-
1
-
-
0036688074
-
Asurvey on sensor networks
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Asurvey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
7
-
-
0035505507
-
Routing with guaranteed delivery in ad hoc wireless networks
-
P. Bose, P. Morin, I. Stojmenović, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001.
-
(2001)
Wirel. Netw.
, vol.7
, Issue.6
, pp. 609-616
-
-
Bose, P.1
Morin, P.2
Stojmenović, I.3
Urrutia, J.4
-
10
-
-
0010461175
-
-
Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD
-
D. W. Carman, P. S. Krus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Krus, P.S.2
Matt, B.J.3
-
11
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Computer Magazine, pages 103–105, 2003.
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
12
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig. Pike: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom 2005, 2005.
-
(2005)
IEEE Infocom 2005
-
-
Chan, H.1
Perrig, A.2
-
14
-
-
85056977655
-
-
http://www.xbow.com/wireless_home.aspx, 2006.
-
(2006)
-
-
-
15
-
-
27544440245
-
-
Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado
-
J. Deng, R. Han, and S. Mishra. INSENS: Intrusion-tolerant routing in wireless sensor networks. In Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, 2002.
-
(2002)
INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
17
-
-
80053502199
-
-
Artech House, August
-
J. Deng, R. Han, and S. Mishra. Security, Privacy, and Fault Tolerance in Wireless Sensor Networks. Artech House, August 2005.
-
(2005)
Security, Privacy, and Fault Tolerance in Wireless Sensor Networks
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
New York, ACM Press
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 42–51, New York, 2003. ACM Press.
-
(2003)
CCS’03: Proceedings of the 10Th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
20
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang. Framework for security and privacy in automotive telematics. In 2nd ACM International Worksphop on Mobile Commerce, 2000.
-
(2000)
2Nd ACM International Worksphop on Mobile Commerce
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.7
-
22
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263–270, 1999.
-
(1999)
Mobile Computing and Networking
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.S.3
Kumar, S.4
-
24
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
New York, ACM Press
-
S. Ganeriwal, S. Čapkun, C.-C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In WiSe’05: Proceedings of the 4th ACM Workshop on Wireless Security, pages 97–106, New York, 2005. ACM Press.
-
(2005)
In WiSe’05: Proceedings of the 4Th ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Čapkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
28
-
-
85092924851
-
Privacy-aware location sensor networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In 9th USENIXWorkshop on Hot Topics in Operating Systems (HotOS IX), 2003.
-
(2003)
9Th Usenixworkshop on Hot Topics in Operating Systems (Hotos IX)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
29
-
-
27244436587
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In 2004 Workshop on Cryptographic Hardware and Embedded Systems, August 2004.
-
(2004)
2004 Workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
30
-
-
33745639957
-
-
Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder
-
C. Hartung, J. Balasalle, and R. Han. Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder, 2004.
-
(2004)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
32
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93–104, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.6
-
35
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, volume 3, pages 1976–1986, 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
36
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
ACM Press
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang. Fast authenticated key establishment protocols for self-organizing sensor networks. In Proceedings of the 2ndACMInternational Conference on Wireless Sensor Networks and Applications, pages 141–150. ACM Press, 2003.
-
(2003)
Proceedings of the 2Ndacminternational Conference on Wireless Sensor Networks and Applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
38
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Mobile Computing and Networking, pages 56–67, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
40
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, September 2003.
-
(2003)
Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
42
-
-
4544326206
-
Secure multicast groups on ad hoc networks
-
ACM Press
-
T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. Secure multicast groups on ad hoc networks. In Proceedings of the 1st ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN’03), pages 94–102. ACM Press, 2003.
-
(2003)
Proceedings of the 1St Acmworkshop on Security of Ad Hoc and Sensor Networks (SASN’03
, pp. 94-102
-
-
Kaya, T.1
Lin, G.2
Noubir, G.3
Yilmaz, A.4
-
44
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Y.W. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw., 2(1):65–93, 2006.
-
(2006)
ACM Trans. Sen. Netw.
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
47
-
-
84866469313
-
Serloc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73–100, 2005.
-
(2005)
ACM Trans. Sen. Netw
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
49
-
-
29844451556
-
Enforcing cooperative resource sharing in untrusted peerto- peer environment
-
Z. Liang and W. Shi. Enforcing cooperative resource sharing in untrusted peerto- peer environment. ACMJournal of Mobile Networks and Applications (MONET), 10(6):771–783, 2005.
-
(2005)
Acmjournal of Mobile Networks and Applications (MONET)
, vol.10
, Issue.6
, pp. 771-783
-
-
Liang, Z.1
Shi, W.2
-
50
-
-
27544488231
-
PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing
-
Waikoloa Village, Hawaii, January
-
Z. Liang and W. Shi. PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing. In Proceedings of the HICSS-38, Waikoloa Village, Hawaii, January 2005.
-
(2005)
Proceedings of the HICSS-38
-
-
Liang, Z.1
Shi, W.2
-
52
-
-
85000276942
-
MultilevelμTESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning. MultilevelμTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys., 3(4):800–836, 2004.
-
(2004)
Trans. on Embedded Computing Sys.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
53
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41–77, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
54
-
-
84978428047
-
Tag:Atiny aggregation service for ad-hoc sensor networks
-
S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong. Tag:Atiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev., 36(SI):131–146, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.1
, pp. 131-146
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
57
-
-
14844294769
-
Privacy and security in library rfid: Issues, practices, and architectures
-
D. Molnar and D. Wagner. Privacy and security in library rfid: Issues, practices, and architectures. In ACM CCS, 2004.
-
(2004)
ACM CCS
-
-
Molnar, D.1
Wagner, D.2
-
58
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56–64, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
59
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
ACM Press
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: Analysis and defenses. In Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pages 259–268. ACM Press, 2004.
