-
2
-
-
0036870095
-
Mica: a wireless platform for deeply embedded networks
-
Hill J., and Culler D. Mica: a wireless platform for deeply embedded networks. IEEE Micro. 22 (2002) 6
-
(2002)
IEEE Micro.
, vol.22
, pp. 6
-
-
Hill, J.1
Culler, D.2
-
3
-
-
6444240823
-
A line in the send: a wireless sensor network for target detection, classification and tracking
-
Arora A., Dutta P., Bapat S., Kulathumani V., Zhang H., Naik V., Mittal V., Cao H., Demirbus M., Gouda M., Choi Y., Herman T., Kulkurni S., Arumugam U., Nesternko M., Vora A., and Miyastha M. A line in the send: a wireless sensor network for target detection, classification and tracking. Comput. Networks 46 5 (2004) 605-634
-
(2004)
Comput. Networks
, vol.46
, Issue.5
, pp. 605-634
-
-
Arora, A.1
Dutta, P.2
Bapat, S.3
Kulathumani, V.4
Zhang, H.5
Naik, V.6
Mittal, V.7
Cao, H.8
Demirbus, M.9
Gouda, M.10
Choi, Y.11
Herman, T.12
Kulkurni, S.13
Arumugam, U.14
Nesternko, M.15
Vora, A.16
Miyastha, M.17
-
4
-
-
39049171915
-
-
Z. Benenson, N. Gedicke, O. Raivio, Realizing robust user authentication in sensor networks, in: Proc. Workshop on Real-World Wireless Sensor Networks REALWSN-05, 2005.
-
Z. Benenson, N. Gedicke, O. Raivio, Realizing robust user authentication in sensor networks, in: Proc. Workshop on Real-World Wireless Sensor Networks REALWSN-05, 2005.
-
-
-
-
5
-
-
0034946938
-
-
R.A.Burne, A.L. Buczak, V.R. Jamalabad, I. Kadar, E.R. Eadan, Self-organizing cooperative sensor network for remote surveillance improved target tracking results, in: Proc. SPIE 4232, 2001, pp. 313-321.
-
R.A.Burne, A.L. Buczak, V.R. Jamalabad, I. Kadar, E.R. Eadan, Self-organizing cooperative sensor network for remote surveillance improved target tracking results, in: Proc. SPIE 4232, 2001, pp. 313-321.
-
-
-
-
6
-
-
33845507838
-
-
A. Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON-05, 2005, pp. 46-54.
-
A. Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON-05, 2005, pp. 46-54.
-
-
-
-
7
-
-
34748902207
-
-
A.R. Chowdhury, S. Tripathy, S. Nandi, Securing wireless sensor networks against spurious injections, in: Proc. IEEE Int. Conference on COMmunication System softWAre and MiddlewaRE COMSWARE07, 2007.
-
A.R. Chowdhury, S. Tripathy, S. Nandi, Securing wireless sensor networks against spurious injections, in: Proc. IEEE Int. Conference on COMmunication System softWAre and MiddlewaRE COMSWARE07, 2007.
-
-
-
-
8
-
-
33845492142
-
-
F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proc. IEEE SECON 2005, 2005, pp. 118-129.
-
F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proc. IEEE SECON 2005, 2005, pp. 118-129.
-
-
-
-
9
-
-
33745969132
-
-
J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, pp. 89-96.
-
J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, pp. 89-96.
-
-
-
-
10
-
-
3042783638
-
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. ACM Conference Computer Communication and Security, (CCS'03), 2003, pp. 42-51.
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. ACM Conference Computer Communication and Security, (CCS'03), 2003, pp. 42-51.
-
-
-
-
11
-
-
33745933645
-
-
T. Ito, H. Ohta, N. Matsuda, T. Yoneda, A key pre-distribution scheme for secure sensor networks using probability density function of node, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
-
T. Ito, H. Ohta, N. Matsuda, T. Yoneda, A key pre-distribution scheme for secure sensor networks using probability density function of node, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
-
-
-
-
12
-
-
84942426861
-
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proc. IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA'03), 2003, pp. 113-127.
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proc. IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA'03), 2003, pp. 113-127.
-
-
-
-
13
-
-
34547466172
-
-
M. Luk, A. Perrig, B. Whillock, Seven cardinal properties of sensor network broadcast authentication, in: Proc. ACM Conference on Security of Ad Hoc and Sensor Networks, (SASN 06), 2006, pp. 147-156.
-
M. Luk, A. Perrig, B. Whillock, Seven cardinal properties of sensor network broadcast authentication, in: Proc. ACM Conference on Security of Ad Hoc and Sensor Networks, (SASN 06), 2006, pp. 147-156.
-
-
-
-
14
-
-
33745931868
-
-
M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, pp. 107-116.
-
M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, pp. 107-116.
-
-
-
-
15
-
-
4344643901
-
Environmental sensor networks
-
Martinez K., Hart J.K., and Ong R. Environmental sensor networks. IEEE Comput. 37 8 (2004) 50-56
-
(2004)
IEEE Comput.
