-
1
-
-
34347217295
-
-
CRC Press, New York, USA
-
JP Walters, Z Liang, W Shi, V Chaudhary Wireless sensor network security: A survey, Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, New York, USA, 2006.
-
(2006)
Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
2
-
-
85031312466
-
Saif ullah military applications using wireless sensor Networks: A survey
-
June
-
Ishfaq Ahmad, Khalil Shah, Saif Ullah Military Applications using Wireless Sensor Networks: A survey, International Journal of Engineering Science and Computing, Volume 6 Issue No. 6, June 2016.
-
(2016)
International Journal of Engineering Science and Computing
, vol.6
, Issue.6
-
-
Ahmad, I.1
Shah, K.2
-
3
-
-
85027885248
-
A study on wireless sensor networks applications, Architecture and Protocols
-
April
-
I. Nikila, E. Edwin Lawrence, S. Meenakshi, A Study on Wireless Sensor Networks Applications, Architecture and Protocols, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 4, April 2016.
-
(2016)
International Journal of Innovative Research in Computer and Communication Engineering
, vol.4
, Issue.4
-
-
Nikila, I.1
Edwin Lawrence, E.2
Meenakshi, S.3
-
4
-
-
84995390452
-
-
September
-
P. B. Hari, S. N. Singh, Security issues in Wireless Sensor Networks: Current research and challenges, International Conference on Advances in Computing, Communication, Automation (ICACCA) (Spring), Pages 1-6, September 2016.
-
(2016)
Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, Automation (ICACCA) Spring
, pp. 1-6
-
-
Hari, P.B.1
Singh, S.N.2
-
5
-
-
85027865318
-
Review of threats in wireless sensor networks
-
September
-
Sonal Garg, Vikas Malik, Review of Threats in Wireless Sensor Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 6, Issue 9, September 2016.
-
(2016)
International Journal of Emerging Technology and Advanced Engineering
, vol.6
, Issue.9
-
-
Garg, S.1
Malik, V.2
-
6
-
-
84984612212
-
Security issues in wireless sensor networks: Attacks and Countermeasures
-
K. CHELLI, Security Issues in Wireless Sensor Networks: Attacks and Countermeasures, Proceedings of the World Congress on Engineering, Volume 1, 2015.
-
(2015)
Proceedings of the World Congress on Engineering
, vol.1
-
-
Chelli, K.1
-
7
-
-
85027844760
-
Defenses against passive eavesdroppers in data peer-Topeer system
-
June
-
Ali K. Mubarak, Defenses against passive eavesdroppers in data peer-Topeer system, International Journal of Advanced Science and Engineering Research, Volume 1, Issue 1, Pages 834-841, June 2016.
-
(2016)
International Journal of Advanced Science and Engineering Research
, vol.1
, Issue.1
, pp. 834-841
-
-
Mubarak, A.K.1
-
8
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
Fourth Quarter
-
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos and G. Pantziou, A survey on jamming attacks and countermeasures in WSNs, IEEE Communications Surveys Tutorials, Volume 11, no. 4, Pages 42-56, Fourth Quarter 2009.
-
(2009)
IEEE Communications Surveys Tutorials
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
9
-
-
84871820851
-
Draining life from wireless ad hoc sensor networks
-
Feb
-
E. Y. Vasserman, N. Hopper, Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks, IEEE Transactions on Mobile Computing, Volume 12, no. 2, Pages 318-332, Feb. 2013.
-
(2013)
IEEE Transactions on Mobile Computing
, vol.12
, Issue.2
, pp. 318-332
-
-
Vasserman, E.Y.1
Hopper, N.2
Attacks, V.3
-
10
-
-
36248995256
-
Detecting wormhole attacks in wireless sensor networks
-
Critical Infrastructure Protection
-
Yurong Xu, Guanling Chen, James Ford, Fillia Makedon, Detecting Wormhole Attacks in Wireless Sensor Networks, IFIP International Federation for Information Processing, Volume 253, Critical Infrastructure Protection, Pages 267 279, 2008.
-
(2008)
IFIP International Federation for Information Processing
, vol.253
, pp. 267-279
-
-
Xu, Y.1
Chen, G.2
Ford, J.3
Makedon, F.4
-
13
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and Countermeasures
-
C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad Hoc Networks, Pages 293 315, 2003.
-
(2003)
Ad Hoc Networks
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
14
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
September
-
J. Deng, R. Han, S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Pages 113-126, September 2005.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
15
-
-
10044284351
-
Leap-efficient security mechanisms for large-scale distributed sensor networks
-
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Leap-efficient security mechanisms for large-scale distributed sensor networks, Proceedings of the 10th ACM conference on Computer and communications security, Pages 62-72, 2003
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
16
-
-
37149010269
-
A new resilient key management protocol for wireless sensor networks
-
Chakib Bekara, Maryline Laurent-Maknavicius, A new resilient key management protocol for wireless sensor networks, WISTP, Volume 4462, Pages 14-26, 2007
-
(2007)
WISTP
, vol.4462
, pp. 14-26
-
-
Bekara, C.1
Laurent-Maknavicius, M.2
-
17
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
IEEE Computer Society
-
Donggang Liu, Peng Ning, Wenliang Du., Detecting malicious beacon nodes for secure location discovery in wireless sensor networks, ICDCS, Pages 609 619. IEEE Computer Society, 2005.
