-
1
-
-
0035438937
-
-
J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, B. Heile, IEEE 802.15.4: A Developing Standard for Low-Power Low- Cost Wireless Personal Area Networks, IEEE Network,15, no. 5, pp 12-19, Sep., 2001.
-
J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, B. Heile, "IEEE 802.15.4: A Developing Standard for Low-Power Low- Cost Wireless Personal Area Networks," IEEE Network,vol. 15, no. 5, pp 12-19, Sep., 2001.
-
-
-
-
2
-
-
33748567165
-
An Implementation of Battery- aware Wireless Sensor Network Using ZigBee for Multimedia Service
-
H.C. Huang, J.W. Din, Y.M. Huang, "An Implementation of Battery- aware Wireless Sensor Network Using ZigBee for Multimedia Service," Int. Conf. Consumer Electronics, 2006, pp. 369-370.
-
(2006)
Int. Conf. Consumer Electronics
, pp. 369-370
-
-
Huang, H.C.1
Din, J.W.2
Huang, Y.M.3
-
3
-
-
33645991463
-
-
Harvard Univ, Tech. Rep. TR-08-05, April
-
V. Shnayder, B.R. Chen, K. Lorincz, R.F. Thaddeus. F. Jones, and M. Welsh, "Sensor Networks for Medical Care," Harvard Univ., Tech. Rep. TR-08-05, April 2005.
-
(2005)
Sensor Networks for Medical Care
-
-
Shnayder, V.1
Chen, B.R.2
Lorincz, K.3
Thaddeus, R.F.4
Jones, F.5
Welsh, M.6
-
4
-
-
45849120977
-
ALARM-NET: Wireless Sensor Networks for Assisted-Living And Residential Monitoring
-
Dept. Computer Science, Virginia Univ, Tech. Rep. CS-2006-11
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless Sensor Networks for Assisted-Living And Residential Monitoring," Dept. Computer Science, Virginia Univ., Tech. Rep. CS-2006-11, 2006.
-
(2006)
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
5
-
-
84858911934
-
-
Crossbow Technology, Inc, Online, Available
-
Crossbow Technology, Inc. MICA2 Series. [Online]. Available: http://www.xbow.com/Products/productsdetails.aspx?sid=72.
-
MICA2 Series
-
-
-
6
-
-
84858104395
-
-
Crossbow Technology, Inc, Online, Available
-
Crossbow Technology, Inc. MICAz ZigBee Series. [Online]. Available: http://www.xbow.com/Products/productsdetails.aspx?sid=101.
-
MICAz ZigBee Series
-
-
-
8
-
-
33646918131
-
Telos: Enabling ultra-low power wireless research
-
J. Polastre, R. Szewczyk, and D. Culler, "Telos: enabling ultra-low power wireless research", in Proc. 4th Sensor Networks,2005, pp. 364-369.
-
(2005)
Proc. 4th Sensor Networks
, pp. 364-369
-
-
Polastre, J.1
Szewczyk, R.2
Culler, D.3
-
9
-
-
16244418785
-
Bluetooth and sensor networks: A reality check
-
November
-
M. Leopold, M. B. Dydensborg, and P. Bonnet, "Bluetooth and sensor networks: a reality check," in Proc. 1st Int. Conf. Embedded Networked Sensor Systems,November 2003, pp.103-113.
-
(2003)
Proc. 1st Int. Conf. Embedded Networked Sensor Systems
, pp. 103-113
-
-
Leopold, M.1
Dydensborg, M.B.2
Bonnet, P.3
-
11
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
Apr
-
H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," British Telecom Technology Journal,vol. 24 no. 2, Apr. 2006, pp. 138-144
-
(2006)
British Telecom Technology Journal
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
12
-
-
67349286112
-
-
O.G. Morchon, H. Baldus, D.S. Sanchez, Philips Res. Labs., and Aachen, Resource-efficient security for medical body sensor networks, Int. Wksp. on Wearable and Implantable Body Sensor Networks,April, 2006.
-
O.G. Morchon, H. Baldus, D.S. Sanchez, Philips Res. Labs., and Aachen, "Resource-efficient security for medical body sensor networks," Int. Wksp. on Wearable and Implantable Body Sensor Networks,April, 2006.