, vol.37
, Issue.8
, pp. 50-56
-
-
Martinez, K.1
Hart, J.K.2
Ong, R.3
-
16
-
-
20344401315
-
-
K. Martinez, R. Ong, J. Hart, Glacsweb: a sensor network for hostile environments, in: Proc. IEEE SECON 2004, 2004, pp. 81-87.
-
K. Martinez, R. Ong, J. Hart, Glacsweb: a sensor network for hostile environments, in: Proc. IEEE SECON 2004, 2004, pp. 81-87.
-
-
-
-
17
-
-
39049124906
-
-
P. Pal Chaudhuri, D.R. Chowdhury, S. Nandi, S. Chatterjee, 1997. Additive Cellular Automata Theory and Applications 1. IEEE Computer Society Press.
-
P. Pal Chaudhuri, D.R. Chowdhury, S. Nandi, S. Chatterjee, 1997. Additive Cellular Automata Theory and Applications 1. IEEE Computer Society Press.
-
-
-
-
18
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig A., Stankovic J., and Wagner D. Security in wireless sensor networks. Commun. ACM 47 6 (2004) 53-57
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
19
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Wen V., Culler D., and Tygar J.D. SPINS: security protocols for sensor networks. Wireless Networks 8 5 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
0036986465
-
-
J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless sensor networks for habitat monitoring, in: Proc. ACM Workshop on Wireless Sensor Networks and Applications, 2002.
-
J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless sensor networks for habitat monitoring, in: Proc. ACM Workshop on Wireless Sensor Networks and Applications, 2002.
-
-
-
-
21
-
-
24944540791
-
-
R. Roman, J. Zhou, J. Lopez, On the security of wireless sensor networks, in: Proc. Int. Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, 2005, pp. 681-690.
-
R. Roman, J. Zhou, J. Lopez, On the security of wireless sensor networks, in: Proc. Int. Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, 2005, pp. 681-690.
-
-
-
-
22
-
-
84890522850
-
Communication theory of secrecy systems. A mathematical theory of cryptography
-
Shannon C.E. Communication theory of secrecy systems. A mathematical theory of cryptography. Bell Syst. Techn. J. 28 (1948) 656-715
-
(1948)
Bell Syst. Techn. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
23
-
-
33845500536
-
-
M. Shehab, E. Bertino, A. Ghafoor, Efficient hierarchical key generation and key diffusion for sensor networks, Proc. IEEE SECON 2005, 2005, pp. 76-84.
-
M. Shehab, E. Bertino, A. Ghafoor, Efficient hierarchical key generation and key diffusion for sensor networks, Proc. IEEE SECON 2005, 2005, pp. 76-84.
-
-
-
-
26
-
-
4243114087
-
Habitat monitoring with sensor networks
-
Szewezyk R., Osterweil E., Polastre J., Hamilon M., Mainwaring A., and Estrin D. Habitat monitoring with sensor networks. Commun. ACM 47 6 (2004) 34-40
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 34-40
-
-
Szewezyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilon, M.4
Mainwaring, A.5
Estrin, D.6
-
27
-
-
39049158040
-
-
S. Tripathy, S. Nandi, A. Mitra, A secured response algorithm with query authentication for wireless sensor networks, in: Proc. Int. Asian Mobile Computing Conference (AMOC07), 2007, pp. 220-225.
-
S. Tripathy, S. Nandi, A. Mitra, A secured response algorithm with query authentication for wireless sensor networks, in: Proc. Int. Asian Mobile Computing Conference (AMOC07), 2007, pp. 220-225.
-
-
-
-
28
-
-
84905828907
-
-
A. Wacker, M. Knoll, T. Heiber, K. Rothermel, A new approach for establishing pairwise keys for securing wireless sensor networks, in: Proc. ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), 2005, pp. 27-38.
-
A. Wacker, M. Knoll, T. Heiber, K. Rothermel, A new approach for establishing pairwise keys for securing wireless sensor networks, in: Proc. ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), 2005, pp. 27-38.
-
-
-
-
29
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Comput. 35 (2002) 54-62
-
(2002)
IEEE Comput.
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
31
-
-
33845458336
-
-
K.-H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authenticatin scheme for wireless sensor networks, in: Proc IEEE Int. Conf. Sensor networks, ubiquitous and trustworthy computing (SUTC-06) Computer society press, 2006.
-
K.-H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authenticatin scheme for wireless sensor networks, in: Proc IEEE Int. Conf. Sensor networks, ubiquitous and trustworthy computing (SUTC-06) Computer society press, 2006.
-
-
-
-
32
-
-
33845479472
-
-
W. Yu, K.J. Ray Liu, Secure cooperative mobile ad hoc networks against injecting traffic attacks, in: Proc. IEEE SECON-2005, 2005, pp. 55-64.
-
W. Yu, K.J. Ray Liu, Secure cooperative mobile ad hoc networks against injecting traffic attacks, in: Proc. IEEE SECON-2005, 2005, pp. 55-64.
-
-
-
|