-
1
-
-
34548355193
-
Location-Aware Security Services for Wireless Sensor Networks using Network Coding
-
May
-
E. Ayday, F. Delgosha, and F. Fekri, "Location-Aware Security Services for Wireless Sensor Networks using Network Coding," Infocom, May 2007.
-
(2007)
Infocom
-
-
Ayday, E.1
Delgosha, F.2
Fekri, F.3
-
2
-
-
51249086542
-
Robust Distributed Spectrum Sensing in Cognitive Radio Networks,
-
Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech, July
-
R. Chen, J. M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech., July 2006.
-
(2006)
-
-
Chen, R.1
Park, J.M.2
Bian, K.3
-
3
-
-
47049129658
-
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
-
June 19-25, Athens, Greece
-
D.-I. Curiac, O. Banias, F. Dragan, C. Volosencu, and O. Dranga, "Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique," the 3rd International Conference on Networking and Services (ICNS'07), June 19-25, 2007, Athens, Greece.
-
(2007)
the 3rd International Conference on Networking and Services (ICNS'07)
-
-
Curiac, D.-I.1
Banias, O.2
Dragan, F.3
Volosencu, C.4
Dranga, O.5
-
4
-
-
33746313270
-
LAD: Localization Anomaly Detection for Wireless Sensor Networks
-
April 3-8, Denver, Colorado, USA
-
th International Parallel and Distributed Priocessing Symposium (IPDPS'05), April 3-8, 2005, Denver, Colorado, USA.
-
(2005)
th International Parallel and Distributed Priocessing Symposium (IPDPS'05)
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
5
-
-
85074375621
-
Next Century Challenges: Scalable Coordination in Sensor Networks
-
August
-
D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next Century Challenges: Scalable Coordination in Sensor Networks," MOBICOM, August 1999
-
(1999)
MOBICOM
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
6
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," IEEE INFOCOM, 2003
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
7
-
-
12444320349
-
Malicious Node Detection in Wireless Sensor Networks
-
April 26-30, Santa Fe, Nex Mexico, USA
-
th International Parallel and Distributed Priocessing Symposium (IPDPS'04), April 26-30, 2004, Santa Fe, Nex Mexico, USA.
-
(2004)
th International Parallel and Distributed Priocessing Symposium (IPDPS'04)
-
-
Junior, W.1
Figueriredo, T.2
Wong, H.-C.3
Loureiro, A.4
-
8
-
-
32144459886
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
November
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," A CM Sensys, November 2004.
-
(2004)
A CM Sensys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
Elsevier
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Journal of Ad Hoc Networks, Elsevier, 2003
-
(2003)
Journal of Ad Hoc Networks
-
-
Karlof, C.1
Wagner, D.2
-
10
-
-
84976699318
-
The Byzantine Generals Problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem," A CM Transactions on Programming Languages and Systems, Vol. 4, No. 3, July 1982.
-
(1982)
A CM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
11
-
-
84883869163
-
Self-securing Ad Hoc Wireless Networks
-
Italy
-
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia Zhang, "Self-securing Ad Hoc Wireless Networks," IEEE ISCC (IEEE Symposium on Computers and Communications) 2002, Italy.
-
(2002)
IEEE ISCC (IEEE Symposium on Computers and Communications)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
12
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defense
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis and Defense," International Symposium on Information Processing in Sensor Networks, Vol. 1 (2004).
-
(2004)
International Symposium on Information Processing in Sensor Networks
, vol.1
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
13
-
-
18844457825
-
SIA: Secure Information Aggregation in Sensor Networks
-
November 05-07, Los Angeles, California, USA
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," Proceedings of the 1st international conference on Embedded networked sensor systems, November 05-07, 2003, Los Angeles, California, USA.
-
(2003)
Proceedings of the 1st international conference on Embedded networked sensor systems
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
14
-
-
70249116660
-
From 'small Sensor Networks' to 'Sensor Networks'
-
May
-
S. D. Servetto, "From 'small Sensor Networks' to 'Sensor Networks'", EmNets 2006, May 2006.
-
(2006)
EmNets 2006
-
-
Servetto, S.D.1
-
16
-
-
4143104126
-
Sensor Networks: An Overview
-
April
-
M. Tubaishat and S. Madria., "Sensor Networks: an Overview," IEEE Potentials, 22, 2, 20-23, April 2003.
-
(2003)
IEEE Potentials
, vol.22
, Issue.2
, pp. 20-23
-
-
Tubaishat, M.1
Madria, S.2
-
17
-
-
84938685054
-
Survey on Wireless Sensor Network Devices
-
ETFA03, September
-
M.A.M. Vieira, D.C. da Silva Jr., C.N. Coelho Jr., and J.M. da Mata., "Survey on Wireless Sensor Network Devices," Emerging Technologies and Factory Automation (ETFA03), September 2003.
-
(2003)
Emerging Technologies and Factory Automation
-
-
Vieira, M.A.M.1
da Silva Jr., D.C.2
Coelho Jr., C.N.3
da Mata, J.M.4
-
18
-
-
34547398467
-
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
-
SenSys, Boulder, Colorado, USA, November
-
W. Ye, F. Silva, and J. Heidemann, "Ultra-Low Duty Cycle MAC with Scheduled Channel Polling", in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys), Boulder, Colorado, USA, November, 2006.
-
(2006)
Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems
-
-
Ye, W.1
Silva, F.2
Heidemann, J.3
-
19
-
-
8344239614
-
Energy-Latency Tradeoffs for Data Gathering in Wireless Sensor Networks
-
Y. Yu, B. Krishnamachari, and V.K. Prasanna, "Energy-Latency Tradeoffs for Data Gathering in Wireless Sensor Networks," IEEEInfocom'04
-
IEEEInfocom'04
-
-
Yu, Y.1
Krishnamachari, B.2
Prasanna, V.K.3
-
20
-
-
17744363146
-
Routing Protocols for Self-Organizing Hierarchical Ad-Hoc Wireless Networks
-
Trenton, NJ, March
-
S. Zhao, K. Tepe, I. Seskar and D. Raychaudhuri, "Routing Protocols for Self-Organizing Hierarchical Ad-Hoc Wireless Networks," Proceedings of the IEEE Sarnoff Symposium, Trenton, NJ, March 2003.
-
(2003)
Proceedings of the IEEE Sarnoff Symposium
-
-
Zhao, S.1
Tepe, K.2
Seskar, I.3
Raychaudhuri, D.4
-
21
-
-
0033357103
-
Securing Ad Hoc Networks
-
November
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Special Issue on Network Security, 13, 6, 24-30, November 1999.
-
(1999)
IEEE Network Special Issue on Network Security
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
22
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," CCS'03, October 2003.
-
(2003)
CCS'03
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|