-
1
-
-
11144302585
-
Wireless sensor networks
-
June
-
Culler, D. E and Hong, W., "Wireless Sensor Networks", Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
-
(2004)
Communication of the ACM
, vol.47
, Issue.6
, pp. 30-33
-
-
Culler, D.E.1
Hong, W.2
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., "Wireless Sensor Networks: A Survey", Computer Networks, 38, 2002, pp. 393-422.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
29844455855
-
Research and analysis on routing protocols for wireless sensor networks
-
27-30 May
-
Dai, S, Jing, X, and Li, L, "Research and analysis on routing protocols for wireless sensor networks", Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.
-
(2005)
Proc. International Conference on Communications, Circuits and Systems
, vol.1
, pp. 407-411
-
-
Dai, S.1
Jing, X.2
Li, L.3
-
4
-
-
84881272457
-
A framework for providing E-services to the rural areas using wireless ad hoc and sensor networks
-
to appear in
-
Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., "A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks", to appear in IEEE ICNEWS 2006.
-
IEEE ICNEWS 2006
-
-
Pathan, A.-S.K.1
Islam, H.K.2
Sayeed, S.A.3
Ahmed, F.4
Hong, C.S.5
-
5
-
-
3142515935
-
Security for sensor networks
-
Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., "Security for Sensor Networks", CADIP Research Symposium, 2002, available at, http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf
-
(2002)
CADIP Research Symposium
-
-
Undercoffer, J.1
Avancha, S.2
Joshi, A.3
Pinkston, J.4
-
6
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., "SPINS: Security Protocols for Sensor Networks", Wireless Networks, vol. 8, no. 5, 2002, pp. 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
7
-
-
84883897746
-
A low-energy key management protocol for wireless sensor networks
-
(ISCC 2003).
-
Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., "A Low-Energy Key Management Protocol for Wireless Sensor Networks", Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 - 340.
-
(2003)
Proc. Eighth IEEE International Symposium on Computers and Communication
, vol.1
, pp. 335-340
-
-
Jolly, G.1
Kuscu, M.C.2
Kokate, P.3
Younis, M.4
-
8
-
-
0036116743
-
PicoRadios for wireless sensor networks: The next challenge in ultra-low power design
-
3-7 Feb.
-
Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M., and Tuan, T., "PicoRadios for wireless sensor networks: the next challenge in ultra-low power design" 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 201.
-
(2002)
2002 IEEE International Solid-State Circuits Conference (ISSCC 2002)
, vol.1
, pp. 200201
-
-
Rabaey, J.M.1
Ammer, J.2
Karalar, T.3
Li, S.4
Otis, B.5
Sheets, M.6
Tuan, T.7
-
9
-
-
0004083621
-
-
Master's Thesis, Electrical Engineering and Computer Science Department, UC Berkeley
-
Hollar, S, "COTS Dust", Master's Thesis, Electrical Engineering and Computer Science Department, UC Berkeley, 2000.
-
(2000)
COTS Dust
-
-
Hollar, S.1
-
10
-
-
36349031034
-
Throughput analysis of WEP Security in ad hoc sensor networks
-
September 26-28, Dubai
-
Saleh, M. and Khatib, I. A., "Throughput Analysis of WEP Security in Ad Hoc Sensor Networks", Proc. The Second International Conference on Innovations in Information Technology (IIT'05), September 26-28, Dubai, 2005.
-
(2005)
Proc. the Second International Conference on Innovations in Information Technology (IIT'05)
-
-
Saleh, M.1
Khatib, I.A.2
-
11
-
-
85055811894
-
A cautionary note on image downgrading in computer security applications
-
San Antonio, December
-
Kurak, C and McHugh, J, "A Cautionary Note on Image Downgrading in Computer Security Applications", Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, 1992, pp. 153-159.
-
(1992)
Proceedings of the 8th Computer Security Applications Conference
, pp. 153-159
-
-
Kurak, C.1
McHugh, J.2
-
12
-
-
0034593277
-
A new paradigm hidden in steganography
-
Ballycotton, County Cork, Ireland
-
Mokowitz, I. S., Longdon, G. E., and Chang, L., "A New Paradigm Hidden in Steganography", Proc. of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, 2001, pp. 41 - 50.
-
(2001)
Proc. of the 2000 Workshop on New Security Paradigms
, pp. 41-50
-
-
Mokowitz, I.S.1
Longdon, G.E.2
Chang, L.3
-
13
-
-
84859938870
-
Steganalysis on BPCS steganography
-
July 3-4, Japan
-
Kim, C. H., O, S. C., Lee, S., Yang, W. I., and Lee, H-W., "Steganalysis on BPCS Steganography", Pacific Rim Workshop on Digital Steganography (STEG'03), July 3-4, Japan , 2003.
