-
1
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, pp. 293-315, September 2003.
-
(2003)
Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
2
-
-
77049100445
-
-
S.Y. Ni, Y.C. Tseng, Y.S. Chen, and Sheu J.P. The broadcast storm problem in a mobile ad hoc network, In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 151162, 1999.
-
S.Y. Ni, Y.C. Tseng, Y.S. Chen, and Sheu J.P. "The broadcast storm problem in a mobile ad hoc network," In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pages 151162, 1999.
-
-
-
-
3
-
-
0033894011
-
On the construction of energy-efficient broadcast and multicast trees in wireless networks
-
Apr
-
J.E. Wieselthier, G.D. Nguyen, and A. Ephremides, "On the construction of energy-efficient broadcast and multicast trees in wireless networks," in Proceedings of IEEE INFOCOM, pages 589594, Apr. 2000.
-
(2000)
Proceedings of IEEE INFOCOM
, pp. 589594
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
4
-
-
0036377260
-
Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks
-
I. Stojmenovic, M. Seddigh, and J.D. Zunic, "Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks," In IEEE Trans. Parallel Distrib. Syst., 2002.
-
(2002)
IEEE Trans. Parallel Distrib. Syst
-
-
Stojmenovic, I.1
Seddigh, M.2
Zunic, J.D.3
-
7
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
February
-
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, "Directed diffusion for wireless sensor networking," ACM/IEEE Transactions on Networking, vol. 11, February 2002.
-
(2002)
ACM/IEEE Transactions on Networking
, vol.11
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
8
-
-
2942636710
-
Modeling Data Centric Routing in Wireless Sensor Networks
-
New York, NY, June
-
B. Krishnamachari, D. Estrin, S.Wicker, "Modeling Data Centric Routing in Wireless Sensor Networks," in Proceedings of IEEE INFOCOM, New York, NY, June 2002.
-
(2002)
Proceedings of IEEE INFOCOM
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.3
-
9
-
-
1442296009
-
The cougar approach to in-network query processing in sensor networks
-
September
-
Y. Yao and J. Gehrke, "The cougar approach to in-network query processing in sensor networks," in SIGMOD Record, September 2002.
-
(2002)
SIGMOD Record
-
-
Yao, Y.1
Gehrke, J.2
-
10
-
-
85035363269
-
Adaptive protocols for information dissemination in wireless sensor networks
-
Seattle, WA, August
-
W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks," in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom99), Seattle, WA, August 1999.
-
(1999)
Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom99)
-
-
Heinzelman, W.1
Kulik, J.2
Balakrishnan, H.3
-
13
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security Protocols for Sensor Networks," In Proc.of 7th Annual ACM Mobicom, 2001.
-
(2001)
Proc.of 7th Annual ACM Mobicom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
15
-
-
0010461175
-
Constraints and approaches for distributed sensor network security,
-
Tech. Rep. 00-010, NAI Labs, June
-
D. Carman, P. Kruus, and B.J.Matt, "Constraints and approaches for distributed sensor network security," Tech. Rep. 00-010, NAI Labs, June 2000.
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.J.3
-
17
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H.Chan, A.Perrig, and D.Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, pp. 197-213, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
18
-
-
10044284351
-
LEAP: Efficient security mechanisms for largescale distributed sensor networks
-
October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for largescale distributed sensor networks," in Proceedings of the 10th ACM CCS, pp. 62-72, October 2003.
-
(2003)
Proceedings of the 10th ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
19
-
-
33746301733
-
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
-
T. Dimitriou, and I. Krontiris, "A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks," in Proc. of the 5th IEEE Inter. Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks, 2005.
-
(2005)
Proc. of the 5th IEEE Inter. Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks
-
-
Dimitriou, T.1
Krontiris, I.2
|