-
1
-
-
0036793924
-
Denial of Service in Sensor Networks
-
A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks," Computer, vol. 35, no. 10, 2002, pp. 54-62.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
2
-
-
0034291065
-
Protocols for Self-Organization of a Wireless Sensor Network
-
K. Sohrabi et al., "Protocols for Self-Organization of a Wireless Sensor Network," IEEE Personal Comm., vol. 7, no. 5, 2000, pp. 16-27.
-
(2000)
IEEE Personal Comm
, vol.7
, Issue.5
, pp. 16-27
-
-
Sohrabi, K.1
-
3
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 55, 2002, pp. 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.55
, pp. 521-534
-
-
Perrig, A.1
-
4
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
ACM Press
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. 2nd Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 162-175.
-
(2004)
Proc. 2nd Int'l Conf. Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
38349109864
-
-
IEEE Std. 802.15.4, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
-
IEEE Std. 802.15.4, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
-
-
-
-
6
-
-
11244354854
-
Security Considerations for IEEE 802.15.4 Networks
-
ACM Press
-
N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 32-42.
-
(2004)
Proc. ACM Workshop Wireless Security
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
7
-
-
29844457889
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
ACM Press
-
W. Xu et al., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking, ACM Press, 2005, pp. 46-57.
-
(2005)
Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking
, pp. 46-57
-
-
Xu, W.1
-
8
-
-
18844378578
-
Taming the Underlying Challenges for Reliable Multihop Routing in Sensor Networks
-
ACM Press
-
A. Woo, T. Tong, and D. Culler, "Taming the Underlying Challenges for Reliable Multihop Routing in Sensor Networks," Proc. 1st ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2003, pp. 14-27.
-
(2003)
Proc. 1st ACM Int'l Conf. Embedded Networked Sensor Systems
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
9
-
-
33845958392
-
Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols
-
IAW, IEEE Press
-
D. Raymond et al., "Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols," Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, 2006, pp. 297-304.
-
(2006)
Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop
, pp. 297-304
-
-
Raymond, D.1
-
10
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for AdHoc Wireless Networks
-
Springer
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for AdHoc Wireless Networks," Proc. 7th Int'l Workshop Security Protocols, Springer, 1999, pp. 172-194.
-
(1999)
Proc. 7th Int'l Workshop Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
11
-
-
4344714071
-
Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks
-
W. Ye, J. Heidemann, and D. Estrin, "Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 12, no. 3, 2004, pp. 493-506.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.3
, pp. 493-506
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
12
-
-
26444451023
-
Versatile Low Power Media Access for Wireless Sensor Networks
-
ACM Press
-
J. Polastre, J. Hill, and D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks," Proc. 2nd ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 95-107.
-
(2004)
Proc. 2nd ACM Int'l Conf. Embedded Networked Sensor Systems
, pp. 95-107
-
-
Polastre, J.1
Hill, J.2
Culler, D.3
-
15
-
-
0003405130
-
-
tech. report UCLA/CSD-tr-01-0023, Computer Science Dept, Univ. of California, Los Angeles
-
Y. Yu, R. Govindan, and D. Estrin, Geograhical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks, tech. report UCLA/CSD-tr-01-0023, Computer Science Dept., Univ. of California, Los Angeles, 2001.
-
(2001)
Geograhical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
-
-
Yu, Y.1
Govindan, R.2
Estrin, D.3
-
16
-
-
38349181460
-
Secure Distributed Cluster Formation in Wireless Sensor Networks
-
IEEE CS Press
-
K. Sun et al., "Secure Distributed Cluster Formation in Wireless Sensor Networks," Proc. 22nd Ann. Computer Security Applications Conf., IEEE CS Press, 2006, pp. 131-140.
-
(2006)
Proc. 22nd Ann. Computer Security Applications Conf
, pp. 131-140
-
-
Sun, K.1
-
17
-
-
33751026432
-
A Framework for Trust-Based Cluster Head Election in Wireless Sensor Networks
-
IEEE Press
-
G.V. Crosby, N. Pissinou, andJ. Gadze, "A Framework for Trust-Based Cluster Head Election in Wireless Sensor Networks," Proc. 2nd IEEE Workshop Dependability and Security in Sensor Networks and Systems, IEEE Press, 2006, pp. 13-22.
-
(2006)
Proc. 2nd IEEE Workshop Dependability and Security in Sensor Networks and Systems
, pp. 13-22
-
-
Crosby, G.V.1
Pissinou, N.2
andJ3
Gadze4
-
18
-
-
4544298056
-
Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks
-
IEEE CS Press
-
J. Deng, R. Han, and S. Mishra, "Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks," Proc. Int'l Conf. Dependable Systems and Networks, IEEE CS Press, 2004, pp. 637-656.
-
(2004)
Proc. Int'l Conf. Dependable Systems and Networks
, pp. 637-656
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
33745969132
-
Defending against Path-Based DoS Attacks in Wireless Sensor Networks
-
ACM Press
-
J. Deng, R. Han, and S.Mishra, "Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. 3rd ACM Workshop Security of Ad Hoc and Sensor Networks, ACM Press, 2005, pp. 89-96.
-
(2005)
Proc. 3rd ACM Workshop Security of Ad Hoc and Sensor Networks
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
20
-
-
22744432612
-
The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale
-
ACM Press
-
J.W. Hui and D. Culler, "The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale," Proc. 2nd ACM Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 81-94.
-
(2004)
Proc. 2nd ACM Conf. Embedded Networked Sensor Systems
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
|