-
(2003)
Pacific Rim Workshop on Digital Steganography (STEG'03)
-
-
Kim, C.H.1
O, S.C.2
Lee, S.3
Yang, W.I.4
Lee, H.-W.5
-
14
-
-
12344327225
-
On handling QoS traffic in wireless sensor networks
-
5-8 January, 2004
-
Younis, M., Akkaya, K., Eltoweissy, M., and Wadaa, A., "On handling QoS traffic in wireless sensor networks", Proc. of the 37th Annual Hawaii International Conference on System Sciences, 2004, 5-8 January, 2004, pp. 292-301.
-
(2004)
Proc. of the 37th Annual Hawaii International Conference on System Sciences
, pp. 292-301
-
-
Younis, M.1
Akkaya, K.2
Eltoweissy, M.3
Wadaa, A.4
-
15
-
-
0842332423
-
Channel synthesized modulation employing singular vector for secured access on physical layer
-
1-5 December
-
Orihashi, M., Nakagawa, Y., Murakami, Y., and Kobayashi, K., "Channel synthesized modulation employing singular vector for secured access on physical layer", IEEE GLOBECOM 2003, Volume 3, 1-5 December, 2003, pp. 1226-1230.
-
(2003)
IEEE GLOBECOM 2003
, vol.3
, pp. 1226-1230
-
-
Orihashi, M.1
Nakagawa, Y.2
Murakami, Y.3
Kobayashi, K.4
-
16
-
-
0033357103
-
Securing ad hoc networks
-
Nov.-Deo.
-
Zhou, L. and Haas, Z. J., "Securing ad hoc networks", IEEE Network, Volume 13, Issue 6, Nov.-Deo. 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
17
-
-
0041629620
-
Securing mobile ad hoc networks a motivational approach
-
Strulo, B., Farr, J., and Smith, A., "Securing Mobile Ad hoc Networks A Motivational Approach", BT Technology Journal, Volume 21, Issue 3, 2003, pp. 81 - 89.
-
(2003)
BT Technology Journal
, vol.21
, Issue.3
, pp. 81-89
-
-
Strulo, B.1
Farr, J.2
Smith, A.3
-
18
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
February
-
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, Volume 11, Issue 1, February 2004, pp. 38-47.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
19
-
-
15844426139
-
An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting
-
Karachi, 31 July
-
Pathan, A-S. K., Alam, M., Monowar, M., and Rabbi, F., "An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting", Proc. IEEE E-Tech, Karachi, 31 July, 2004, pp. 97-100.
-
(2004)
Proc. IEEE E-Tech
, pp. 97-100
-
-
Pathan, A.-S.K.1
Alam, M.2
Monowar, M.3
Rabbi, F.4
-
20
-
-
58049101580
-
Analyzing interaction between distributed denial of service attacks and mitigation technologies
-
22-24 April
-
Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., "Analyzing interaction between distributed denial of service attacks and mitigation technologies", Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26-36.
-
(2003)
Proc. DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 26-36
-
-
Blackert, W.J.1
Gregg, D.M.2
Castner, A.K.3
Kyle, E.M.4
Hom, R.L.5
Jokerst, R.M.6
-
21
-
-
5044235325
-
An IP traceback mechanism for reflective DoS attacks
-
2-5 May
-
Wang, B-T. and Schulzrinne, H., "An IP traceback mechanism for reflective DoS attacks", Canadian Conference on Electrical and Computer Engineering, Volume 2, 2-5 May 2004, pp. 901 - 904.
-
(2004)
Canadian Conference on Electrical and Computer Engineering
, vol.2
, pp. 901-904
-
-
Wang, B.-T.1
Schulzrinne, H.2
-
24
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
ACM
-
Newsome, J., Shi, E., Song, D, and Perrig, A, "The sybil attack in sensor networks: analysis & defenses", Proc. of the third international symposium on Information processing in sensor networks, ACM, 2004, pp. 259 - 268.
-
(2004)
Proc. of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
26
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
Karlof, C. and Wagner, D., "Secure routing in wireless sensor networks: Attacks and countermeasures", Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, September 2003, pp. 293-315.
-
(2003)
Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
27
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
30 March-3 April
-
Hu, Y.-C., Perrig, A., and Johnson, D.B., "Packet leashes: a defense against wormhole attacks in wireless networks", Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 - 1986.