-
(2004)
Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
64
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53–57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
65
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless Networking, 8(5):521–534, 2002.
-
(2002)
Wireless Networking
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
66
-
-
75149140029
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In First International Workshop on Wireless Security and Privacy (WiSPr’03), 2003.
-
(2003)
First International Workshop on Wireless Security and Privacy (WiSPr’03)
-
-
Di Pietro, R.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
69
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli and D. Hutchison. A survey of key management for secure group communication. ACM Comput. Surv., 35(3):309–329, 2003.
-
(2003)
ACM Comput. Surv.
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
70
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
K. Ren, T. Li, Z. Wan, F. Bao, R. H. Deng, and K. Kim. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks: The International Journal of Computer and Telecommunications Networking, 45:687–699, August 2004.
-
(2004)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.45
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
72
-
-
33845496940
-
An improved intrusion detection method based on process profiling
-
I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316–3326, 2002.
-
(2002)
IPSJ Journal
, vol.43
, Issue.11
, pp. 3316-3326
-
-
Sato, I.1
Okazaki, Y.2
Goto, S.3
-
75
-
-
27644511275
-
Medians and beyond: New aggregation techniques for sensor networks
-
ACM Press
-
N. Shrivastava, C. Buragohain, D. Agrawal, and S. Suri. Medians and beyond: New aggregation techniques for sensor networks. In SenSys’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pages 239–249. ACM Press, 2004.
-
(2004)
SenSys’04: Proceedings of the 2Nd International Conference on Embedded Networked Sensor Systems
, pp. 239-249
-
-
Shrivastava, N.1
Buragohain, C.2
Agrawal, D.3
Suri, S.4
-
76
-
-
1642364285
-
Location sensing and privacy in a context aware computing environment
-
A. Smailagic, D. P. Siewiorek, J. Anhalt, Y. Wang, and D. Kogan. Location sensing and privacy in a context aware computing environment. In Pervasive Computing, 2001.
-
(2001)
Pervasive Computing
-
-
Smailagic, A.1
Siewiorek, D.P.2
Anhalt, J.3
Wang, Y.4
Kogan, D.5
-
78
-
-
14344252668
-
Real-time communication and coordination in embedded sensor networks
-
J. A. Stankovic et al. Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE, 91(7):1002–1022, July 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.7
, pp. 1002-1022
-
-
Stankovic, J.A.1
-
79
-
-
18844362199
-
Poster abstract secure locations: Routing on trust and isolating compromised sensors in location-aware sensor networks
-
ACM Press
-
S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy. Poster abstract secure locations: Routing on trust and isolating compromised sensors in location-aware sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pages 324–325. ACM Press, 2003.
-
(2003)
Proceedings of the 1St International Conference on Embedded Networked Sensor Systems
, pp. 324-325
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
84
-
-
24144490816
-
Lifetime optimization of sensor networks under physical attacks
-
X. Wang, W. Gu, S. Chellappan, K.T Schoseck, and Dong Xuan. Lifetime optimization of sensor networks under physical attacks. In Proc. of IEEE International Conference on Communications, May 2005.
-
(2005)
Proc. of IEEE International Conference on Communications
-
-
Wang, X.1
Gu, W.2
Chellappan, S.3
Schoseck, K.T.4
Xuan, D.5
-
85
-
-
80053510602
-
-
Technical Report, Dept. of Computer Science and Engineering, Ohio State University
-
X. Wang, W. Gu, S. Chellappan, Dong Xuan, and Ten H. Laii. Search-based physical attacks in sensor networks: Modeling and defense. Technical Report, Dept. of Computer Science and Engineering, Ohio State University, February 2005.
-
(2005)
Search-Based Physical Attacks in Sensor Networks: Modeling and Defense
-
-
Wang, X.1
Gu, W.2
Chellappan, S.3
Xuan, D.4
Laii, T.H.5
-
86
-
-
26444607381
-
-
Technical Report (OSU-CISRC-7/04- TR45), Dept. of Computer Science and Engineering, Ohio State University
-
X. Wang, W. Gu, K. Schosek, S. Chellappan, and D. Xuan. Sensor network configuration under physical attacks. Technical Report (OSU-CISRC-7/04- TR45), Dept. of Computer Science and Engineering, Ohio State University, July 2004.
-
(2004)
Sensor Network Configuration under Physical Attacks
-
-
Wang, X.1
Gu, W.2
Schosek, K.3
Chellappan, S.4
Xuan, D.5
-
87
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
New York, ACM Press
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN’04), pages 59–64, New York, 2004. ACM Press.
-
(2004)
Proceedings of the 2Nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
88
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer, 35(10):54–62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
91
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004, 2004.
-
(2004)
IEEE INFOCOM 2004
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
92
-
-
17144420084
-
Computing of trust in wireless networks
-
Los Angeles, September
-
H. Zhu, F. Bao, R. H. Deng, and K. Kim. Computing of trust in wireless networks. In Proceedings of 60th IEEE Vehicular Technology Conference, Los Angeles, September 2004.
-
Proceedings of 60Th IEEE Vehicular Technology Conference
, pp. 2004
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
Kim, K.4
-
93
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA, ACM Press
-
S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In CCS’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 62–72, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS’03: Proceedings of the 10Th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
94
-
-
85056928986
-
-
http://www.zigbee.org/, 2005.
-
(2005)
-
-
|