network integrated security framework
-
Cionca, V., Newe, T., & Dădârlat, V. T. (2012). Configuration tool for a wireless sensor network integrated security framework. Journal of Network and Systems Management, 20, 417–452.
-
(2012)
Journal of Network and Systems Management
, vol.20
, pp. 417-452
-
-
Cionca, V.1
Newe, T.2
Dădârlat, V.T.3
-
11
-
-
84893163837
-
TSRF: A trust-aware secure routing framework in wireless sensor networks
-
Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
-
-
Duan, J.1
Yang, D.2
Zhu, H.3
Zhang, S.4
Zhao, J.5
-
12
-
-
84880210109
-
Trust management scheme based on D-S evidence theory for wireless sensor networks
-
Feng, R., Che, S., Wang, X., & Yu, N. (2013). Trust management scheme based on D-S evidence theory for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–9.
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
, pp. 1-9
-
-
Feng, R.1
Che, S.2
Wang, X.3
Yu, N.4
-
13
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4, 15–37.
-
(2008)
ACM Transactions on Sensor Networks (TOSN)
, vol.4
, pp. 15-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
14
-
-
84893333767
-
TuLP: A family of lightweight message authentication codes for body sensor networks
-
Gong, Z., Hartel, P., Nikova, S., Tang, S. H., & Zhu, B. (2014). TuLP: A family of lightweight message authentication codes for body sensor networks. Journal of Computer Science and Technology, 29, 53–68.
-
(2014)
Journal of Computer Science and Technology
, vol.29
, pp. 53-68
-
-
Gong, Z.1
Hartel, P.2
Nikova, S.3
Tang, S.H.4
Zhu, B.5
-
15
-
-
79551566748
-
Providing trust in wireless sensor networks using a bio-inspired technique
-
Gómez Mármol, F., & Martínez Pérez, G. (2011). Providing trust in wireless sensor networks using a bio-inspired technique. Telecommunication Systems, 46, 163–180.
-
(2011)
Telecommunication Systems
, vol.46
, pp. 163-180
-
-
Gómez Mármol, F.1
Martínez Pérez, G.2
-
16
-
-
0142103313
-
Security and privacy in sensor networks
-
Haowen Chan, A., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36, 103–105.
-
(2003)
Computer
, vol.36
, pp. 103-105
-
-
Haowen Chan, A.1
Perrig, A.2
-
17
-
-
79956325553
-
Analysis of hardware encryption versus software encryption on wireless sensor network motes
-
Healy, M., Newe, T., & Lewis, E. (2008). Analysis of hardware encryption versus software encryption on wireless sensor network motes. Smart Sensors and Sensing Technology, Lecture Notes in Electrical Engineering, 20, 3–14.
-
(2008)
Smart Sensors and Sensing Technology, Lecture Notes in Electrical Engineering
, vol.20
, pp. 3-14
-
-
Healy, M.1
Newe, T.2
Lewis, E.3
-
18
-
-
77958531978
-
Conserving bandwidth in a wireless sensor network for telemedicine application
-
Hsu, S. J., Chen, C. H., Chen, S. H., Huang, W. T., Chang, Y. J., & Chen, Y. Y. (2010). Conserving bandwidth in a wireless sensor network for telemedicine application. Intelligent Automation & Soft Computing, 16, 537–551.
-
(2010)
Intelligent Automation & Soft Computing
, vol.16
, pp. 537-551
-
-
Hsu, S.J.1
Chen, C.H.2
Chen, S.H.3
Huang, W.T.4
Chang, Y.J.5
Chen, Y.Y.6
-
19
-
-
77954086746
-
Secure encrypted-data aggregation for wireless sensor networks
-
Huang, S. I., Shieh, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16, 915–927.
-
(2010)
Wireless Networks
, vol.16
, pp. 915-927
-
-
Huang, S.I.1
Shieh, S.2
Tygar, J.D.3
-
20
-
-
84892954157
-
A secure trust establishment scheme for wireless sensor networks
-
Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14, 1877–1897.
