-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Apr
-
I. Akyildiz, S. Weilian. Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, Apr. 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Weilian, S.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84874468531
-
Data-aggregation techniques in sensor networks: A survey
-
R. Rajagopalan and P. Varshney, "Data-aggregation techniques in sensor networks: A survey," IEEE Communications and Surveys and Tutorials, vol. 8, no. 4, pp. 48-63, 2006.
-
(2006)
IEEE Communications and Surveys and Tutorials
, vol.8
, Issue.4
, pp. 48-63
-
-
Rajagopalan, R.1
Varshney, P.2
-
3
-
-
3242765057
-
Data mules: Modeling and analysis of a three-tier architecture for sparse sensor networks
-
Sept
-
R. Shah, S. Roy, S. Jain, and W. Brunette, "Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks." Ad Hoc Networks, vol. 1, no. 2-3, pp. 215-233, Sept. 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 215-233
-
-
Shah, R.1
Roy, S.2
Jain, S.3
Brunette, W.4
-
4
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Apr
-
E. Royer and C. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, Apr. 1999.
-
(1999)
IEEE Personal Communications
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.1
Toh, C.2
-
5
-
-
11144340927
-
Designing secure sensor networks
-
Dec
-
E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, Dec. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
6
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Sept
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sept. 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
7
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proc. of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN 2004), Apr. 2004, pp. 259-268.
-
(2004)
Proc. of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN 2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
8
-
-
33750355498
-
A self-adaptive intrusion detection method for aodv-based mobile ad hoc networks
-
Nov
-
S. Kurosawa. H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, "A self-adaptive intrusion detection method for aodv-based mobile ad hoc networks." in Proc. of the 2nd IEEE Int'l. Conf. on Mobile Ad-hoc and Sensor Systems (MASS 2005), Nov. 2005, pp. 8B-4.
-
(2005)
Proc. of the 2nd IEEE Int'l. Conf. on Mobile Ad-hoc and Sensor Systems (MASS 2005)
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Nemoto, Y.4
Jamalipour, A.5
-
9
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Dec
-
J. Al-Karaki and A. Kamal, "Routing techniques in wireless sensor networks: A survey," IEEE Trans. on Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec. 2004.
-
(2004)
IEEE Trans. on Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.1
Kamal, A.2
-
12
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications and Surveys and Tutorials, vol. 8, no. 2, pp. 2-23, 2006.
-
(2006)
IEEE Communications and Surveys and Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
13
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. Pietro, L. Mancini, Y. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," Proc. of IEEE Int'l. Conf. on Parallel Processing Workshops (ICPPW '03), pp. 397-406, 2003.
-
(2003)
Proc. of IEEE Int'l. Conf. on Parallel Processing Workshops (ICPPW '03)
, pp. 397-406
-
-
Pietro, R.1
Mancini, L.2
Law, Y.3
Etalle, S.4
Havinga, P.5
-
14
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sept
-
A. Perrig. R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534. Sept. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
15
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
Nov
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. of the 1st Int'l. Conf. on Embedded Networked Sensor Systems (SenSys '03), Nov. 2003, pp. 255-265.
-
(2003)
Proc. of the 1st Int'l. Conf. on Embedded Networked Sensor Systems (SenSys '03)
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
16
-
-
17144429336
-
SRDA: Secure reference-based data aggregation protocol for wireless sensor networks
-
Sept
-
H. Sanli, S. Ozdemir, and H. Cam, "SRDA: Secure reference-based data aggregation protocol for wireless sensor networks," in Proc. of IEEE VTC Fall 2004 Conf.. vol. 7, Sept. 2004, pp. 4650-4654.
-
(2004)
Proc. of IEEE VTC Fall 2004 Conf
, vol.7
, pp. 4650-4654
-
-
Sanli, H.1
Ozdemir, S.2
Cam, H.3
-
17
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
Oct
-
D. Westhoff, J. Girao, and M. Acharya, "Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation," IEEE Trans. on Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
-
(2006)
IEEE Trans. on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
18
-
-
1542363469
-
ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks
-
Oct
-
H. Cam, S. Ozdemir, P. Nair, and D. Muthuavinashiappan, "ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks," in Proc. of IEEE Sensors, vol. 2, Oct. 2003, pp. 732-736.
-
(2003)
Proc. of IEEE Sensors
, vol.2
, pp. 732-736
-
-
Cam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
-
19
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in Proc. of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '05), May 2005, pp. 378-389.
-
(2005)
Proc. of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '05)
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
23
-
-
38049026593
-
squalnet - a scalable simulation framework for sensor networks
-
B. Vasu, M. Varshney, R. Rengaswamy, M. Marina, A. Dixit, P. Aghera, M. Srivastava, and R. Bagrodia, "squalnet - a scalable simulation framework for sensor networks," in Proc. of the 3rd International conference on Embedded networked sensor systems (SenSys '05), 2005, pp. 322-322.
-
(2005)
Proc. of the 3rd International conference on Embedded networked sensor systems (SenSys '05)
, pp. 322-322
-
-
Vasu, B.1
Varshney, M.2
Rengaswamy, R.3
Marina, M.4
Dixit, A.5
Aghera, P.6
Srivastava, M.7
Bagrodia, R.8
-
24
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer Magazine, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer Magazine
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
|