-
-
-
-
13
-
-
77956355220
-
A Wireless Body Sensor Network System for Healthcare Monitoring Application
-
Canada, Nov
-
S. L. Chen, H. Y. Lee, C. A. Chen, C. C. Lin, and C. H. Luo, "A Wireless Body Sensor Network System for Healthcare Monitoring Application", IEEE Biomedical Circuits and System Conf.,Canada, Nov. 2007 pp. 243-246
-
(2007)
IEEE Biomedical Circuits and System Conf
, pp. 243-246
-
-
Chen, S.L.1
Lee, H.Y.2
Chen, C.A.3
Lin, C.C.4
Luo, C.H.5
-
14
-
-
46449106729
-
A wireless sensor network for pervasive medical supervision
-
Shenzhen, China, March
-
B. Zhou, C. Hu, M.Q.-H. Meng, H.B. Wang, R. Guo, "A wireless sensor network for pervasive medical supervision," in Proc. ICIT '07 IEEE Int. Conf. Integration Technology,Shenzhen, China, March, 2007.
-
(2007)
Proc. ICIT '07 IEEE Int. Conf. Integration Technology
-
-
Zhou, B.1
Hu, C.2
Meng, M.Q.-H.3
Wang, H.B.4
Guo, R.5
-
15
-
-
44249096381
-
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
-
Advanced Communication Technology
-
M.M. Haque, A.-S.K. Pathan, "Securing U-Healthcare Sensor Networks using Public Key Based Scheme," in Proc. 10st Int. Conf.Advanced Communication Technology, 2008, pp. 1108-1111.
-
(2008)
Proc. 10st Int. Conf
, pp. 1108-1111
-
-
Haque, M.M.1
Pathan, A.-S.K.2
-
16
-
-
36348970576
-
Privacy-preserving tele- cardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign
-
F. Hu, M. Jiang, M. Wagner, D.C. Dong, "Privacy-preserving tele- cardiology sensor networks: toward a low-cost portable wireless hardware/software codesign," IEEE Trans. Inform. Technol. Biomed.,vol.11, no. 6, pp. 619-627, 2007.
-
(2007)
IEEE Trans. Inform. Technol. Biomed
, vol.11
, Issue.6
, pp. 619-627
-
-
Hu, F.1
Jiang, M.2
Wagner, M.3
Dong, D.C.4
-
17
-
-
33744970486
-
Design and implementation of an enhanced security layer for bluetooth
-
Zagreb, Croatia
-
P. Hämäläinen, N. Liu, R. Leppisaari, M. Hännikäinen, T.D. Hämäläinen, "Design and implementation of an enhanced security layer for bluetooth," 8th IEEE Int. Conf. Telecommunications,Zagreb, Croatia, 2005, pp. 575-582.
-
(2005)
8th IEEE Int. Conf. Telecommunications
, pp. 575-582
-
-
Hämäläinen, P.1
Liu, N.2
Leppisaari, R.3
Hännikäinen, M.4
Hämäläinen, T.D.5
-
18
-
-
31344471100
-
-
D. Kugler, Man in the middle attacks on bluetooth, in Proc. 7th Int. Financial Cryptography Conf,French West Indies, Jan. 2003, pp. 149-161.
-
D. Kugler, "Man in the middle attacks on bluetooth," in Proc. 7th Int. Financial Cryptography Conf,French West Indies, Jan. 2003, pp. 149-161.
-
-
-
-
19
-
-
33744981160
-
Secure authorization, access control and data integrity in Bluetooth
-
Singapore, Aug
-
L. Nguyen, R. Safavi-Naini, W. Susilo, and T. Wysocki, "Secure authorization, access control and data integrity in Bluetooth," in Proc. 10th IEEE Int. Conf. on Networks,Singapore, Aug. 2002, pp. 428-433.
-
(2002)
Proc. 10th IEEE Int. Conf. on Networks
, pp. 428-433
-
-
Nguyen, L.1
Safavi-Naini, R.2
Susilo, W.3
Wysocki, T.4
-
20
-
-
85191944329
-
-
Suri, Pushpa R. Rani, Sona, Bluetooth security - need to increase the efficiency in pairing, IEEE Southeastcon,April 2008, pp. 607-609.
-
Suri, Pushpa R. Rani, Sona, "Bluetooth security - need to increase the efficiency in pairing", IEEE Southeastcon,April 2008, pp. 607-609.
