-
1
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
April
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in International Workshop on Security Protocols, pp. 172-194, April 1999.
-
(1999)
International Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
2
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
March
-
D. Nash, T. Martin, D. Ha, and M. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in IEEE PerCom Workshops, pp. 141-145, March 2005.
-
(2005)
IEEE PerCom Workshops
, pp. 141-145
-
-
Nash, D.1
Martin, T.2
Ha, D.3
Hsiao, M.4
-
3
-
-
39749120747
-
Batterysensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection
-
Jan
-
T. Buennemeyer, F. Munshi, R. Marchany, and J. Tront, "Batterysensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection," in HICSS, p. 163b, Jan. 2007.
-
(2007)
HICSS
-
-
Buennemeyer, T.1
Munshi, F.2
Marchany, R.3
Tront, J.4
-
4
-
-
33845958392
-
Effects of denial of sleep attacks on wireless sensor network MAC protocols
-
June
-
D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, "Effects of denial of sleep attacks on wireless sensor network MAC protocols," in IEEE IAW, pp. 297-304, June 2006.
-
(2006)
IEEE IAW
, pp. 297-304
-
-
Raymond, D.1
Marchany, R.2
Brownfield, M.3
Midkiff, S.4
-
5
-
-
0034291065
-
Protocols for self-organization of a wireless sensor network
-
Oct
-
K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie, "Protocols for self-organization of a wireless sensor network," IEEE Personal Communications, vol. 7, no. 5, pp. 16-27, Oct. 2000.
-
(2000)
IEEE Personal Communications
, vol.7
, Issue.5
, pp. 16-27
-
-
Sohrabi, K.1
Gao, J.2
Ailawadhi, V.3
Pottie, G.4
-
6
-
-
26444451023
-
Versatile low power media access for wireless sensor networks
-
Nov
-
J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," in ACM SenSys, pp. 95-107, Nov. 2004.
-
(2004)
ACM SenSys
, pp. 95-107
-
-
Polastre, J.1
Hill, J.2
Culler, D.3
-
7
-
-
4344714071
-
Medium access control with coordinated adaptive sleeping for wireless sensor networks
-
June
-
W. Ye, J. Heidemann, and D. Estrin, "Medium access control with coordinated adaptive sleeping for wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, June 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.3
, pp. 493-506
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
8
-
-
18844402855
-
An adaptive energy-efficient MAC protocol for wireless sensor networks
-
Nov
-
T. van Dam and K. Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks," in ACM SenSys, pp. 171-180, Nov. 2003.
-
(2003)
ACM SenSys
, pp. 171-180
-
-
van Dam, T.1
Langendoen, K.2
-
9
-
-
67650304313
-
-
CrossBow Corporation, Accessed May 2006, Online, Available
-
CrossBow Corporation, "Mica2 datasheet," Accessed May 2006. [Online]. Available: http://www.xbow.com/
-
Mica2 datasheet
-
-
-
10
-
-
47949084165
-
-
TinyOS community forum, Accessed Aug. 2006, Online, Available
-
"TinyOS community forum," Accessed Aug. 2006. [Online]. Available: http://www.tinyos.net/
-
-
-
-
11
-
-
11144340927
-
Designing secure sensor networks
-
Dec
-
E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, Dec. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
12
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Nov
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in ACM SenSys, pp. 162-175, Nov. 2004.
-
(2004)
ACM SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
13
-
-
47949094791
-
Scalable, cluster-based anti-replay protection for wireless sensor networks
-
to appear in, June
-
D. Raymond, R. Marchany, and S. Midkiff, "Scalable, cluster-based anti-replay protection for wireless sensor networks," to appear in IEEE IAW, June 2007.
-
(2007)
IEEE IAW
-
-
Raymond, D.1
Marchany, R.2
Midkiff, S.3
-
16
-
-
1342294845
-
-
OPNET Technologies Inc, Accessed Aug. 2006, Online, Available
-
OPNET Technologies Inc., "OPNET Modeler," Accessed Aug. 2006. [Online]. Available: http://www.opnet.com/
-
OPNET Modeler
-
-
-
17
-
-
47949131631
-
-
Accessed June 2006, Online, Available
-
"SourceForge," Accessed June 2006. [Online]. Available: http://sourceforge.net/
-
-
-
|