-
1
-
-
33751027947
-
-
A. Czarlinska, D. Kundur, Distributed actuation attacks in wireless sensor networks: implications and countermeasures, in: 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 2006, pp. 3-12.
-
-
-
-
2
-
-
3042520226
-
Report on a working session on security in wireless ad hoc networks
-
Buttyan L., and Hubaux J.-P. Report on a working session on security in wireless ad hoc networks. Mobile Computing and Communications Review 6 4 (2002) 1-17
-
(2002)
Mobile Computing and Communications Review
, vol.6
, Issue.4
, pp. 1-17
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
3
-
-
34548437818
-
-
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, in: Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 263-270.
-
-
-
-
4
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
6
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan H., and Perrig A. Security and privacy in sensor networks. IEEE Computer 36 10 (2003) 103-105
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
7
-
-
14844300164
-
-
D. Wagner, Resilient aggregation in sensor networks, in: SASN'04, 2004, pp. 78-87.
-
-
-
-
8
-
-
0034997317
-
-
S. Meguerdichian, F. Koushanfar, M. PotKonjak, M.B. Srivastava, Coverage problems in wireless ad-hoc sensor networks, in: Proceedings of IEEE Infcom, vol. 3, Anchorage, Ak, 2001, pp. 1380-1387.
-
-
-
-
9
-
-
12844271536
-
-
S. Meguerdichian, F. Koushanfar, M. PotKonjak, M.B. Srivastava, Worst and best-case coverage in sensor networks, in: IEEE Transactions On Mobile Computing, vol. 4, 2005, pp. 84-92.
-
-
-
-
11
-
-
0038052863
-
-
D. Mehta, M. Lopez, L. Lino, Optimal coverage paths in ad-hoc sensor networks, in: IEEE International Conference on Communications, vol. 1, 2003, pp. 507-511.
-
-
-
-
12
-
-
85143189758
-
-
J. Liu, X. Koutsoukos, J. Reich, F. Zhao, Sensing field: coverage characterization in distributed sensor networks, in: IEEE ICASSP, vol. 5, 2003, pp. 173-176.
-
-
-
-
13
-
-
1542363396
-
-
G. Kesidis, T. Konstantopoulos, S. Phoha, Surveillance coverage of sensor networks under a random mobility strategy, in: Proceedings of IEEE Sensors, vol. 2, 2003, pp. 961-965.
-
-
-
-
14
-
-
0036933529
-
Grid coverage for surveillance and target location in distributed sensor networks
-
Chakrabarty K., Iyengar S.S., Qi H., and Cho E. Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions On Computers 51 12 (2002) 1448-1453
-
(2002)
IEEE Transactions On Computers
, vol.51
, Issue.12
, pp. 1448-1453
-
-
Chakrabarty, K.1
Iyengar, S.S.2
Qi, H.3
Cho, E.4
-
15
-
-
0034858336
-
Sensor placement in distributed sensor networks using a coding theory
-
Chakrabaty K., and Iyengar S. Sensor placement in distributed sensor networks using a coding theory. Framework (2001) 157
-
(2001)
Framework
, pp. 157
-
-
Chakrabaty, K.1
Iyengar, S.2
-
16
-
-
0037447612
-
Minimal sensor integrity: measuring the vulnerability of sensor deployments
-
Kannan R., Sarangi S., Ray S., and Iyengar S.S. Minimal sensor integrity: measuring the vulnerability of sensor deployments. Information Processing Letters 86 1 (2003) 49-55
-
(2003)
Information Processing Letters
, vol.86
, Issue.1
, pp. 49-55
-
-
Kannan, R.1
Sarangi, S.2
Ray, S.3
Iyengar, S.S.4
-
17
-
-
34548406254
-
-
L. Benyuan, D. Towsley, On the coverage and detectability of large-scale wireless sensor networks, 2003.
-
-
-
-
18
-
-
10844275662
-
Uncertainty-aware and coverage-oriented deployment for sensor networks
-
Zou Y., and Chakrabaty K. Uncertainty-aware and coverage-oriented deployment for sensor networks. Journal of Parallel and Distributed Computing 64 7 (2004) 788-798
-
(2004)
Journal of Parallel and Distributed Computing
, vol.64
, Issue.7
, pp. 788-798
-
-
Zou, Y.1
Chakrabaty, K.2
-
19
-
-
0035789814
-
-
S. Meguerdichian, S. Slijepcevic, V. Karayan, M. Potkonjak, Localized algorithms in wireless ad-hoc networks: Location discovery and sensor exposure, in: Proceedings of 2001 ACM International Symposium. Mobile Ad Hoc Netw. Comp. MobiHoc, 2001 pp. 106-116.
-
-
-
-
20
-
-
0034781552
-
-
S. Meguerdichian, F. Koushanfar, G. Qu, M. Potkonjak, Exposure in wireless ad hoc sensor networks, in: Proceedings of the Annual International Conference on Mobile Computing and Networking, Rome, 2001, pp. 139-150.
-
-
-
-
21
-
-
14044265726
-
-
A. Tews, M.J. Mataric, G. Sukhatme, Avoiding detection in a dynamic environment, in: IEEE RSJ International Conference on Intelligent Robots and Systems 4, 2004, pp. 3773-3778.
-
-
-
-
22
-
-
0036736383
-
-
A. Howard, J.J. Matarić, G.S. Sukhatme, An incremental self-deployment algorithm for mobile sensor networks, Autonomous Robots, Intelligent Embedded Systems 13 (2) (2002) 113-126 (special issue).
-
-
-
-
23
-
-
20344386960
-
-
A. Kansal, M. Rahimi, D. Estrin, W.J. Kaiser, G.J. Pottie, S.M.B, Controlled mobility for sustainable wireless sensor networks, in: First Annual IEEE Communcations Society Conference Sensor Ad Hoc Communcation Networks. IEEE SECON, 2004 pp. 1-6.
-
-
-
-
24
-
-
3042689727
-
-
S. Ganeriwal, A. Kansal, M. Srivastava, in: IEEE Proceedings of International Conference on Robotics and Automation, pp. 5244-5249.
-
-
-
-
25
-
-
0344876649
-
-
M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, Studying the feasibility of energy harvesting in a mobile sensor network, in: Proceedings of IEEE International Conference on Robotics and Automation, vol. 1, Taipei, Taiwan, 2003, pp. 19-24.
-
-
-
-
26
-
-
0242527339
-
-
S. Čapkun, J.-P. Hubaux, L. Buttyàn, Mobility helps security in ad hoc networks, in: Proceedings of ACM International Symposium on Mobile Ad Hoc Network and Computing, Annapolis, Maryland, 2003, pp. 46-56.
-
-
-
-
27
-
-
24944544063
-
-
M. Laibowitz, J. Paradiso, Parasitic mobility in dynamically distributed sensor networks, Pervasive Computing: Third International Conference 3468 (2005) 255-278.
-
-
-
-
28
-
-
29844457889
-
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing,MobiHoc'05, Urbana-Champaign, IL, 2005, pp. 46-57.
-
-
-
-
29
-
-
34548383659
-
-
K. Ma, Y. Zhang, W. Trappe, Mobile network management and robust spatial retreats via network dynamics, IEEE MASS 2005 Workshop - RPMSN05.
-
-
-
-
31
-
-
0038675868
-
-
T. Camp, J. Boleng, V. Davies, A survey of mobility models for ad hoc network research, Wireless Communication & Mobile Computing (WCMS): Mobile Ad Hoc Networking: Research, Trends and Applications 2 (5) (2002) 483-502 (special issue).
-
-
-
|