-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
AKYILDH, I., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIRCI, E. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4, 393-422.
-
(2002)
Comput. Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
AKYILDH, I.1
SU, W.2
SANKARASUBRAMANIAM, Y.3
CAYIRCI, E.4
-
2
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Proceedings of the 8th International Workshop on Security Protocols
-
AURA, T., NIKANDER, P., AND LEIWO, J. 2001. DOS-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, Lecture Notes in Computer Science, vol. 2133, 170-177.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
, pp. 170-177
-
-
AURA, T.1
NIKANDER, P.2
LEIWO, J.3
-
6
-
-
41849134466
-
-
CHIPCON. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver. http://www.chipcon.com/files/CC2420_Data_Sheet_1_4.pdf.
-
CHIPCON. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver. http://www.chipcon.com/files/CC2420_Data_Sheet_1_4.pdf.
-
-
-
-
8
-
-
13244263673
-
-
CROSSBOW TECHNOLOGY INC
-
CROSSBOW TECHNOLOGY INC. Wireless sensor networks. http://www.xbow.com/Products/Wireless_Sensor.Networks.htm.
-
Wireless sensor networks
-
-
-
12
-
-
84943235829
-
Pricing via processing, or, combatting junk mail
-
Proceedings of Advances in Cryptology CRYPTO'92
-
DWORK, C. AND NAOR, M. 1992. Pricing via processing, or, combatting junk mail. In Proceedings of Advances in Cryptology (CRYPTO'92). Lecture Notes in Computer Science, vol. 740, 139-147.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 139-147
-
-
DWORK, C.1
NAOR, M.2
-
13
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
GAY, D., LEVIS, P., VON BEHREN, R., WELSH, M., BREWER, E., AND CULLER, D. 2003. The nesC language: A holistic approach to networked embedded systems. In Proceedings of the Conference on Programming Language Design and Implementation (PLDFOS).
-
(2003)
Proceedings of the Conference on Programming Language Design and Implementation (PLDFOS)
-
-
GAY, D.1
LEVIS, P.2
VON BEHREN, R.3
WELSH, M.4
BREWER, E.5
CULLER, D.6
-
15
-
-
33750327688
-
DoS protection for reliably authenticated broadcast
-
GUNTER, C., KHANNA, S., TAN, K., AND VENKATESH, S. 2004. DoS protection for reliably authenticated broadcast. In Proceedings of the 11th Network and Distributed Systems Security Symposium (NDSS'04). 17-36.
-
(2004)
Proceedings of the 11th Network and Distributed Systems Security Symposium (NDSS'04)
, pp. 17-36
-
-
GUNTER, C.1
KHANNA, S.2
TAN, K.3
VENKATESH, S.4
-
18
-
-
0034445661
-
System architecture directions for networked sensors
-
HILL, J., SZEWCZYK, R., WOO, A., HOLLAR, S., CULLER, D., AND PISTER, K. S. J. 2000. System architecture directions for networked sensors. In Proceedings of Architectural Support for Programming Languages and Operating Systems. 93-104.
-
(2000)
Proceedings of Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
HILL, J.1
SZEWCZYK, R.2
WOO, A.3
HOLLAR, S.4
CULLER, D.5
PISTER, K.S.J.6
-
20
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
HU, Y., PERHIG, A., AND JOHNSON, D. 2003. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM'03.
-
(2003)
Proceedings of INFOCOM
, vol.3
-
-
HU, Y.1
PERHIG, A.2
JOHNSON, D.3
-
21
-
-
41849141706
-
-
IEEE COMPUTER SOCIETY. 2003. IEEE 802.15.4: IEEE standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.
-
IEEE COMPUTER SOCIETY. 2003. IEEE 802.15.4: IEEE standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.
-
-
-
-
22
-
-
13944275489
-
-
INTEL RESEARCH
-
INTEL RESEARCH. Intel mote, http://www.intel.com/ research/exploratory/motes.htm.
-
Intel mote
-
-
-
24
-
-
24944508408
-
Distillation codes and applications to dos resistant multicast authentication
-
KARLOF, C., SASTRY, N., LI, Y., PERRIG, A., AND TYGAR, J. 2004. Distillation codes and applications to dos resistant multicast authentication. In Proceedings of the 11th Network and Distributed Systems Security Symposium (NDSS'04). 37-56.
