7
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies

, , , &
Pages 209-223 | Published online: 12 May 2009

References

  • Chan , Haowen and Perrig , Adrian . 2003 . Security and privacy in sensor networks . IEEE Computer Magazine , : 103 – 105 .
  • Brooks , R. R. , Govindaraju , P. Y. , Pirretti , M. , Vijaykrishnan , N. and Kandemir , M. 2007 . On the detection of clones in sensor networks using random key predistribution” . IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews , 37 ( 6 ) : 1246 – 1258 .
  • Laurent , Eschenauer and Gligor , Virgil D. . A key management scheme for distributed sensor networks . Proceedings of the 9th ACM Conference on Computer and Communications Security . pp. 41 – 47 .
  • Bloom , B. 1970 . Space/time trade-offs in hash coding with allowable errors . Communications of the ACM , 13 ( 7 ) July : 422 – 426 .
  • Brooks , R. R. , Pillai , B. , Weigele , M. C. and Pirretti , M. G. 2009 . Multicast Encryption Infrastructure for Security in Sensor Networks . International Journal of Distributed Sensor Networks , 5 ( 2 ) : 139 – 157 .
  • Chan , H. , Perrig , A. and Song , D. . Random key predistribution schemes for sensor networks . Proceedings of the 2003 IEEE Symposium on Security and Privacy .
  • Bollobás , B. 2001 . Random Graphs , Cambridge, , UK : Cambridge University Press .
  • Iyengar , S. S. and Brooks , R. R. , eds. 2005 . Distributed Sensor Networks , Boca Raton : Chapman & Hall .
  • Stauffer , D. and Aharony , A. 1992 . Introduction to Percolation Theory , London : Taylor & Francis .
  • Krishnamachari , Bhaskar , Wicker , Stephen B. and Bejar , Ramon . . Phase transition phenomena in wireless ad-hoc networks . Symposium on Ad-Hoc Wireless Networks, GlobeCom2001 . November , Texas : San Antonio .
  • Brooks , R. R. , Friedlander , D. , Koch , J. and Phoha , S. 2004 . Tracking multiple targets with self-organizing distributed ground sensors . Journal of Parallel and Distributed Computing , vol. 64 ( 7 ) : 874 – 884 . Special Issue on Sensor NetworksAugust
  • Brooks , R. R. 2005 . Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks , Boca Raton : CRC Press .
  • Brooks , R. R. , Pillai , B. , Racunas , S. and Rai , S. 2006 . Mobile network analysis using probabilistic connectivity matrices . IEEE Transactions on SMC, Part C , January In Press

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.