-
1
-
-
0036688074
-
Wireless sensor networks: A survey
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct.
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
3
-
-
11144340927
-
Designing secure sensor network
-
Dec.
-
E. Shi and A. Perrig, "Designing secure sensor network," IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, Dec. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
4
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
5
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May-June
-
Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 28-39, May-June 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
6
-
-
11244266362
-
Secure media access control (MAC) in wireless sensor networks: Intrusion detections and countermeasures
-
Barcelona, Spain, Sept.
-
Q. Ren and Q. Liang, "Secure media access control (MAC) in wireless sensor networks: Intrusion detections and countermeasures," in Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004, vol. 4, Barcelona, Spain, Sept. 2004, pp. 3025-3029.
-
(2004)
Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004
, vol.4
, pp. 3025-3029
-
-
Ren, Q.1
Liang, Q.2
-
7
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
Anaheim, CA, Oct.
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of service attacks at the MAC layer in wireless ad hoc networks," in Proc. Military Communications Conference MILCOM 2002, Anaheim, CA, Oct. 2002.
-
(2002)
Proc. Military Communications Conference MILCOM 2002
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
8
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, Nov.
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. Second ACM Conference on Embedded Networked Sensor Systems SenSys 2004, Baltimore, MD, Nov. 2004, pp. 162-175.
-
(2004)
Proc. Second ACM Conference on Embedded Networked Sensor Systems SenSys 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
80054071642
-
Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems
-
San Jose, CA, Oct.
-
Y. Zhou, S. Wu, and S. M. Nettles, "Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems," in Proc. BroadWISE 2004: Workshop on Broadband Wireless Services and Applications, San Jose, CA, Oct. 2004, pp. 22-88.
-
(2004)
Proc. BroadWISE 2004: Workshop on Broadband Wireless Services and Applications
, pp. 22-88
-
-
Zhou, Y.1
Wu, S.2
Nettles, S.M.3
-
10
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, Aug.
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. 12th USENIX Security Symposium, Washington, DC, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
11
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
Berkeley, CA, Apr.
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), Berkeley, CA, Apr. 2004, pp. 259-268.
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
13
-
-
0346290927
-
-
New York, NY: IEEE Press
-
J. A. Gutiérrez, E. H. Callaway, Jr., and R. L. Barrett, Jr., Low-Rate Wireless Personal Area Networks. New York, NY: IEEE Press, 2004.
-
(2004)
Low-rate Wireless Personal Area Networks
-
-
Gutiérrez, J.A.1
Callaway Jr., E.H.2
Barrett Jr., R.L.3
-
14
-
-
19544394976
-
Analysis of 802.15.4 beacon enabled PAN in saturation mode
-
San Jose, CA, July
-
J. Mišić, S. Shan, and V. B. Mišić, "Analysis of 802.15.4 beacon enabled PAN in saturation mode," in Proc. SPECTS 2004, San Jose, CA, July 2004.
-
(2004)
Proc. SPECTS 2004
-
-
Mišić, J.1
Shan, S.2
Mišić, V.B.3
-
15
-
-
33750292888
-
Access delay and throughput for uplink transmissions in ieee 802.15.4 pan
-
to appear
-
J. Mišić and V. B. Mišić, "Access delay and throughput for uplink transmissions in ieee 802.15.4 pan," Elsevier Computer Communications, vol. to appear, 2005.
-
(2005)
Elsevier Computer Communications
-
-
Mišić, J.1
Mišić, V.B.2
-
16
-
-
2442538308
-
-
San Jose, CA
-
RSoft Design, Inc., Artifex v.4.4.2, San Jose, CA, 2003.
-
(2003)
Artifex V.4.4.2
-
-
|