-
1
-
-
0036688074
-
A survey on sensor networks
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
34548355193
-
Location-aware security services for wireless sensor networks using network coding
-
E. Ayday, F. Delgosha, and F. Fekri, "Location-aware security services for wireless sensor networks using network coding," in IEEE Conference on Computer Communications, pp. 1226-1234, 2007.
-
(2007)
IEEE Conference on Computer Communications
, pp. 1226-1234
-
-
Ayday, E.1
Delgosha, F.2
Fekri, F.3
-
3
-
-
84886451367
-
Performance analysis of steiner tree-based decentralization mechanism (STDM) for privacy protection in wireless sensor networks
-
B. S. Babu, N. Jayashree, and P. Venkataram, "Performance analysis of steiner tree-based decentralization mechanism (STDM) for privacy protection in wireless sensor networks," International Journal of Network Security, vol. 15, no. 5, pp. 331-340, 2013.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.5
, pp. 331-340
-
-
Babu, B.S.1
Jayashree, N.2
Venkataram, P.3
-
4
-
-
84874671183
-
Dynamic key management in wireless sensor networks: A survey
-
X. He, M. Niedermeier, and H. de Meer, "Dynamic key management in wireless sensor networks: A survey," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 611-622, 2013.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 611-622
-
-
He, X.1
Niedermeier, M.2
de Meer, H.3
-
5
-
-
84903891394
-
Recent advances and future trends in wireless sensor networks
-
V. Katiyar, N. Chand, and N. Chand, "Recent advances and future trends in wireless sensor networks," International Journal of Applied Engineering Research, vol. 1, no. 3, pp. 330-342, 2010.
-
(2010)
International Journal of Applied Engineering Research
, vol.1
, Issue.3
, pp. 330-342
-
-
Katiyar, V.1
Chand, N.2
Chand, N.3
-
6
-
-
80052938422
-
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
-
C. T. Li and M.S. Hwang, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks," Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011.
-
(2011)
Information Sciences
, vol.181
, Issue.23
, pp. 5333-5347
-
-
Li, C.T.1
Hwang, M.S.2
-
7
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
-
(2008)
International Journal of Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
8
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
9
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks," International Journal ofInno-vative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
-
(2009)
International Journal ofInno-vative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
10
-
-
33646842495
-
Data sampling control and compression in sensor networks
-
J. Li and J. Li, "Data sampling control and compression in sensor networks," Mobile Ad-hoc and Sensor Networks, vol. 3794, pp. 42-51, 2005.
-
(2005)
Mobile Ad-hoc and Sensor Networks
, vol.3794
, pp. 42-51
-
-
Li, J.1
Li, J.2
-
11
-
-
84903892162
-
Distributed detecting node replication attacks in wireless sensor networks: A survey
-
W. T. Li, T. H. Feng, and M. S. Hwang, "Distributed detecting node replication attacks in wireless sensor networks: A survey," International Journal of Network Security, vol. 16, no. 5, pp. 323-330, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.5
, pp. 323-330
-
-
Li, W.T.1
Feng, T.H.2
Hwang, M.S.3
-
12
-
-
84909998552
-
Group rekeying in wireless sensor networks: A survey
-
W. T. Li, C. H. Ling, and M. S. Hwang, "Group rekeying in wireless sensor networks: A survey," International Journal of Network Security, vol. 16, no. 6, pp. 401-410, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.6
, pp. 401-410
-
-
Li, W.T.1
Ling, C.H.2
Hwang, M.S.3
-
14
-
-
84881282884
-
An active en-route filtering scheme for information reporting in wireless sensor networks
-
K. Naresh, K. P. PrDadeep, and K. S. Sathish, "An active en-route filtering scheme for information reporting in wireless sensor networks," International Journal of Computer Science and Information Technologies, vol. 2, no. 4, pp. 1812-1819, 2012.
-
(2012)
International Journal of Computer Science and Information Technologies
, vol.2
, Issue.4
, pp. 1812-1819
-
-
Naresh, K.1
PrDadeep, K.P.2
Sathish, K.S.3
-
15
-
-
77956873542
-
A survey on key management mechanisms for distributed wireless sensor networks
-
M. A. Jr. Simplicio, P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol. 54, no. 15, pp. 2591-2612, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2591-2612
-
-
Simplicio, M.A.1
Barreto, P.S.L.M.2
Margi, C.B.3
Carvalho, T.C.M.B.4
-
16
-
-
84898781643
-
Review on security issues and attacks in wireless sensor networks
-
A. Singla and R. Sachdeva, "Review on security issues and attacks in wireless sensor networks," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, pp. 529-534, 2013.
-
(2013)
International Journal of Advanced Research in Computer Science and Software Engineering
, vol.3
, Issue.4
, pp. 529-534
-
-
Singla, A.1
Sachdeva, R.2
-
17
-
-
84874885967
-
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
-
H. S. Soliman and M. Omari, "Application of synchronous dynamic encryption system (SDES) in wireless sensor networks," International Journal of Network Security, vol. 3, no. 2, pp. 160-171, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 160-171
-
-
Soliman, H.S.1
Omari, M.2
-
18
-
-
84873263634
-
A double key-sharing based false data filtering scheme in wireless sensor networks
-
Q. Sun and M. Wu, "A double key-sharing based false data filtering scheme in wireless sensor networks," Journal of Computers, vol. 8, no. 2, pp. 388-398, 2013.
-
(2013)
Journal of Computers
, vol.8
, Issue.2
, pp. 388-398
-
-
Sun, Q.1
Wu, M.2
-
20
-
-
84885181405
-
Defending collaborative false data injection attacks in wireless sensor networks
-
J. Wanga, Z. Liu, S. Zhang, and X. Zhang, "Defending collaborative false data injection attacks in wireless sensor networks," Information Sciences, vol. 254, no. 1, pp. 39-53, 2014.
-
(2014)
Information Sciences
, vol.254
, Issue.1
, pp. 39-53
-
-
Wanga, J.1
Liu, Z.2
Zhang, S.3
Zhang, X.4
-
21
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
22
-
-
77953734116
-
Multidimensional resilient statistical en-route filtering in wireless sensor networks
-
F. Yang, X. H. Zhou, and Q. Y. Zhang, "Multidimensional resilient statistical en-route filtering in wireless sensor networks," Lecture Notes in Computer Science, pp. 130-139, 2010.
-
(2010)
Lecture Notes in Computer Science
, pp. 130-139
-
-
Yang, F.1
Zhou, X.H.2
Zhang, Q.Y.3
-
23
-
-
17144414947
-
Commutative cipher based en-route filtering in wireless sensor networks
-
H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Vehicular Technology Conference, pp. 1223-1227, 2004.
-
(2004)
Vehicular Technology Conference
, pp. 1223-1227
-
-
Yang, H.1
Lu, S.2
-
24
-
-
17144429277
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
26
-
-
77249083598
-
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
-
Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, 2010.
-
(2010)
IEEE/ACM Transactions on Networking
, vol.18
, Issue.1
, pp. 150-163
-
-
Yu, Z.1
Guan, Y.2
|