-
1
-
-
0012979825
-
Taxonomy of sensor network communication models
-
Apr
-
S. Tilak, N. B. Abu-Ghazaleh and W. Heinzelman, "Taxonomy of Sensor Network Communication Models", Mobile Computing and Communication Review, Vol. 6(2): 1-8, Apr 2002
-
(2002)
Mobile Computing and Communication Review
, vol.6
, Issue.2
, pp. 1-8
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
2
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
Ian F. Akyildiz, Weilian Su, Yogesh S., and Erdal Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, Aug 2002
-
(2002)
IEEE Communications Magazine
-
-
Akyildiz, I.F.1
Weilian, S.2
Yogesh, S.3
Cayirci, E.4
-
3
-
-
33745650833
-
The holes problem in wireless sensor networks: A survey
-
Apr
-
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha, 'The holes problem in wireless sensor networks: a survey", ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 9(2), Apr 2005, pp. 4-18
-
(2005)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.9
, Issue.2
, pp. 4-18
-
-
Ahmed, N.1
Kanhere, S.S.2
Jha, S.3
-
5
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct
-
H. Chan and A Perrig. "Security and Privacy in Sensor Networks", IEEE Computer, 36(10), Oct 2003, pp. 103-105.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
6
-
-
0036793924
-
Denial of Service in sensor network
-
Oct
-
Anthonay D. Wood, John A. Stankovic, "Denial of Service in sensor network", IEEE Computer, 35(10), Oct 2002, pp. 54-62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
7
-
-
4243082091
-
Security in wireless sensor networks
-
Jun
-
Adrain Perrig, John Stankovic, and David Wagner, "Security in wireless sensor networks", Communications of ACM, Vol 47(6), Jun 2004, pp. 53-57
-
(2004)
Communications of ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, Aug
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security protocols for sensor networks", proceedings of 7th annual international conference on Mobile computing and networking, Rome, Italy, Aug 2001, pp 188-189
-
(2001)
Proceedings of 7th Annual International Conference on Mobile Computing and Networking
, pp. 188-189
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
9
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, Nov
-
Chris Karlof, Naveen Sastry, and David Wagner, "TinySec: a link layer security architecture for wireless sensor networks", proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, Nov 2004, pp 162-175
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
17644390287
-
Towards a new paradigm for securing wireless sensor networks
-
Ascona, Switzerland, Aug
-
K. Jones, A.Wadaa, S. Oladu, L. Wson, and M. Etoweissy, 'Towards a new paradigm for securing wireless sensor networks", proceedings of the 2003 workshop on New security paradigms, Ascona, Switzerland, Aug 2003, pp 115-121
-
(2003)
Proceedings of the 2003 Workshop on New Security Paradigms
, pp. 115-121
-
-
Jones, K.1
Wadaa, A.2
Oladu, S.3
Wson, L.4
Etoweissy, M.5
-
11
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks'
-
Aug
-
Taejoon Park, and Kang G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks' ACM Transactions on Embedded Computing Systems, Vol. 3(3), Aug 2004, Pages 634-660
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
12
-
-
10044284351
-
LEAP: Efficient security mechanism for large-scale distributed sensor networks
-
Washington, USA
-
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, "LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks", proceedings of the 10th ACM conference on Computer and communications security, Washington, USA, 2003, pp. 62-72
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Sencun, Z.1
Setia, S.2
Jajodia, S.3
-
13
-
-
33845412854
-
Security for sensor networks
-
Baltimore, MD, Oct
-
Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi, and John Pinkston, "Security for Sensor Networks", proceeding of 2002 CADIP Research Symposium, Baltimore, MD, Oct 2002.
-
(2002)
Proceeding of 2002 CADIP Research Symposium
-
-
Undercoffer, J.1
Avancha, S.2
Joshi, A.3
Pinkston, J.4
-
14
-
-
4444346335
-
Wireless Sensor Networks: Leveraging the virtual infrastructure
-
July
-
Stephan Olariu, Ashraf Wada, Larry Wilso, and Mohamed Eltoweissy, "Wireless Sensor Networks: Leveraging the virtual infrastructure", IEEE Networks, vol. 18(4), July 2004, pp. 51-56
-
(2004)
IEEE Networks
, vol.18
, Issue.4
, pp. 51-56
-
-
Olariu, S.1
Wada, A.2
Wilso, L.3
Eltoweissy, M.4
-
15
-
-
33845468232
-
Connecting sensor networks with TCP/IP network
-
Harbin, China, Jan 16-18
-
Shu Lei, Wang Jin, Xu Hui, Jinsung Cho, and Sungyoung Lee, "Connecting Sensor Networks with TCP/IP Network", International Workshop on Sensor Networks (IWSN'06) in conjunction with APWeb 2006, Harbin, China, Jan 16-18, 2006
-
(2006)
International Workshop on Sensor Networks (IWSN'06) in Conjunction with APWeb 2006
-
-
Shu, L.1
Wang, J.2
Xu, H.3
Jinsung, C.4
Sungyoung, L.5
-
17
-
-
0034445661
-
System architecture directions for networked sensors
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister, "System architecture directions for networked sensors," proceedings of the 9th international conference on Architectural support for programming languages and operating systems, 2000, pp. 93-104
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
18
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Boston, USA
-
B Karp, HT Kung, "GPSR: greedy perimeter stateless routing for wireless networks", proceedings of the 6th annual international conference on Mobile computing and networking, Boston, USA, 2000, pp. 243-254
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
19
-
-
0003405130
-
-
Univ. California, Los Angeles, Tech. Rep. UCLA/CSD-TR-01-0023
-
Yan Yu, R Govindan, D Estrin, "Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks," Univ. California, Los Angeles, Tech. Rep. UCLA/CSD-TR-01-0023, 2001.
-
(2001)
Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
-
-
Yan, Y.1
Govindan, R.2
Estrin, D.3
-
20
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
Oct
-
Wendi B. Heinzelman, Anantha P. Chandrakasan, and Hari Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks", IEEE Transactions On Wireless communications, vol. 1(4), Oct 2002, pp. 660-670
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
22
-
-
0036739784
-
Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
-
Sep
-
Benjie Chen, Kyle Jamieson, Hari Balakrishnan and Robert Morris, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks", Wireless Networks, Vol 8(5), Sep 2002, pp. 481-494
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 481-494
-
-
Benjie, C.1
Jamieson, K.2
Balakrishnan, H.3
Morris, R.4
-
23
-
-
0034772133
-
Geography informed energy conservation for ad hoc routing
-
July
-
Y. Xu, J. Heidemann, and D. Estrin, "Geography Informed Energy Conservation for Ad Hoc Routing", Proceedings of the seventh annual international conference on Mobile computing and networking (MobiCom '01), July 2001, pp. 70-84
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom '01)
, pp. 70-84
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
24
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Ad Hoc Networks, vol 1(1), 2003, pp. 293-315
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
26
-
-
33750283917
-
-
Technical Report MIST-TR-2005-007, July
-
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, "Wireless sensor network security: A Survey", Technical Report MIST-TR-2005-007, July, 2005
-
(2005)
Wireless Sensor Network Security: A Survey
-
-
Walters, J.P.1
Zhengqiang, L.2
Weisong, S.3
Chaudhary, V.4
-
29
-
-
0036085965
-
Design of a role based trust management framework
-
Oakland
-
N. Li, J. Mitchell, and W. Winsborough, "Design of a role based trust management framework", Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 2002, pp. 114-130
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
|