Node compromise in sensor networks: The need for secure systems (2005)

Cached

Download Links

by Carl Hartung , James Balasalle , Richard Han , Carl Hartung , James Balasalle , Richard Han
Citations:40 - 0 self

Active Bibliography

11 Identity-based encryption for sensor networks – Leonardo B. Oliveira, Felipe Daguano - 2007
14 TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks – Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab - 2008
22 NanoECC: Testing the limits of elliptic curve cryptography in sensor networks – Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab - 2008
34 Wireless sensor network security: A survey,” in book chapter of Security – John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary - 2007
5 Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks – Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert Van Doorn, Pradeep Khosla - 2004
30 Sluice: Secure dissemination of code updates in sensor networks – Patrick E. Lanigan, Priya Narasimhan - 2006
Application-driven security in wireless sensor networks – Rodrigo Román Castro
1 Synthesizing Scalable System Software for Wireless Sensor Networks Abstract – Joel Jacob Koshy - 2007
16 A practical study of transitory master key establishment for wireless sensor networks – Jing Deng, Carl Hartung, Richard Han, Shivakant Mishra - 2005
1 Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks – Leonardo B. Oliveira, Michel Goraczko, Aman Kansal, Feng Zhao, Bodhi Priyantha
4 A Two-Layer Key Establishment Scheme for Wireless Sensor Networks – Yun Zhou, Yuguang Fang - 2007
9 Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks – Patrick Traynor, Student Member, Raju Kumar, Heesook Choi, Student Member, Guohong Cao, Senior Member, Sencun Zhu, Thomas La Porta
1 Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes – Nitesh Saxena, Md. Borhan Uddin - 812
Article Untraceable Mobile Node Authentication in WSN – Kyusuk Han, Kwangjo Kim, Taeshik Shon - 2010
1 Pairing-Based Cryptography for Sensor Networks Abstract – Leonardo B. Oliveira
14 Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks – Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, Thomas La Porta - 2006
19 Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes – Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig - 2007
Compromise-resilient anti-jamming communication in wireless sensor networks – Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao, X. Jiang - 2011
2 Security software engineering in Wireless Sensor Networks – Eric Platon, Yuichi Sei