Security in Wireless Sensor Networks: Considerations and Experiments
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 167-177
- https://doi.org/10.1007/11796435_18
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Key Distribution Techniques for Sensor NetworksPublished by Springer Science and Business Media LLC ,2006
- Security for Wireless Sensor NetworksPublished by Springer Science and Business Media LLC ,2006
- A Key Predistribution Scheme for Sensor Networks Using Deployment KnowledgeIEEE Transactions on Dependable and Secure Computing, 2006
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- Security in wireless sensor networksCommunications of the ACM, 2004
- Secure routing in wireless sensor networks: attacks and countermeasuresAd Hoc Networks, 2003
- Real-time communication and coordination in embedded sensor networksProceedings of the IEEE, 2003
- Denial of service in sensor networksComputer, 2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002