-
(2003)
Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003
, vol.3
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
28
-
-
33745925035
-
Secret instantiation in adhoc networks
-
May
-
Kulkarni, S. S., Gouda, M. G., and Arora, A., "Secret instantiation in adhoc networks," Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, May 2005, pp. 1-15.
-
(2005)
Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks
, pp. 1-15
-
-
Kulkarni, S.S.1
Gouda, M.G.2
Arora, A.3
-
29
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. S., and Varshney, P. K., "A pairwise key pre-distribution scheme for wireless sensor networks", Proc. of the 10th ACM conference on Computer and communications security, 2003, pp. 42-51.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
30
-
-
33750940367
-
-
Oniz, C. C, Tasci, S. E, Savas, E., Eroetin, O., and Levi, A, "SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks", from http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf
-
SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks
-
-
Oniz, C.C.1
Tasci, S.E.2
Savas, E.3
Eroetin, O.4
Levi, A.5
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
Wood, A. D. and Stankovic, J. A., "Denial of Service in Sensor Networks", Computer, Volume 35, Issue 10, Oct. 2002 pp. 54 - 62.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
32
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
10-12 June 2002
-
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., and Srivastava, M.B., "On communication security in wireless ad-hoc sensor networks", 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002, 10-12 June 2002, pp. 139-144.
-
(2002)
11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
33
-
-
17144429277
-
Statistical en-route filtering of injected false data in sensor networks
-
April
-
Ye, F., Luo, H., Lu, S, and Zhang, L, "Statistical en-route filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Volume 23, Issue 4, April 2005, pp. 839 - 850.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
34
-
-
44649084087
-
Design space exploration for energy-efficient secure sensor network
-
17-19 July 2002
-
Yuan, L. and Qu, G., "Design space exploration for energy-efficient secure sensor network", Proc. The IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2002, 17-19 July 2002, pp. 88 - 97.
-
(2002)
Proc. the IEEE International Conference on Application-Specific Systems, Architectures and Processors
, pp. 88-97
-
-
Yuan, L.1
Qu, G.2
-
35
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA
-
Karlof, C., Sastry, N., and Wagner, D., "TinySec: a link layer security architecture for wireless sensor networks", Proc. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, 2004, pp. 162-175.
-
(2004)
Proc. of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
36
-
-
80855150925
-
Energy-aware routing in cluster-based sensor networks
-
1-16 Oct.
-
Younis, M., Youssef, M., and Arisha, K., "Energy-aware routing in cluster-based sensor networks" Proc. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 1-16 Oct. 2002 pp. 129 - 136.
-
(2002)
Proc. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems
, pp. 129-136
-
-
Younis, M.1
Youssef, M.2
Arisha, K.3
-
38
-
-
0348195762
-
JAM: A jammed-area mapping service for sensor networks
-
RTSS 2003
-
Wood, A.D., Stankovic, J.A., and Son, S.H., "JAM: A Jammed-Area Mapping Service for Sensor Networks", 24th IEEE Real-Time Systems Symposium, RTSS 2003, pp. 286-297.
-
24th IEEE Real-time Systems Symposium
, pp. 286-297
-
-
Wood, A.D.1
Stankovic, J.A.2
Son, S.H.3
-
40
-
-
84926294459
-
Routing security in sensor network: Hello flood attack and defense
-
2-4 January, Dhaka
-
Hamid, M. A., Rashid, M-O., and Hong, C. S., "Routing Security in Sensor Network: Hello Flood Attack and Defense", to appear in IEEE ICNEWS 2006, 2-4 January, Dhaka.
-
IEEE ICNEWS 2006
-
-
Hamid, M.A.1
Rashid, M.-O.2
Hong, C.S.3
-
41
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California, May 11-14
-
Chan, H, Perrig, A., and Song, D., "Random key predistribution schemes for sensor networks", In IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
42
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
18-22 November
-
Eschenauer, L. and Gligor, V. D., "A key-management scheme for distributed sensor networks", Proc. ACM CCS'02, 18-22 November 2002, pp. 41-47.
-
(2002)
Proc. ACM CCS'02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
43
-
-
33750932934
-
Using REWARD to detect team black-hole attacks in wireless sensor networks
-
20-21 June, Stockholm, Sweden
-
Karakehayov, Z., "Using REWARD to detect team black-hole attacks in wireless sensor networks", in Workshop on Real-World Wireless Sensor Networks (REALWSN'05), 20-21 June, 2005, Stockholm, Sweden.
-
(2005)
Workshop on Real-World Wireless Sensor Networks (REALWSN'05)
-
-
Karakehayov, Z.1
|