-
3
-
-
34547334331
-
-
SmartRF CC2420 Datasheet (rev 1.3), 2005-10-03. http://www.chipcon.com/ files/CC2420_Data_Sheet_1_3.pdf.
-
SmartRF CC2420 Datasheet (rev 1.3), 2005-10-03. http://www.chipcon.com/ files/CC2420_Data_Sheet_1_3.pdf.
-
-
-
-
4
-
-
84871983001
-
-
TelosB mote platform. http://www.xbow.com/Products/Product_pdf_files/ Wireless.pdf/TelosB_Datasheet.pdf.
-
TelosB mote platform
-
-
-
6
-
-
0037086890
-
Wireless sensor networks: A survey Computer
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey Computer Networks, 38(4):393-422, 2002.
-
(2002)
Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
7
-
-
0034511278
-
Clock synchronization with faults and recoveries
-
B. Barak, S. Halevi, A. Herzberg, and D. Naor. Clock synchronization with faults and recoveries. In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, pages 133-142, 2000.
-
(2000)
Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing
, pp. 133-142
-
-
Barak, B.1
Halevi, S.2
Herzberg, A.3
Naor, D.4
-
8
-
-
84858246079
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc. Wireless sensor networks. http://www.xbow.com/ Products/Wireless_Sensor_Networks.htm.
-
Wireless sensor networks
-
-
-
9
-
-
0029215599
-
Dynamic fault-tolerant clock synchronization
-
D. Dolev, J. Y. Halpern, B. Simons, and R. Strong. Dynamic fault-tolerant clock synchronization. Journal of the ACM, 42(1):143-185, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.1
, pp. 143-185
-
-
Dolev, D.1
Halpern, J.Y.2
Simons, B.3
Strong, R.4
-
11
-
-
84978422134
-
Fine-grained network time synchronization using reference broadcasts
-
J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. A CM SIGOPS Operating Systems Review, 36:147-163, 2002.
-
(2002)
A CM SIGOPS Operating Systems Review
, vol.36
, pp. 147-163
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
12
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
September
-
S. Ganeriwal, S. Capkun, C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), pages 97-106, September 2005.
-
(2005)
Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005)
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.3
Srivastava, M.B.4
-
14
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
June
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler. The nesC language: A holistic approach to networked embedded systems. In Proceedings of Programming Language Design and Implementation (PLDI 2003), June 2003.
-
(2003)
Proceedings of Programming Language Design and Implementation (PLDI 2003)
-
-
Gay, D.1
Levis, P.2
von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
15
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
August
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), August 2004.
-
(2004)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
16
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K. S. J. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93-104, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
18
-
-
0003597249
-
Wormhole detection in wireless ad hoc networks
-
Technical Report TR01-384, Department of Computer Science, Rice University, Dec
-
Y. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, Dec 2001.
-
(2001)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
19
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
April
-
Y.C. Hu, A. Perrig, and D.B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003, April 2003.
-
(2003)
Proceedings of INFOCOM 2003
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
34547267202
-
-
IEEE Computer Society. IEEE 802.15.4: Ieee standard for information technology - telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/ getieee802/download/ 802.15.4-2003.pdf, October 2003.
-
IEEE Computer Society. IEEE 802.15.4: Ieee standard for information technology - telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/ getieee802/download/ 802.15.4-2003.pdf, October 2003.
-
-
-
-
22
-
-
0021898159
-
Synchronizing clocks in the presence of faults
-
L. Lamport and P.M. Melliar-Smith. Synchronizing clocks in the presence of faults. Journal of the ACM, 32(1):52-78, 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.1
, pp. 52-78
-
-
Lamport, L.1
Melliar-Smith, P.M.2
-
23
-
-
8344268566
-
Global clock synchronization in sensor networks
-
March
-
Q. Li and D. Rus. Global clock synchronization in sensor networks. In Proceedings of IEEE INFOCOM 2004, pages 214-226, March 2004.
-
(2004)
Proceedings of IEEE INFOCOM 2004
, pp. 214-226
-
-
Li, Q.1
Rus, D.2
-
24
-
-
34547294230
-
-
D. Liu, P. Ning, and R. Li. TinyKeyMan: Key management for sensor networks. http://discovery.csc.ncsu.edu/software/TinyKeyMan/.
-
D. Liu, P. Ning, and R. Li. TinyKeyMan: Key management for sensor networks. http://discovery.csc.ncsu.edu/software/TinyKeyMan/.
-
-
-
-
26
-
-
27644533289
-
The flooding time synchronization protocol
-
Nov
-
M. Maroti, B. Kusy, G. Simon, and A. Ledeczi. The flooding time synchronization protocol. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys'04), pages 39-49, Nov 2004.
-
(2004)
Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys'04)
, pp. 39-49
-
-
Maroti, M.1
Kusy, B.2
Simon, G.3
Ledeczi, A.4
-
27
-
-
0026242010
-
Internet time synchronization: The network time protocol
-
D.L. Mills. Internet time synchronization: The network time protocol. IEEE Transactions on Communications, 39(10):1482-1493, 1991.
-
(1991)
IEEE Transactions on Communications
, vol.39
, Issue.10
, pp. 1482-1493
-
-
Mills, D.L.1
-
36
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, pages 521-534, July 2001.
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
39
-
-
0023384521
-
Optimal clock synchronization
-
T. K. Srikanth and S. Toueg. Optimal clock synchronization. Journal of the ACM, 34(3):626-645, 1987.
-
(1987)
Journal of the ACM
, vol.34
, Issue.3
, pp. 626-645
-
-
Srikanth, T.K.1
Toueg, S.2
-
40
-
-
27644548026
-
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
-
July-September
-
K. Sun, P. Ning, and C. Wang. Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(3): 177-189, July-September 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.2
, Issue.3
, pp. 177-189
-
-
Sun, K.1
Ning, P.2
Wang, C.3
|