-
1
-
-
0035688386
-
Low Power Distributed MAC for Ad Hoc Sensor Radio Networks
-
C. Guo, L. C. Zhong, and J. M. Rabaey, "Low Power Distributed MAC for Ad Hoc Sensor Radio Networks", in IEEE GlobeCom 2001, pages 2944-2948, 2001.
-
(2001)
IEEE GlobeCom 2001
, pp. 2944-2948
-
-
Guo, C.1
Zhong, L.C.2
Rabaey, J.M.3
-
2
-
-
0036949371
-
Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices
-
September
-
E. Shih, P. Bahl, and M. J. Sinclair, "Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices," in ACM MobiCom 2002, September 2002.
-
(2002)
ACM MobiCom 2002
-
-
Shih, E.1
Bahl, P.2
Sinclair, M.J.3
-
4
-
-
34548854509
-
-
J. Redi, S. Koleka, K. Manninga, C. Partridgea, R. Rosales-Haina, R. Ramanathana and I. Castineyra, JAVeLEN - An ultra-low energy ad hoc wireless network, in: Ad Hoc Networks, 6, Issue 1, pp. 108-126, Elsevier, 2008.
-
J. Redi, S. Koleka, K. Manninga, C. Partridgea, R. Rosales-Haina, R. Ramanathana and I. Castineyra, "JAVeLEN - An ultra-low energy ad hoc wireless network", in: Ad Hoc Networks, Volume 6, Issue 1, pp. 108-126, Elsevier, 2008.
-
-
-
-
5
-
-
19944366933
-
A MAC Protocol to Reduce Sensor Network Energy Consumption Using a Wakeup Radio
-
May-June, IEEE
-
Matthew J. Miller, Nitin H. Vaidya, "A MAC Protocol to Reduce Sensor Network Energy Consumption Using a Wakeup Radio", IEEE Transactions on Mobile Computing, Volume 4, Issue 3, May-June 2005, Pages 228-242, IEEE, 2005.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
, pp. 228-242
-
-
Miller, M.J.1
Vaidya, N.H.2
-
6
-
-
84869680923
-
-
Rainer Falk, Hans-Joachim Hof, Ulrike Meyer, Christoph Niedermeier, Rudolf Sollacher, Norbert Vicari: From Academia to the Field: Wireless Sensor Networks for Industrial Use, in Proceedings of 7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Technical Report B 08-12, Freie Universität Berlin, Fachbereich Mathematik und Informatik, pages 93-96, ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf, 2008.
-
Rainer Falk, Hans-Joachim Hof, Ulrike Meyer, Christoph Niedermeier, Rudolf Sollacher, Norbert Vicari: "From Academia to the Field: Wireless Sensor Networks for Industrial Use", in Proceedings of 7. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze", Technical Report B 08-12, Freie Universität Berlin, Fachbereich Mathematik und Informatik, pages 93-96, ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf, 2008.
-
-
-
-
7
-
-
84925350331
-
On the RFID wake-up impulse for multihop sensor networks
-
Sydney, Australia
-
Antonio G. Ruzzelli, Raja Jurdak, Gregory M.P. O'Hare, "On the RFID wake-up impulse for multihop sensor networks", In proceedings of 1st ACM Workshop on Convergence of RFID and Wireless Sensor Networks and their Applications (SenseID) at the Fifth ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2007), Sydney, Australia, 2007.
-
(2007)
proceedings of 1st ACM Workshop on Convergence of RFID and Wireless Sensor Networks and their Applications (SenseID) at the Fifth ACM Conference on Embedded Networked Sensor Systems (ACM SenSys
-
-
Ruzzelli, A.G.1
Jurdak, R.2
O'Hare, G.M.P.3
-
9
-
-
57949097368
-
Multi-hop RFID Wake-up Radio: Design, Evaluation and Energy Tradeoffs
-
August
-
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'Hare, "Multi-hop RFID Wake-up Radio: Design, Evaluation and Energy Tradeoffs", in Proceedings of the 17TH International Conference on Computer Communications and Networks (ICCCN), August, 2008.
-
(2008)
Proceedings of the 17TH International Conference on Computer Communications and Networks (ICCCN)
-
-
Jurdak, R.1
Ruzzelli, A.G.2
O'Hare, G.M.P.3
-
10
-
-
0033690336
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
May
-
Adrian Perrig, Ran Canettiz, J. D. Tygar, Dawn Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels", Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 56-73, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Ran Canettiz, J.D.T.2
Song, D.3
-
11
-
-
34547371033
-
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
-
Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, and Mahmut Kandemir, Richard Brooks "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense", in Conference on Innovations and Commercial Applications of Distributed Sensor Networks (ICA DSN), 2005.
-
(2005)
Conference on Innovations and Commercial Applications of Distributed Sensor Networks (ICA DSN)
-
-
Pirretti, M.1
Zhu, S.2
Narayanan, V.3
McDaniel, P.4
Kandemir, M.5
Brooks, R.6
-
12
-
-
2642584004
-
Denial-of-Service Attacks on Battery-powered Mobile Computers
-
IEEE
-
Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers", Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04), pages 309-318, IEEE, 2004.
-
(2004)
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
13
-
-
0013413164
-
-
John Wiley and Sons, New York, ISBN: 0-470-84493-0
-
F. Stajano, "Security for Ubiquitous Computing", John Wiley and Sons, New York, ISBN: 0-470-84493-0, page 267, 2002.
-
(2002)
Security for Ubiquitous Computing
, pp. 267
-
-
Stajano, F.1
-
14
-
-
33644854066
-
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
-
IEEE
-
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, and Michael S. Hsiao, "Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices", Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Pages 141-145, IEEE, 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
15
-
-
0003729341
-
-
RFC 2104, IETF
-
H. Krawczyk, M. Bellare, R. Canetti, " HMAC: Keyed-Hashing for Message Authentication", RFC 2104, IETF, 1997
-
(1997)
HMAC: Keyed-Hashing for Message Authentication
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
16
-
-
0003418425
-
-
RFC 2408, IETF
-
D. Maughan, M. Schertler ,M. Schneider, J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", RFC 2408, IETF, 1998
-
(1998)
Internet Security Association and Key Management Protocol (ISAKMP)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
|