Documents
Authors
Tables
Documents:
Advanced Search
Include Citations
Authors:
Advanced Search
Include Citations
Tables:
DMCA
Secure Geographic Routing in Wireless Sensor Networks (2013)
Cached
Download Links
[publications.lib.chalmers.se]
Save to List
Add to Collection
Correct Errors
Monitor Changes
by Farinaz Ghasemi
Summary
Citations
Active Bibliography
Co-citation
Clustered Documents
Version History
Citations
2278
GPSR: greedy perimeter stateless routing for wireless networks
- Karp, Kung - 2000
1088
SPINS: security protocols for sensor networks. Wireless Networks
- Perrig, Szewczyk, et al. - 2002
1083
Mitigating routing misbehavior in mobile ad hoc networks
- Marti, Giuli, et al. - 2000
826
Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks
- Karlof, Wagner - 2003
780
Self-stabilizing systems in spite of distributed control
- Dijkstra - 1974
518
TinySec: A link layer security architecture for wireless sensor networks
- Karlof, Sastry, et al. - 2004
513
Contiki - a lightweight and flexible operating system for tiny networked sensors
- Dunkels, Grönvall, et al. - 2004
389
The sybil attack in sensor networks: analysis & defenses
- Newsome, Shi, et al. - 2004
324
SybilGuard: Defending Against Sybil Attacks via Social Networks
- Yu, Kaminsky, et al. - 2006
218
An ondemand secure routing protocol resilient to byzantine failures
- Awerbuch, Holmer, et al. - 2002
123
An overview of anomaly detection techniques: Existing solutions and latest technological trends
- Patcha, Park
96
Fundamentals of wireless sensor networks: theory and practice
- Dargie, Poellabauer - 2010
91
Establishing trust in pure ad-hoc networks
- Pirzada, McDonald
80
Improving wireless simulation through noise modeling,” in IPSN, 2007. Wei Si received B.S. degree in Information Engineering from Shanghai Jiao Tong
- Lee, Cerpa, et al. - 1994
59
On the pitfalls of geographic face routing
- Kim, Govindan, et al. - 2005
55
Software design patterns for TinyOS
- Gay, Levis, et al. - 2007
55
Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks. Published in
- Liu, Ning - 2004
38
Detection and localization of sybil nodes in VANETs
- Xiao, Yu, et al. - 2006
37
TOSSIM: A Simulator for TinyOS Networks
- Levis, Lee - 2003
35
Black hole attack in mobile ad hoc networks
- Al-Shurman, Yoo, et al. - 2004
30
Energy-Efcient Multipath Routing in Wireless Sensor Networks
- Highly-Resilient - 2001
24
TinyOS Programming
- Levis - 2006
8
Ramesh Govindan and Deborah Estrin. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks
- Yu - 2001
8
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
- Casado, Tsigas - 2009
6
Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks. A dissertation submitted to the Swiss Federal Institute of Technology Zurich for the degree of Doctor of Sciences
- Zollinger - 2005
5
A Novel Secure Localization Approach in Wireless Sensor Networks. Published in
- Chen, Lou, et al.
3
A secure MANET routing protocol with resilience against byzantine behaviors of malicious or selfish nodes
- Cr´epeau, Davis, et al. - 2007
3
A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks
- Sen - 2011
2
Detecting Sybil attacks in image sensor network using cognitive intelligence
- Muraleedharan, Yan, et al. - 2007
2
A secure routing protocol for wireless sensor networks
- Sen, Ukil - 2010
1
and Philippas Tsigas. Secure and self-stabilizing clock synchronization in sensor networks
- Hoepman, Larsson, et al. - 2007
1
Towards Practical and Resilient Geometric Routing for Wireless Sensor Networks
- Liu - 2008
1
Wei-Tong Wang and Wen-Chung Chang. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
- Ssu - 2009
1
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
- Silva, Krishnamachari, et al. - 2010
1
Shiuhpyng Shieh and Shankar Sastry. Secure routing in wireless sensor networks: attacks and countermeasures
- Roosta - 2003
1
Bavar and Cristina Nita Rotaru. Secure and Robust Virtual Coordinate System in Wireless Sensor Networks. Published in
- Dong, Ackermann, et al.
1
Oussama Mohamed Reda and Bouabid El Ouahidi. A contribution to secure the routing protocol: Greedy perimeter stateless routing using a symmetric signature-based AES and MD5 hash
- Erritali - 2011
1
Tingting Jiang and Jian Ren. Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks
- Tang - 2010
1
Rohan Bhindwale and Ahmed Helmyl. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks
- Tanachaiwiwat, Davel - 2004