-
1
-
-
0013277491
-
A topology discovery algorithm for sensor networks with applications to network management
-
DCS-TR-441, Rutgers University, May
-
B. Deb, S. Bhatnagar, and B. Nath. A topology discovery algorithm for sensor networks with applications to network management. DCS Technical Report DCS-TR-441, Rutgers University, May 2001.
-
(2001)
DCS Technical Report
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
2
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263-270, 1999.
-
(1999)
Mobile Computing and Networking
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
3
-
-
11244272924
-
Timing-sync protocol for sensor networks
-
New York, NY, USA, ACM Press
-
S. Ganeriwal, R. Kumar, and M. B. Srivastava. Timing-sync protocol for sensor networks. In SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems, pages 138-149, New York, NY, USA, 2003. ACM Press.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 138-149
-
-
Ganeriwal, S.1
Kumar, R.2
Srivastava, M.B.3
-
4
-
-
33646918331
-
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner. Evaluation of security mechanisms in wireless sensor networks, icw, 00:428-433, 2005.
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner. Evaluation of security mechanisms in wireless sensor networks, icw, 00:428-433, 2005.
-
-
-
-
7
-
-
35548973198
-
-
C. T. Inc. MPR400/410/420 MICA2 Mote. Datasheet 2005.
-
C. T. Inc. MPR400/410/420 MICA2 Mote. Datasheet 2005.
-
-
-
-
9
-
-
20344392154
-
Benchmarking block ciphers for wireless sensor networks (extended abstract)
-
electronic edition, Fort Lauderdale, Florida, Oct, IEEE Computer Society Press, Los Alamitos, California
-
Y. Law, J. Doumen, and P. Hartel. Benchmarking block ciphers for wireless sensor networks (extended abstract). In 1st Int. Conf. on Mobile Ad-hoc and Sensor Systems, page electronic edition, Fort Lauderdale, Florida, Oct 2004. IEEE Computer Society Press, Los Alamitos, California.
-
(2004)
1st Int. Conf. on Mobile Ad-hoc and Sensor Systems
-
-
Law, Y.1
Doumen, J.2
Hartel, P.3
-
10
-
-
35548955296
-
-
P. Levis. Tossim: A simulator for tinyos networks
-
P. Levis. Tossim: A simulator for tinyos networks.
-
-
-
-
11
-
-
31844452363
-
-
P. Levis, D. Gay, and . Culler. Active sensor networks. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI '05), Boston, MA, USA, May 2005.
-
P. Levis, D. Gay, and . Culler. Active sensor networks. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI '05), Boston, MA, USA, May 2005.
-
-
-
-
12
-
-
18844399081
-
Tossim: Accurate and scalable simulation of entire tinyos applications
-
New York, NY, USA, ACM Press
-
P. Levis, N. Lee, M. Welsh, and D. Culler. Tossim: accurate and scalable simulation of entire tinyos applications. In SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems, pages 126-137, New York, NY, USA, 2003. ACM Press.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
14
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
16
-
-
14844321322
-
Gathering correlated data in sensor networks
-
October
-
P. V. Rickenbach and R. Wattenhofer. Gathering correlated data in sensor networks. In DIALM-POMC, pages 60-66, October 2004.
-
(2004)
DIALM-POMC
, pp. 60-66
-
-
Rickenbach, P.V.1
Wattenhofer, R.2
-
17
-
-
84872291479
-
Resilient rights protection for sensor streams
-
R. Sion, M. Atallah, and S. Prabhakar. Resilient rights protection for sensor streams. In VLDB, pages 732-743, 2004.
-
(2004)
VLDB
, pp. 732-743
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
19
-
-
47749093823
-
Exploring message authentication in sensor networks
-
Proceedings of ESAS 2004 1st European Workshop on Security in Ad Hoc and Sensor Networks, Heidelberg, Germany, Aug, Springer-Verlag
-
H. Vogt. Exploring message authentication in sensor networks. In Proceedings of ESAS 2004 (1st European Workshop on Security in Ad Hoc and Sensor Networks), LNCS, Heidelberg, Germany, Aug. 2004. Springer-Verlag.
-
(2004)
LNCS
-
-
Vogt, H.1
-
20
-
-
33646824919
-
-
H. Xu, L. Huang, Y. Wan, and B. Xu. Accurate time synchronization for wireless sensor networks. In X. Jia, J. Wu, and Y. He, editors, MSN, 3794 of Lecture Notes in Computer Science, pages 153-163. Springer, 2005.
-
H. Xu, L. Huang, Y. Wan, and B. Xu. Accurate time synchronization for wireless sensor networks. In X. Jia, J. Wu, and Y. He, editors, MSN, volume 3794 of Lecture Notes in Computer Science, pages 153-163. Springer, 2005.
-
-
-
-
22
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
IEEE Computer Society
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-271. IEEE Computer Society, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|