-
-
-
-
21
-
-
44249123750
-
On Secure e-Health Systems
-
Springer-Verlag
-
M. Markovic, "On Secure e-Health Systems", Springer-Verlag (LNCS 4302),2006, pp. 360-374.
-
(2006)
LNCS
, vol.4302
, pp. 360-374
-
-
Markovic, M.1
-
22
-
-
33748525240
-
Privacy and security control architecture for ubiquitous RFID healthcare system in wireless sensor networks
-
Jan
-
W. J. Song, S. H. Son, M. Choi, and M. Kang, "Privacy and security control architecture for ubiquitous RFID healthcare system in wireless sensor networks", In Proc. IEEE ICCE 2006,Jan., 2006, pp. 239-240
-
(2006)
In Proc. IEEE ICCE 2006
, pp. 239-240
-
-
Song, W.J.1
Son, S.H.2
Choi, M.3
Kang, M.4
-
23
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
Y. Zhou, Y. Fang, "A two-layer key establishment scheme for wireless sensor networks," IEEE Trans. Mob. Comput., vol. 6, no. 9, pp. 1009-1020, 2007.
-
(2007)
IEEE Trans. Mob. Comput
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
24
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks0
-
Sept
-
M.Y. Hsieh, Y.M. Huang, and H.C. Chao, "Adaptive security design with malicious node detection in cluster-based sensor networks0," Computer Communications,vol. 30, pp. 2385-2400, Sept. 2007.
-
(2007)
Computer Communications
, vol.30
, pp. 2385-2400
-
-
Hsieh, M.Y.1
Huang, Y.M.2
Chao, H.C.3
-
25
-
-
84904385271
-
Remote Medical Monitoring
-
April
-
A. D. Jurik, A. C. Weaver, "Remote Medical Monitoring," Computer,vol. 41, no. 4, pp. 96-99, April 2008.
-
(2008)
Computer
, vol.41
, Issue.4
, pp. 96-99
-
-
Jurik, A.D.1
Weaver, A.C.2
-
26
-
-
84903803889
-
A wearable context aware system for ubiquitous healthcare
-
August
-
D. O. Kang, H. J. Lee, E. J. Ko, K. Kang, and J. Lee, "A wearable context aware system for ubiquitous healthcare," in Proc. 28th IEEE EMBS Annual Int. Conf.,August 2006, pp. 5192-5195.
-
(2006)
Proc. 28th IEEE EMBS Annual Int. Conf
, pp. 5192-5195
-
-
Kang, D.O.1
Lee, H.J.2
Ko, E.J.3
Kang, K.4
Lee, J.5
-
27
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Jan
-
Y.C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks", ACM and Springer Wireless Networks,vol. 11, pp. 21-38, Jan. 2005.
-
(2005)
ACM and Springer Wireless Networks
, vol.11
, pp. 21-38
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
28
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, D. LaFlamme, B. N. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks," In Proc. IEEE Int. Conf. Network Protocols,2002, pp. 78-89.
-
(2002)
In Proc. IEEE Int. Conf. Network Protocols
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
LaFlamme, D.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.6
-
29
-
-
77953838402
-
Cracking the Bluetooth PIN
-
Seattle, WA, June
-
Y. Shaked, and A. Wool. "Cracking the Bluetooth PIN," In Proc. 3rd USENIXIACM Conf. Mobile Systems, Applications, and Services,Seattle, WA, June 2005, pp. 39-50.
-
(2005)
Proc. 3rd USENIXIACM Conf. Mobile Systems, Applications, and Services
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
30
-
-
67349199871
-
-
Bluetooth SIG, Bluetooth Security, ver. 1.1, pp. 148-180, Feb. 2001
-
Bluetooth SIG, "Bluetooth Security," ver. 1.1, pp. 148-180, Feb. 2001.
-
-
-
-
31
-
-
67349186555
-
-
Johnson, and Maltz (1998). The dynamic source routing protocol for mobile ad hoc networks. IETF Internet Draf.[Online]. Available: http://www.ietf.org/internetdrafts/draft-ietf-manet-dsr-01.txt.
-
Johnson, and Maltz (1998). The dynamic source routing protocol for mobile ad hoc networks. IETF Internet Draf.[Online]. Available: http://www.ietf.org/internetdrafts/draft-ietf-manet-dsr-01.txt.
-
-
-
-
34
-
-
67349129291
-
6lowpan: Overview, Assumptions, Problem Statement and Goals
-
Online, Available
-
N. Kushalnagar, G. Montenegro (2006), 6lowpan: Overview, Assumptions, Problem Statement and Goals, IETF draft.[Online]. Available: http://www.ietf.org/rfc/rfc4919.txt
-
(2006)
IETF draft
-
-
Kushalnagar, N.1
Montenegro, G.2
|