-
(2014)
Sensors
, vol.14
, pp. 1877-1897
-
-
Ishmanov, F.1
Kim, S.W.2
Nam, S.Y.3
-
21
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Jian, Y., Chen, S., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In INFOCOM 2007. 26th IEEE international conference on computer communications (pp. 1955–1963)
-
(2007)
INFOCOM 2007. 26th IEEE international conference on computer communications
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
23
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS 2005) (pp. 599–608)
-
(2005)
Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS 2005)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
24
-
-
77955283692
-
Device authentication in wireless and pervasive environments
-
Kambourakis, G., Gritzalis, S., & Park, J. H. (2010). Device authentication in wireless and pervasive environments. Intelligent Automation & Soft Computing, 16, 399–418.
-
(2010)
Intelligent Automation & Soft Computing
, vol.16
, pp. 399-418
-
-
Kambourakis, G.1
Gritzalis, S.2
Park, J.H.3
-
26
-
-
84878297450
-
LDTS: A lightweight and dependable trust system for clustered wireless sensor networks
-
Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8, 924–935.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, pp. 924-935
-
-
Li, X.1
Zhou, F.2
Du, J.3
-
27
-
-
84861591865
-
Providing hop-by-hop authentication and source privacy in wireless sensor networks
-
Li, Y., Li, J., Ren, J., & Wu, J. (2012). Providing hop-by-hop authentication and source privacy in wireless sensor networks. In IEEE international conference on computer communications (pp. 3071–3075)
-
(2012)
IEEE international conference on computer communications
, pp. 3071-3075
-
-
Li, Y.1
Li, J.2
Ren, J.3
Wu, J.4
-
28
-
-
77953302309
-
Source-location privacy through dynamic routing in wireless sensor networks
-
March
-
Li, Y., & Ren, J. (2010, March). Source-location privacy through dynamic routing in wireless sensor networks. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9)
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Li, Y.1
Ren, J.2
-
29
-
-
33845715578
-
Location verification and trust management for resilient geographic routing
-
Liu, K., Abu-Ghazaleh, N., & Kang, K. (2007). Location verification and trust management for resilient geographic routing. Journal of Parallel and Distributed Computing, 67, 215–228.
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, pp. 215-228
-
-
Liu, K.1
Abu-Ghazaleh, N.2
Kang, K.3
-
30
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., & Anderson, J. (2002). Wireless sensor networks for habitat monitoring. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications (pp. 88–97)
-
(2002)
Proceedings of the 1st ACM international workshop on wireless sensor networks and applications
, pp. 88-97
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
31
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
Misra, S., & Xue, G. (2006). Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks, 1, 50–63.
-
(2006)
International Journal of Sensor Networks
, vol.1
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
32
-
-
84894068172
-
A secure many-to-many routing protocol for wireless sensor and actuator networks
-
Nguyen, S. T., Cayirci, E., & Rong, C. (2014). A secure many-to-many routing protocol for wireless sensor and actuator networks. Security and Communication Networks, 7, 88–98.
-
(2014)
Security and Communication Networks
, vol.7
, pp. 88-98
-
-
Nguyen, S.T.1
Cayirci, E.2
Rong, C.3
-
33
-
-
78751642743
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
Oliveira, L. B., Aranha, D. F., Gouvêa, C. P., Scott, M., Câmara, D. F., López, J., & Dahab, R. (2011). TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 34, 485–493.
-
(2011)
Computer Communications
, vol.34
, pp. 485-493
-
-
Oliveira, L.B.1
Aranha, D.F.2
Gouvêa, C.P.3
Scott, M.4
Câmara, D.F.5
López, J.6
Dahab, R.7
-
35
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded Computing Systems, 3, 634–660.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
36
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47, 53–57.
