-
1
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
Jun
-
M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," in Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop, Jun. 2005, pp. 356-364.
-
(2005)
Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop
, pp. 356-364
-
-
Brownfield, M.1
Gupta, Y.2
Davis, N.3
-
2
-
-
44049105799
-
-
Moteiv Corporation, Redwood City, CA. Accessed Feb, 2006, Online, Available
-
Tmote Sky Datasheet: Low Power Wireless Sensor Module, Moteiv Corporation, Redwood City, CA. Accessed Feb., 2006. [Online]. Available: http://www.moteiv.com/
-
Tmote Sky Datasheet: Low Power Wireless Sensor Module
-
-
-
3
-
-
67650304313
-
-
CrossBow Corporation, San Jose, CA. Accessed May 2006, Online, Available
-
Mica2 Datasheet, CrossBow Corporation, San Jose, CA. Accessed May 2006. [Online]. Available: http://www.xbow.com/
-
Mica2 Datasheet
-
-
-
4
-
-
4344714071
-
Medium access control with coordinated adaptive sleeping for wireless sensor networks
-
Jun
-
W. Ye, J. Heidemann, and D. Estrin, "Medium access control with coordinated adaptive sleeping for wireless sensor networks," IEEE/ACM Trans. Netw., vol. 12, no. 3, pp. 493-506, Jun. 2004.
-
(2004)
IEEE/ACM Trans. Netw
, vol.12
, Issue.3
, pp. 493-506
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
6
-
-
26444451023
-
Versatile low power media access for wireless sensor networks
-
Nov
-
J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," in Proc. 2nd ACM Int. Conf. Embedded Netw. Sensor Syst., Nov. 2004, pp. 95-107.
-
(2004)
Proc. 2nd ACM Int. Conf. Embedded Netw. Sensor Syst
, pp. 95-107
-
-
Polastre, J.1
Hill, J.2
Culler, D.3
-
7
-
-
33749071598
-
Wireless sensor network energy-adaptive MAC protocol
-
Jan
-
M. Brownfield, K. Mehrjoo, A. Fayez, and N. Davis, "Wireless sensor network energy-adaptive MAC protocol," in Proc. IEEE Consum. Commun. Netw. Conf., Jan. 2006, pp. 778-782.
-
(2006)
Proc. IEEE Consum. Commun. Netw. Conf
, pp. 778-782
-
-
Brownfield, M.1
Mehrjoo, K.2
Fayez, A.3
Davis, N.4
-
8
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
Jan
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. Hawaii Int. Conf. Syst. Sci., Jan. 2000, pp. 8020-8029.
-
(2000)
Proc. Hawaii Int. Conf. Syst. Sci
, pp. 8020-8029
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
9
-
-
0035727032
-
Low power TDMA in large wireless sensor networks
-
Oct
-
G. Pei and C. Chien, "Low power TDMA in large wireless sensor networks," in Proc. AFCEA/IEEE Military Commun. Conf., Oct. 2001, pp. 347-351.
-
(2001)
Proc. AFCEA/IEEE Military Commun. Conf
, pp. 347-351
-
-
Pei, G.1
Chien, C.2
-
10
-
-
0003264517
-
PAMAS: Power aware multi-access protocol with signaling for ad hoc networks
-
Jul
-
S. Singh and C. S. Raghavendra, "PAMAS: Power aware multi-access protocol with signaling for ad hoc networks," Comput. Commun. Rev. vol. 28, no. 3, pp. 5-26, Jul. 1999.
-
(1999)
Comput. Commun. Rev
, vol.28
, Issue.3
, pp. 5-26
-
-
Singh, S.1
Raghavendra, C.S.2
-
12
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb
-
A. Perrig, R. Canetti, D. Song, and J. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annu. Symp. Netw. Distrib. Syst. Security, Feb. 2001, pp. 35-46.
-
(2001)
Proc. 8th Annu. Symp. Netw. Distrib. Syst. Security
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
13
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Nov
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst., Nov. 2004, pp. 162-175.
-
(2004)
Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
59649099106
-
-
LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-rate Wireless Personal Area Networks (LR-WPANs), IEEE Std. 802.15.4, 2003.
-
LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-rate Wireless Personal Area Networks (LR-WPANs), IEEE Std. 802.15.4, 2003.
-
-
-
-
15
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
16
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
May
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 11th Annu. Int. Conf. Mobile Comput. Netw., May 2005, pp. 46-57.
-
(2005)
Proc. 11th Annu. Int. Conf. Mobile Comput. Netw
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
17
-
-
33645628961
-
-
Carnegie Mellon Univ, Pittsburgh, PA, Tech. Rep
-
R. Negi and A. Perrig, "Jamming analysis of MAC protocols," Carnegie Mellon Univ., Pittsburgh, PA, 2003. Tech. Rep.
-
(2003)
Jamming analysis of MAC protocols
-
-
Negi, R.1
Perrig, A.2
-
18
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Nov
-
Y. W. Law, L. van Hoesel, J. Doumen, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," in Proc. 3rd ACM Workshop Security Ad Hoc Sensor Netw. Nov. 2005, pp. 76-88.
-
(2005)
Proc. 3rd ACM Workshop Security Ad Hoc Sensor Netw
, pp. 76-88
-
-
Law, Y.W.1
van Hoesel, L.2
Doumen, J.3
Havinga, P.4
-
19
-
-
59649115976
-
-
Accessed Jun. 2006, Online, Available
-
SourceForge.net. Accessed Jun. 2006. [Online]. Available: http:// sourceforge.net/
-
-
-
-
22
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Dec
-
O. Younis and S. Fahmy, "HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366-379, Dec. 2004.
-
(2004)
IEEE Trans. Mobile Comput
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
23
-
-
35048874134
-
ACE: An emergent algorithm for highly uniform cluster formation
-
Jan
-
H. Chan and A. Perrig, "ACE: An emergent algorithm for highly uniform cluster formation," in Proc. 1st Eur. Workshop Sensor Netw., Jan. 2004, pp. 154-171.
-
(2004)
Proc. 1st Eur. Workshop Sensor Netw
, pp. 154-171
-
-
Chan, H.1
Perrig, A.2
-
24
-
-
48749130963
-
Scalable, cluster-based anti-replay protection for wireless sensor networks
-
Jun
-
D. Raymond, R. Marchany, and S. Midkiff, "Scalable, cluster-based anti-replay protection for wireless sensor networks," in Proc. 8th Annu. IEEE SMC Inf. Assurance Workshop, Jun. 2007, pp. 127-134.
-
(2007)
Proc. 8th Annu. IEEE SMC Inf. Assurance Workshop
, pp. 127-134
-
-
Raymond, D.1
Marchany, R.2
Midkiff, S.3
-
25
-
-
47949099622
-
Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks
-
Oct
-
D. Raymond and S. Midkiff, "Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks," in Proc. AFCEA/IEEE Military Commun. Conf., Oct. 2007, pp. 1-7.
-
(2007)
Proc. AFCEA/IEEE Military Commun. Conf
, pp. 1-7
-
-
Raymond, D.1
Midkiff, S.2
-
26
-
-
1342294845
-
-
Bethesda, MD: OPNET Technol. Inc. Accessed Aug, Online, Available
-
OPNET Modeler, Bethesda, MD: OPNET Technol. Inc. Accessed Aug. 2006. [Online]. Available: http://www.opnet.com/
-
(2006)
OPNET Modeler
-
-
|