-
1
-
-
33751522417
-
Radio jamming attacks against two popular mobile networks
-
H. Lipmaa and H. Pehu-Lehtonen, Eds. Helsinki University of Technology, Fall. [Online]
-
M. Ståhlberg, "Radio jamming attacks against two popular mobile networks," in Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security, H. Lipmaa and H. Pehu-Lehtonen, Eds. Helsinki University of Technology, Fall 2000. [Online]. Available: http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/papers/stahlberg.pdf
-
(2000)
Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security
-
-
Ståhlberg, M.1
-
2
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
4
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
C. Intanagonwiwat, R. Govindan, D.-Estrin, J. Heidemann, and F. Suva, "Directed diffusion for wireless sensor networking," IEEE/ACM Trans. Netw., vol. 11, no. 1, pp. 2-16, 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
D-Estrin3
Heidemann, J.4
Suva, F.5
-
5
-
-
0036343658
-
An energy-efficient MAC protocol for wireless sensor networks
-
USC/Information Sciences Institute. New York, NY, USA: IEEE, June. [Online]
-
W. Ye, J. Heidemann, and D. Estrin, "An Energy-Efficient MAC protocol for Wireless Sensor Networks," in Proc. IEEE Infocom, USC/Information Sciences Institute. New York, NY, USA: IEEE, June 2002, pp. 1567-1576. [Online]. Available: http://www.isi.edu/~johnh/PAPERS/Ye02a.html
-
(2002)
Proc. IEEE Infocom
, pp. 1567-1576
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
6
-
-
4344714071
-
Medium access control with coordinated, adaptive sleeping for wireless sensor networks
-
[Online]
-
_, "Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks," IEEE/ACM Transactions on Nethworking, vol. 12, no. 3, pp. 493-506, 2003. [Online]. Available: http://www.isi.edu/~weiye/pub/ smac_ton.pdf
-
(2003)
IEEE/ACM Transactions on Nethworking
, vol.12
, Issue.3
, pp. 493-506
-
-
-
7
-
-
20344392154
-
Benchmarking block ciphers for wireless sensor networks (extended abstract)
-
IEEE Computer Society Press, Oct. [Online]
-
Y. Law, J. Doumen, and P. Hartel, "Benchmarking block ciphers for wireless sensor networks (extended abstract)," in 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004), IEEE Computer Society Press, Oct. 2004. [Online]. Available: http://wwwhome.cs.utwente.nl/ ~ywlaw/pub/law04benchmarking.pdf
-
(2004)
1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004)
-
-
Law, Y.1
Doumen, J.2
Hartel, P.3
-
9
-
-
33745940660
-
-
Web page, May. [Online]
-
M. Mysore, M. Golan, E. Osterweil, D. Estrin, and M. Rahimi, "TinyDiffusion in the Extensible Sensing System at the James Reserve," Web page, May 2003. [Online]. Available: http://www,cens.ucla.edu/~mmysore/ Design/OPP
-
(2003)
TinyDiffusion in the Extensible Sensing System at the James Reserve
-
-
Mysore, M.1
Golan, M.2
Osterweil, E.3
Estrin, D.4
Rahimi, M.5
-
10
-
-
0042014530
-
Random waypoint considered harmful
-
Apr.
-
J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful," in Proc. IEEE INFOCOM, vol. 2, Apr. 2003, pp. 1312-1321.
-
(2003)
Proc. IEEE INFOCOM
, vol.2
, pp. 1312-1321
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
-
11
-
-
26644458303
-
AI-LMAC: An adaptive, information-centric and lightweight MAC protocol for wireless sensor networks
-
IEEE Computer Society Press
-
S. Chatterjea, L. van Hoesel, and P. Havinga, "AI-LMAC: An Adaptive, Information-centric and Lightweight MAC Protocol for Wireless Sensor Networks," in Proceedings of the DEST International Workshop on Signal Processing for Sensor Networks. IEEE Computer Society Press, 2004.
-
(2004)
Proceedings of the DEST International Workshop on Signal Processing for Sensor Networks
-
-
Chatterjea, S.1
Van Hoesel, L.2
Havinga, P.3
-
12
-
-
33745957963
-
-
Datasheet. [Online]
-
RF Monolithics, Inc., "TR1001: 868.35 MHz Hybrid Transceiver," Datasheet, 2002. [Online]. Available: http://www.rfm.com/products/data/tr1001. pdf
-
(2002)
TR1001: 868.35 MHz Hybrid Transceiver
-
-
-
15
-
-
27644529341
-
Hardware design experiences in ZebraNet
-
ACM Press
-
P. Zhang, C. M. Sadler, S. A. Lyon, and M. Martonosi, "Hardware design experiences in ZebraNet," in 2nd International Conference on Embedded Networked Sensor Systems. ACM Press, 2004, pp. 227-238.
-
(2004)
2nd International Conference on Embedded Networked Sensor Systems
, pp. 227-238
-
-
Zhang, P.1
Sadler, C.M.2
Lyon, S.A.3
Martonosi, M.4
-
16
-
-
33746822588
-
Low power DOS attacks in data wireless LANs and countermeasures
-
[Online]
-
G. Lin and G: Noubir, "Low Power DOS Attacks in Data Wireless LANs and Countermeasures," Northeastern University, Tech. Rep., 2002. [Online], Available: http://www.ccs.neu.edu/home/noubir/publications/LN02a.pdf
-
(2002)
Northeastern University, Tech. Rep.
-
-
Lin, G.1
Noubir, G.2
-
17
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
ser. LNCS. Springer-Verlag. [Online]
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Proceedings of The 7th International Workshop on Security Protocols, ser. LNCS, vol. 1796. Springer-Verlag, 2000, pp. 172-194. [Online]. Available: http://www.c1.cam.ac. uk/~fms27/papers/ duckling.pdf
-
(2000)
Proceedings of the 7th International Workshop on Security Protocols
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
18
-
-
33645628961
-
Jamming analysis of MAC protocols
-
[Online]
-
R. Negi and A. Perrig, "Jamming analysis of MAC protocols," Carnegie Mellon Technical Memo, 2003. [Online]. Available: http://www.ece.cmu. edu/~negi/publications/preprints/csmajam.ps
-
(2003)
Carnegie Mellon Technical Memo
-
-
Negi, R.1
Perrig, A.2
-
19
-
-
84948142128
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
-
ser. LNCS. Springer-Verlag
-
J. Konorski, "Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations," in NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, ser. LNCS, vol. 2345. Springer-Verlag, 2002, pp. 1141-1146.
-
(2002)
NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
, vol.2345
, pp. 1141-1146
-
-
Konorski, J.1
-
20
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
IEEE Computer Society Press
-
P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," in Int. Conf. on Dependable Systems and Networks (DSN'03). IEEE Computer Society Press, 2003, pp. 173-182.
-
(2003)
Int. Conf. on Dependable Systems and Networks (DSN'03)
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
21
-
-
14844282678
-
On cheating in CSMA/CA ad hoc networks
-
M. Čagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Cheating in CSMA/CA Ad Hoc Networks," EPFL-IC, Tech. Rep. IC/2004/27, 2004.
-
(2004)
EPFL-IC, Tech. Rep.
, vol.IC-2004-27
-
-
Čagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
|