-
(2004)
Communications of the ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
37
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: security protocols for sensor networks. Wireless Networks, 8, 521–534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
38
-
-
77955500884
-
Achieving network level privacy in wireless sensor networks
-
Shaikh, R. A., Jameel, H., D'auriol, B. J., Lee, H., Lee, S., & Song, Y. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10, 1447–1472.
-
(2010)
Sensors
, vol.10
, pp. 1447-1472
-
-
Shaikh, R.A.1
Jameel, H.2
D'auriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.6
-
39
-
-
70350070568
-
Group-based trust management scheme for clustered wireless sensor networks
-
Shaikh, R., Jameel, H., d'Auriol, B., Heejo Lee, H., Sungyoung Lee, S., & Young-Jae Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698–1712.
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, pp. 1698-1712
-
-
Shaikh, R.1
Jameel, H.2
d'Auriol, B.3
Heejo Lee, H.4
Sungyoung Lee, S.5
Young-Jae Song, Y.6
-
40
-
-
33750300697
-
LSec: Lightweight security protocol for distributed wireless sensor network
-
Shaikh, R., Lee, S., Khan, M., & Song, Y. (2006). LSec: Lightweight security protocol for distributed wireless sensor network. In Personal wireless communications (pp. 367–377)
-
(2006)
Personal wireless communications
, pp. 367-377
-
-
Shaikh, R.1
Lee, S.2
Khan, M.3
Song, Y.4
-
41
-
-
75749084065
-
MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks
-
Syed, M. K. R., Lee, H., Lee, S., & Lee, Y. K. (2010). MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks. Annals of Telecommunications – Annales des Télécommunications, 65, 101–116.
-
(2010)
Annals of Telecommunications – Annales des Télécommunications
, vol.65
, pp. 101-116
-
-
Syed, M.K.R.1
Lee, H.2
Lee, S.3
Lee, Y.K.4
-
43
-
-
34547477757
-
SIGF: A family of configurable, secure routing protocols for wireless sensor networks
-
Wood, A. D., Fang, L., Stankovic, J. A., & He, T. (2006). SIGF: A family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of the 4th ACM workshop on security of ad hoc and sensor networks (pp. 35–48)
-
(2006)
Proceedings of the 4th ACM workshop on security of ad hoc and sensor networks
, pp. 35-48
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
44
-
-
77958545385
-
The case study of system architecture in wireless sensor networks: The kindergarten safety system (KSS)
-
Yang, J., & Jung, S. H. (2010). The case study of system architecture in wireless sensor networks: The kindergarten safety system (KSS). Intelligent Automation & Soft Computing, 16, 507–517.
-
(2010)
Intelligent Automation & Soft Computing
, vol.16
, pp. 507-517
-
-
Yang, J.1
Jung, S.H.2
-
46
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35, 867–880.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
47
-
-
79955045996
-
A trust management architecture for hierarchical wireless sensor networks
-
Zhang, J., Shankaran, R., Orgun, M. A., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In Proceedings of IEEE 35th conference on local computer networks (LCN) (pp. 264–267)
-
(2010)
Proceedings of IEEE 35th conference on local computer networks (LCN)
, pp. 264-267
-
-
Zhang, J.1
Shankaran, R.2
Orgun, M.A.3
Varadharajan, V.4
Sattar, A.5
-
48
-
-
84899722572
-
Providing desirable data to users when integrating wireless sensor networks with mobile cloud
-
December
-
Zhu, C., Leung, V., Wang, H., Chen, W., & Liu, X. (2013, December). Providing desirable data to users when integrating wireless sensor networks with mobile cloud. In IEEE 5th international conference on cloud computing technology and science (CloudCom) (Vol. 1, pp. 607–614)
-
(2013)
IEEE 5th international conference on cloud computing technology and science (CloudCom)
, pp. 607-614
-
-
Zhu, C.1
Leung, V.2
Wang, H.3
Chen, W.4
Liu, X.5
-
49
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2, 500–528.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|