-
(2005)
ICDCS
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
18
-
-
17144420084
-
Computing of trust in wireless networks
-
September
-
H. Zhu, F. Bao, R. H. Deng, K. Kim, Computing of trust in wireless networks, Proceedings of 60th IEEE Vehicular Technology Conference, Los Angles, California, September 2004.
-
(2004)
Proceedings of 60th IEEE Vehicular Technology Conference, Los Angles, California
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
Kim, K.4
-
19
-
-
33750134647
-
SPINS: Security protocols for sensor networks, Seventh Annual
-
July
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar., SPINS: Security protocols for sensor networks, Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), July 2001.
-
(2001)
ACM International Conference on Mobile Computing and Networks (MobiCom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
21
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karloff, N. Sastry, and D. Wagner, TinySec: A link layer security architecture for wireless sensor networks, 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, 2004.
-
(2004)
2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA
-
-
Karloff, C.1
Sastry, N.2
Wagner, D.3
-
22
-
-
47649113722
-
An energy efficient link-layer security protocol for wireless Sensor Networks
-
Leonard E. Lighfoot, Jian Ren, Tongtong Li, An Energy Efficient Link-Layer Security Protocol for Wireless Sensor Networks, IEEE EIT, 2007.
-
(2007)
IEEE EIT
-
-
Lighfoot, L.E.1
Ren, J.2
Li, T.3
-
24
-
-
35348897342
-
Minisec: A secure sensor network communication Architecture
-
M. Luk, G. Mezzour, A. Perrig, V. Gligor, MiniSec: A Secure Sensor Network Communication Architecture, IEEE International Conference on Information Processing in Sensor Networks (IPSN07), Cambridge, Massachusetts, USA, 2007.
-
(2007)
IEEE International Conference on Information Processing in Sensor Networks (IPSN07), Cambridge, Massachusetts, USA
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
25
-
-
10044284351
-
Leap: Efficient security mechanisms for largescale distributed sensor networks
-
Zhu S., Setia S., Jajodia S., Leap: efficient security mechanisms for largescale distributed sensor networks, CCS 03: Proceedings of the 10th ACM conference on Computer and communications security, New York, USA, Pages 62 72, 2003.
-
(2003)
CCS 03: Proceedings of the 10th ACM Conference on Computer and Communications Security, New York, USA
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
27
-
-
36248933437
-
LEDS: Providing location-Aware end-To-end data security in wireless sensor networks
-
Ren K., Lou W., Zhang Y., LEDS: Providing location-Aware end-To-end data security in wireless sensor networks, Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc IEEE INFOCOM
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
28
-
-
33750417077
-
Efficient and authenticated key agreement mechanism in low-Rate WPAN Environment
-
Phuket, Thailand, Pages, January 2006
-
Heo J., C.S. Hong, Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment, International Symposium on Wireless Pervasive Computing 2006, Phuket, Thailand, Pages 1-5, January 2006.
-
(2006)
International Symposium on Wireless Pervasive Computing
, pp. 1-5
-
-
Heo, J.1
Hong, C.S.2
-
30
-
-
85027865424
-
Application-based classification and comparison of secure Routing Protocols in Wireless sensor Networks: A Survey
-
June
-
A. K. Imran, A. Farooq, A. B. Waleed, N. Mudasser, Application-based Classification and Comparison of Secure Routing Protocols in Wireless sensor Networks: A Survey, Smart Computing Review, vol. 5, no. 3, June 2015.
-
(2015)
Smart Computing Review
, vol.5
, Issue.3
-
-
Imran, A.K.1
Farooq, A.2
Waleed, A.B.3
Mudasser, N.4
-
31
-
-
85027875114
-
Secure and efficient data transmission for cluster-based Wireless Sensor Networks
-
Vinayagamoorthy M., Ramesh V., Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks, International Journal of Basic Science and Engineering Research, Vol 1, Issue 1, 2014.
-
(2014)
International Journal of Basic Science and Engineering Research
, vol.1
, Issue.1
-
-
Vinayagamoorthy, M.1
Ramesh, V.2
-
32
-
-
85002179475
-
Comparative analysis of selective forwarding attacks over Wireless Sensor Networks
-
February
-
Naser M. Alajmi, Khaled M. Elleithy, Comparative Analysis of Selective Forwarding Attacks over Wireless Sensor Networks, International Journal of Computer Applications Volume 111, No 14, February 2015.
-
(2015)
International Journal of Computer Applications
, vol.111
, Issue.14
-
-
Alajmi, N.M.1
Elleithy, K.M.2
-
34
-
-
79955162431
-
Enhanced security protocol in wireless sensor networks
-
Aseri T.C., Singla N., Enhanced Security Protocol in Wireless Sensor Networks, Int. J. of Computers, Communications Control, Vol. VI, No. 2, Pages. 214-221, 2011.
-
(2011)
Int J. of Computers, Communications Control
, vol.6
, Issue.2
, pp. 214-221
-
-
Aseri, T.C.1
Singla, N.2
-
35
-
-
85027845995
-
A secure routing protocol for wireless sensor networks Considering Secure Data Aggregation
-
Triana M. R., Sang-Gon L., Hoon-Jae L., A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation, Sensors 2015.
-
(2015)
Sensors
-
-
Triana, M.R.1
Sang-Gon, L.2
Hoon-Jae, L.3
|