-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I.F. Akyldiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, Vol. 38, No. 4, pp. 393-422. March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyldiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
Aug.
-
D. Estrin and R. Govindan, "Next Century Challenges: Scalable Coordination in Sensor Networks." in Proc. ACM/IEEE Conf. Mobicom'99, pp. 263-270, Aug. 1999.
-
(1999)
Proc. ACM/IEEE Conf. Mobicom'99
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
-
3
-
-
0345851236
-
Embedding the internet: Amorphous computing
-
May
-
H. Abelson et. al., "Embedding the Internet: Amorphous Computing." in Communications of ACM, Vol. 43. No. 5, pp. 74-82. May 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.5
, pp. 74-82
-
-
Abelson, H.1
-
4
-
-
0002331353
-
Embedding the internet: Embedded computation meets the world wide web
-
May
-
G. Borriello, R. Want, "Embedding the Internet: Embedded Computation Meets the World Wide Web." in Communications of ACM, Vol. 43, No. 5, pp. 59-66, May 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.5
, pp. 59-66
-
-
Borriello, G.1
Want, R.2
-
5
-
-
0345851235
-
Embedding the internet:Wireless integrated network sensors
-
May
-
G. J. Pottie, W. J. Kaiser. "Embedding the Internet:Wireless Integrated Network Sensors," in Communications of ACM, Vol. 43, No. 5, pp. 51-58, May 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
6
-
-
0002804192
-
Embedding the internet: Embedding robots into the internet
-
May
-
G. S. Sukhatme, M. J. Mataric, "Embedding the Internet: Embedding Robots into the Internet," in Communications of ACM, Vol. 43, No. 5, pp. 67-73, May 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.5
, pp. 67-73
-
-
Sukhatme, G.S.1
Mataric, M.J.2
-
7
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks." IEEE Computer, pp. 54-62, October 2002.
-
(2002)
IEEE Computer
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
8
-
-
0033357103
-
Securing ad-hoc networks
-
L. Zhou and Z. Haas, "Securing Ad-Hoc Networks, IEEE Network Magazine, Vol. 13, No. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
9
-
-
28844477840
-
-
NAI Lab, www.nai.com/nai_labs/asp_set/crypto/crypt_senseit.asp
-
-
-
-
13
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad-hoc networks, in ICNP. 2001, pp. 251-260.
-
(2001)
ICNP
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
14
-
-
15844404847
-
Secure ad-hoc on-demand distance vector (SAODV) routing
-
Message-ID: 3BC17B40.BBF52E09@nokia.com, October 8
-
M. G. Zapata, "Secure ad-hoc on-demand distance vector (SAODV) routing", IETF MANET Mailing List, Message-ID: 3BC17B40.BBF52E09@nokia.com, Available at ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail, October 8, 2001.
-
(2001)
IETF MANET Mailing List
-
-
Zapata, M.G.1
-
15
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zefros, J. Kong, S. Lu, and L. Zhang, "Self-securing ad hoc wireless networks", in Seventh IEEE Symposium on Computers and Communications (ISCC 02), 2002.
-
(2002)
Seventh IEEE Symposium on Computers and Communications (ISCC 02)
-
-
Luo, H.1
Zefros, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
16
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
J. Binkley and W. Trost, "Authenticated ad hoc routing at the link layer for mobile systems", Wireless Networks, vol. 7, no. 2, pp. 139-145, 2001.
-
(2001)
Wireless Networks
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
Trost, W.2
-
17
-
-
0004118143
-
A secure routing protocol for ad-hoc networks
-
Electrical Engineering and Computer Science, August
-
B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad-hoc networks", Electrical Engineering and Computer Science, University of Michigan, Tech. Rep. UM-CS-2001-037, August 2001.
-
(2001)
University of Michigan, Tech. Rep.
, vol.UM-CS-2001-037
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
18
-
-
0345755816
-
Adaptive security for multi-layer ad-hoc networks
-
Wiley Interscience Press
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, "Adaptive security for multi-layer ad-hoc networks", Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002.
-
(2002)
Special Issue of Wireless Communications and Mobile Computing
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
19
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
June
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks", in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 313.
-
(2002)
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)
, pp. 313
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
20
-
-
0004118152
-
Ariadne: "A secure on-demand routing protocol for ad hoc networks"
-
Department of Computer Science. December
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, Ariadne: "A secure on-demand routing protocol for ad hoc networks", Department of Computer Science, Rice University, Tech. Rep. TR01-383. December 2001.
-
(2001)
Rice University, Tech. Rep.
, vol.TR01-383
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
0035789267
-
Secure pebblenets
-
October
-
S. Basagni, K. Herrin, E. Rosti, and D. Bruschi, "Secure pebblenets, in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), October 2001, pp. 156-163.
-
(2001)
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
-
23
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, in Sixth annual ACM/IEEE Internation Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
(2000)
Sixth Annual ACM/IEEE Internation Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
24
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands. Spain: IEEE Computer Society, January
-
S. Buchegger and J.-Y. L. Boudec, "Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks", in Proceedings of the Tenth Euromicro Workshop on Parallel. Distributed and Network-based Processing. Canary Islands. Spain: IEEE Computer Society, January 2002, pp. 403-410.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel. Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
26
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
July
-
A.Perrig, R.Szewczyk, V.Wen, D.Culler and J.D. Tygar, "Spins: Security Protocols for Sensor Networks", Proc. of 7th Int'l Conf. on Mobile Computing and Networks, July 2001.
-
(2001)
Proc. of 7th Int'l Conf. on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
28
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
RFC 2104. "HMAC: Keyed-Hashing for Message Authentication." http://www.ietf.org/rfc/rfc2104.tx
-
RFC
, vol.2104
-
-
-
30
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
October 27-30, Washington D.C., USA
-
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney,"A pairwise key pre-distribution scheme for wireless sensor networks,"Proceedings of the 10th ACM conference on Computer and communication security, October 27-30, 2003, Washington D.C., USA
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
31
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C., October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '031, Washington D.C., October, 2003
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security CCS '031
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
32
-
-
0041472588
-
An energy-efficient hierarchical clustering algorithm for wireless sensor networks
-
April
-
S. Bandyopadhyay and E. Coyle, "An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks, in Proceedings", of IEEE INFOCOM 2003, April 2003.
-
(2003)
Proceedings of IEEE INFOCOM 2003
-
-
Bandyopadhyay, S.1
Coyle, E.2
-
34
-
-
0141621108
-
GS3: Scalable self-configuration and self-healing in wireless sensor networks
-
November 15
-
Hongwei Zhang, Anish Arora, "GS3: Scalable Self-configuration and Self-healing in Wireless Sensor Networks". Computer Networks (Elsevier), 43(4):459-480. November 15, 2003.
-
(2003)
Computer Networks (Elsevier)
, vol.43
, Issue.4
, pp. 459-480
-
-
Zhang, H.1
Arora, A.2
|