-
1
-
-
38149113363
-
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
-
National Research Council, National Academy Press: Washington, DC
-
National Research Council. Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers. 1 st (edn). National Academy Press: Washington, DC, 2001.
-
(2001)
1 st (edn)
-
-
-
2
-
-
0141733111
-
Secure sensor networks for perimeter protection
-
Avancha S, Undercoffer J, Joshi A, Pinkston J. Secure sensor networks for perimeter protection. Computer Networks 2003: 43(4): 421-435
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 421-435
-
-
Avancha, S.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
4
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine 2002; 40(8): 102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
5
-
-
0034777647
-
Capacity of ad hoc wireless networks
-
July
-
Li J, Blake C, De Couto DSJ, Lee HI, Morris R. Capacity of ad hoc wireless networks. In Proceedings of the ACM international Conference on Mobile Computing and Networking (MOBICOM). pp. 61-69, July 2001.
-
(2001)
Proceedings of the ACM international Conference on Mobile Computing and Networking (MOBICOM)
, pp. 61-69
-
-
Li, J.1
Blake, C.2
De Couto, D.S.J.3
Lee, H.I.4
Morris, R.5
-
7
-
-
3142515935
-
Security for sensor networks
-
Technical report, University of Maryland Baltimore County, Center for Architectures for Data-Driven Information Processing
-
Undercoffer J, Avancha S, Joshi A, Pinkston J. Security for sensor networks. Technical report, University of Maryland Baltimore County, Center for Architectures for Data-Driven Information Processing, 2002.
-
(2002)
-
-
Undercoffer, J.1
Avancha, S.2
Joshi, A.3
Pinkston, J.4
-
8
-
-
30344445246
-
Enhancing base station security in wireless sensor networks
-
951-03, University of Colorado, Boulder
-
Deng J, Han R, Mishra S. Enhancing base station security in wireless sensor networks. Technical Report CU-CS 951-03, University of Colorado, Boulder, 2002.
-
(2002)
Technical Report CU-CS
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
10
-
-
0002058575
-
Connecting the physical world with pervasive networks
-
Estrin D, Culler D, Pister K, Sukhatme G. Connecting the physical world with pervasive networks. IEEE Pervasive Computing 2002; 1(1): 59-69.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.1
, pp. 59-69
-
-
Estrin, D.1
Culler, D.2
Pister, K.3
Sukhatme, G.4
-
11
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
Technical Report 00-010, NAI Labs
-
Carman DW, Kruus PS, Matt BJ. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, 2000.
-
(2000)
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
12
-
-
0003408437
-
Smart dust: Wireless networks of millimeter-scale sensor networks
-
Technical report, UC Berkeley
-
Pister KSJ, Kahn JM, Boser BE. Smart dust: wireless networks of millimeter-scale sensor networks. Technical report, UC Berkeley, 1999.
-
(1999)
-
-
Pister, K.S.J.1
Kahn, J.M.2
Boser, B.E.3
-
15
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. Wireless Networks 2002; 8(5): 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
16
-
-
0242426103
-
The tesla broadcast authentication protocol
-
Perrig A, Canetti R, Tygar JD, Song D. The tesla broadcast authentication protocol. RSA CryptoBytes 2002; 5(2): 2-13.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
17
-
-
77949837968
-
Multi-level μtesla: A broadcast authentication system for distributed sensor networks
-
Technical Report TR-2003-08, North Carolina State University
-
Liu D, Ning P. Multi-level μtesla: a broadcast authentication system for distributed sensor networks. Technical Report TR-2003-08, North Carolina State University, 2003.
-
(2003)
-
-
Liu, D.1
Ning, P.2
-
19
-
-
84871442641
-
On communication security in wireless ad hoc sensor networks
-
Slijepcevic S, Potkonjak M, Tsiatsis V, Zimbeck S, Srivastava MB. On communication security in wireless ad hoc sensor networks. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-02), pp. 139-144, 2002.
-
(2002)
Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-02)
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
21
-
-
38149009460
-
Providing secrecy in key management protocols for large wireless sensor networks
-
To appear
-
Roberto Di Pietro LVM, Jajodia S. Providing secrecy in key management protocols for large wireless sensor networks. Journal of Adhoc Networks, To appear.
-
Journal of Adhoc Networks
-
-
Roberto Di Pietro, L.V.M.1
Jajodia, S.2
-
27
-
-
38149081126
-
Challenge: Secure routing protocols, http://research.microsoft. com/projects/SWSecInstitute/five-minute/Perrig5.ppt
-
June, University of Washington, Microsoft Research, and Carnegie Mellon University Summer Institute
-
Perrig A. Challenge: secure routing protocols, http://research.microsoft. com/projects/SWSecInstitute/five-minute/Perrig5.ppt, June 2003. Presentation given at Software Security: University of Washington, Microsoft Research, and Carnegie Mellon University Summer Institute.
-
(2003)
Presentation given at Software Security
-
-
Perrig, A.1
-
28
-
-
0036793924
-
Denial of service in sensor networks
-
Wood AD, Stankovic JA. Denial of service in sensor networks. IEEE Computer 2002; 35(10): 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
29
-
-
38149002794
-
License free ethernet radio modems-The only wireless ethernet modem designed for industrial environments
-
April
-
Mhoon D. License free ethernet radio modems-The only wireless ethernet modem designed for industrial environments. Industrial Computing Magazine, April 1999.
-
(1999)
Industrial Computing Magazine
-
-
Mhoon, D.1
-
30
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
31
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pp. 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
32
-
-
27544440245
-
INSENS: Secure and intrusion tolerant routing for wireless sensor networks
-
939-02, University of Colorado, Boulder
-
Deng J, Han R, Mishra S. INSENS: secure and intrusion tolerant routing for wireless sensor networks. Technical Report CU-CS 939-02, University of Colorado, Boulder, 2002.
-
(2002)
Technical Report CU-CS
-
-
Deng, J.1
Han, R.2
Mishra, S.3
|