-
(2004)
Proceedings of the 11th Network and Distributed Systems Security Symposium (NDSS'04)
, pp. 37-56
-
-
KARLOF, C.1
SASTRY, N.2
LI, Y.3
PERRIG, A.4
TYGAR, J.5
-
25
-
-
85019620107
-
Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks
-
LEVIS, P., PATEL, N., CULLER, D., AND SHENKER, S. 2004. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Symposium on Network System Design and Implementation (NSDF04).
-
(2004)
Proceedings of the 1st Symposium on Network System Design and Implementation (NSDF04)
-
-
LEVIS, P.1
PATEL, N.2
CULLER, D.3
SHENKER, S.4
-
26
-
-
41849106603
-
-
LIU, A, KAMPANAKIS, P, AND NINO, P. TinyECC: Elliptic curve cryptography for sensor networks version 0.3
-
LIU, A., KAMPANAKIS, P., AND NINO, P. TinyECC: Elliptic curve cryptography for sensor networks (version 0.3). http://discovery.csc.ncsu.edu/software/TinyECC/.
-
-
-
-
28
-
-
85000276942
-
Multi-level μTESLA: Broadcast authentication for distributed sensor networks
-
LIU, D. AND NING, P. 2004. Multi-level μTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3, 4, 800-836.
-
(2004)
ACM Trans. Embed. Comput. Syst. 3
, vol.4
, pp. 800-836
-
-
LIU, D.1
NING, P.2
-
29
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
LIU, D., NING, P., ZHU, S., AND JAJODIA, S. 2005. Practical broadcast authentication in sensor networks. In Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05).
-
(2005)
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05)
-
-
LIU, D.1
NING, P.2
ZHU, S.3
JAJODIA, S.4
-
32
-
-
0000664248
-
The broadcast storm problem in a mobile ad hoc network
-
NI, S., TSENG, Y., CHEN, Y., AND SHEU, J. 1999. The broadcast storm problem in a mobile ad hoc network. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99). 151-162.
-
(1999)
Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99)
, pp. 151-162
-
-
NI, S.1
TSENG, Y.2
CHEN, Y.3
SHEU, J.4
-
35
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
PARK, J., CHONG, E., AND SIEGEL, H. 2003. Efficient multicast stream authentication using erasure codes. ACMTrans. Inform, Syst. Secur. 6, 2, 258-285.
-
(2003)
ACMTrans. Inform, Syst. Secur
, vol.6
, Issue.2
, pp. 258-285
-
-
PARK, J.1
CHONG, E.2
SIEGEL, H.3
-
37
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
PERRIG, A.1
CANETTI, R.2
SONG, D.3
TYGAR, D.4
-
38
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2001. Efficient and secure source authentication for multicast. In Proceedings of the Network and Distributed System Security Symposium.
-
(2001)
Proceedings of the Network and Distributed System Security Symposium
-
-
PERRIG, A.1
CANETTI, R.2
SONG, D.3
TYGAR, D.4
-
39
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D., AND TYGAR, D. 2001. SPINS: Security protocols for sensor networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networks. 521-534.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networks
, pp. 521-534
-
-
PERRIG, A.1
SZEWCZYK, R.2
WEN, V.3
CULLER, D.4
TYGAR, D.5
-
42
-
-
0004102023
-
The RC6 block cipher
-
RIVEST, R., ROBSHAW, M., SIDNEY, R., AND YIN, Y. 1998. The RC6 block cipher. NIST Fist AES Candidate Conference.
-
(1998)
NIST Fist AES Candidate Conference
-
-
RIVEST, R.1
ROBSHAW, M.2
SIDNEY, R.3
YIN, Y.4
-
44
-
-
0036377260
-
Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks
-
STOJMENOVIC, I., SEDDIGH, M., AND ZUNIC, J. 2002. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Trans. Parall. Distrib. Syst. 13, 1, 14-25.
-
(2002)
IEEE Trans. Parall. Distrib. Syst
, vol.13
, Issue.1
, pp. 14-25
-
-
STOJMENOVIC, I.1
SEDDIGH, M.2
ZUNIC, J.3
-
46
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
WATERS, B., JUELS, A., HALDERMAN, J., AND FELTEN, E. 2004. New client puzzle outsourcing techniques for dos resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04). 246-256.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 246-256
-
-
WATERS, B.1
JUELS, A.2
HALDERMAN, J.3
FELTEN, E.4
-
47
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
XU, W., TRAPPE, W., ZHANG, Y., AND WOOD, T. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc'05). 46-57.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc'05)
, pp. 46-57
-
-
XU, W.1
TRAPPE, W.2
ZHANG, Y.3
WOOD, T.4
|