-
3
-
-
33845583903
-
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
-
C. Baslie, M. Gupta, Z. Kalbarczyk, and R. K. Iyer. An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks. In Performance and Dependability Symposium. International Conference, on Dependable Systems and Networks, 2006.
-
(2006)
Performance and Dependability Symposium. International Conference, on Dependable Systems and Networks
-
-
Baslie, C.1
Gupta, M.2
Kalbarczyk, Z.3
Iyer, R.K.4
-
4
-
-
0034291601
-
-
GPS-less Low-Cost Outdoor Localization for Very Small Devices. IEEE Personal Communication
-
N. Bulusu, J. Heidemann, and D. Estrin. GPS-less Low-Cost Outdoor Localization for Very Small Devices. IEEE Personal Communication, 2000.
-
(2000)
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
7
-
-
73349099259
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
Technical report, CU-CS-987-04
-
J. Deng, R. Han, and S. Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. Technical report, CU-CS-987-04, 2004.
-
(2004)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
10
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263-270, 1999.
-
(1999)
Mobile Computing and Networking
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.S.3
Kumar, S.4
-
11
-
-
1542329081
-
Range-Free Localization Schemes for Large Scale Sensor Networks
-
T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher. Range-Free Localization Schemes for Large Scale Sensor Networks. In MobiCom'03, 2003.
-
(2003)
MobiCom'03
-
-
He, T.1
Huang, C.2
Blum, B.3
Stankovic, J.4
Abdelzaher, T.5
-
12
-
-
27644599432
-
ARRIVE: Algorithm for Robust Routing in Volatile Environments
-
Technical Report UCB//CSD-03-1233, University of California, at Berkeley
-
C. Karlof, Y. Li, and J. Polastre. ARRIVE: Algorithm for Robust Routing in Volatile Environments. Technical Report UCB//CSD-03-1233, University of California, at Berkeley, 2003.
-
(2003)
-
-
Karlof, C.1
Li, Y.2
Polastre, J.3
-
13
-
-
32144459886
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
C. Karlof, N. Sastry, and D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In ACM SenSys, 2004.
-
(2004)
ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
C. Karlof and D. Wagner. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier's AdHoc Networks Journal, 1(2-3), 2003.
-
(2003)
Elsevier's AdHoc Networks Journal
, vol.1
, Issue.2-3
-
-
Karlof, C.1
Wagner, D.2
-
15
-
-
11244264140
-
SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
-
L. Lazos and R. Poovendran. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. In the ACM Workshop on Wireless Security, 2003.
-
(2003)
the ACM Workshop on Wireless Security
-
-
Lazos, L.1
Poovendran, R.2
-
16
-
-
33144467903
-
-
D. Liu, P. Ning, and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In IPSN '05, April 2005.
-
D. Liu, P. Ning, and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In IPSN '05, April 2005.
-
-
-
-
18
-
-
0036986465
-
Wireless Sensor Networks foiHabitat Monitoring
-
A. Malnwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson. Wireless Sensor Networks foiHabitat Monitoring. In WSNA, 2002.
-
(2002)
WSNA
-
-
Malnwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
19
-
-
20344381294
-
A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
-
D. J. Malan, M. Welsh, and M. Smith. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In IEEE SECON, 2004.
-
(2004)
IEEE SECON
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.3
-
20
-
-
34547285929
-
-
R. Nagpal. Organizing a Global Coordinate System from Local Information on an Amorphous Computer. Technical Report A.I. Memo 1666, MIT A.I. Laboratory, August 1999.
-
R. Nagpal. Organizing a Global Coordinate System from Local Information on an Amorphous Computer. Technical Report A.I. Memo 1666, MIT A.I. Laboratory, August 1999.
-
-
-
-
21
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In IPSN '04, 2004.
-
(2004)
IPSN '04
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
22
-
-
0041973656
-
Ad Hoc Positioning System (APS) Using AoA
-
D. Niculescu and B. Nath. Ad Hoc Positioning System (APS) Using AoA. In INFOCOM '03, 2003.
-
(2003)
INFOCOM '03
-
-
Niculescu, D.1
Nath, B.2
-
27
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In MobiCom, 2001.
-
(2001)
MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
30
-
-
0034775930
-
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
-
July
-
A. Savvides, C. C. Han, and M. B. Srivastava. Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors. In MOBICOM '01, July 2001.
-
(2001)
MOBICOM '01
-
-
Savvides, A.1
Han, C.C.2
Srivastava, M.B.3
-
31
-
-
14844300164
-
Resilient Aggregation in Sensor Networks
-
Oct
-
D. Wagner. Resilient Aggregation in Sensor Networks. SASN'04, Oct. 2004.
-
(2004)
SASN'04
-
-
Wagner, D.1
-
33
-
-
0036793924
-
Denial of Service in Sensor-Networks
-
Sept
-
A. Wood and J. Stankovic. Denial of Service in Sensor-Networks. IEEE Computer, pages 54-62, Sept. 2002.
-
(2002)
IEEE Computer
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
35
-
-
3543056512
-
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data In Sensor Networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data In Sensor Networks. In IEEE Symposium on Security and Privacy, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|