-
1
-
-
35348910049
-
Wireless sensor network security: A survey
-
J.P. Walters et al., "Wireless Sensor Network Security: A Survey," Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, pp. 1-49; http://www. *cs.wayne.edu/~weisong/ papers/walters05 -wsn-security-survey.pdf.
-
Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press
, pp. 1-49
-
-
Walters, J.P.1
-
2
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks,"Computer, vol.35, 2002, pp. 54-62. (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
3
-
-
0013457276
-
Wireless medium access control and physical layer specifications for low-rate wireless personal networks
-
Wireless medium access control and physical layer specifications for low-rate wireless personal networks, Standard 802.15.4, IEEE, 2003.
-
(2003)
Standard 802.15.4, IEEE
-
-
-
5
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol.1, Sep. 2003, p. 293-315. (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
6
-
-
0348195762
-
JAM: A jammed-area mapping service for sensor networks
-
A. Wood, J. Stankovic, and S. Son, "JAM: a jammed-area mapping service for sensor networks," Real-Time Systems Symposium, 2003. RTSS 2003. 24th IEEE, 2003, pp. 286-297.
-
(2003)
Real-Time Systems Symposium 2003 RTSS 2003. 24th IEEE
, pp. 286-297
-
-
Wood, A.1
Stankovic, J.2
Son, S.3
-
8
-
-
51249107460
-
-
Aug.
-
N. Kushalnagar, G. Montenegro, and C. Montenegro, "RFC 4919-IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals," Aug. 2007; *http://tools. ietf.org/html/rfc4919.
-
(2007)
RFC 4919-IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
-
-
Kushalnagar, N.1
Montenegro, G.2
Montenegro, C.3
-
9
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Yih-Chun Hu, A. Perrig, and D. Johnson, "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol.24, 2006, pp. 370-380.
-
(2006)
Selected Areas in Communications, IEEE Journal
, vol.24
, pp. 370-380
-
-
Yih-Chun, H.1
Perrig, A.2
Johnson, D.3
-
10
-
-
73349103606
-
Energy measurements for micaZ node
-
M. Kramer and A. Gerldy, "Energy Measurements for MicaZ Node," Fachgesprach " 2006.
-
(2006)
Fachgesprach
-
-
Kramer, M.1
Gerldy, A.2
-
11
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
Baltimore, MD, USA: ACM
-
V. Shnayder et al., "Simulating the power consumption of large-scale sensor network applications," Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA: ACM, 2004, pp. 188-200;*http://portal.acm.org/citation.cfm?id=1031495.1031518.
-
(2004)
Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 188-200
-
-
Shnayder, V.1
-
12
-
-
4143118994
-
An integrated data-link energy model for wireless sensor networks
-
L. Zhong, J. Rabaey, and A. Wolisz, "An integrated data-link energy model for wireless sensor networks," Communications, 2004 IEEE International Conference on, 2004, pp. 3777-3783 Vol.7.
-
(2004)
Communications, 2004 IEEE International Conference on
, vol.7
, pp. 3777-3783
-
-
Zhong, L.1
Rabaey, J.2
Wolisz, A.3
-
14
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
DOI 10.1109/ICW.2005.47, 1515560, Proceedings - 2005 Systems Communications: ICW 2005, Wireless - ICHSN 2005, High Speed Networks - ICMCS 2005, Multimedia Communications Systems - SENET 2005, Sensor Networks
-
G. Guimaraes et al., "Evaluation of Security Mechanisms in Wireless Sensor Networks," Proceedings of the 2005 Systems Communications, IEEE Computer Society, 2005, pp. 428-433; *http://portal.acm.org/citation.cfm? id=l 090953.1091991 &coll =GUIDE&dl=GUIDE&CFID=9464521&CFTOKEN= 23122 276. (Pubitemid 43791923)
-
(2005)
Proceedings - 2005 Systems Communications: ICW 2005, Wireless - ICHSN 2005, High Speed Networks - ICMCS 2005, Multimedia Communications Systems - SENET 2005, Sensor Networks
, vol.2005
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
15
-
-
39049158752
-
Experimental performance evaluation of cryptographic algorithms on sensor nodes
-
Vancouver, Canada, uni-erlangen.de/ dressler/publications/wsns2006.pdf
-
M. Passing and F. Dressier, "Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes," 3rd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2006): 2nd IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'06), Vancouver, Canada: 2006, pp. 882-887; *http://http://www7.informatik.uni- erlangen.de/ dressler/publications/wsns2006.pdf.
-
(2006)
3rd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2006): 2nd IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'06)
, pp. 882-887
-
-
Passing, M.1
Dressier, F.2
-
18
-
-
70349281772
-
-
"MICAz Wireless Measurement System"; http://*www.xbow. com/products/product-pdf-files/wireless-p df/6020-0060-01-a-micaz.pdf.
-
MICAz Wireless Measurement System
-
-
-
19
-
-
35348832896
-
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
-
DOI 10.1007/s11036-007-0024-2, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. Guest Editors: Maire O'Neill, Xinmiao Zhang, Nicolas Sklavos
-
R. Roman, C. Alcaraz, and J. Lopez, "A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes," Mob. Netw. Appl, vol.12, 2007, pp. 231-244. (Pubitemid 47574435)
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.4
, pp. 231-244
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
|