-
1
-
-
0036986248
-
Rumor routing algorithm for sensor networks
-
D. Braginsky and D. Estrin, "Rumor routing algorithm for sensor networks," in Proc. WSNA, 2002, pp. 22-31.
-
(2002)
Proc. WSNA
, pp. 22-31
-
-
Braginsky, D.1
Estrin, D.2
-
2
-
-
0034291601
-
GPS-less low cost outdoor localization for very small devices
-
Oct.
-
N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less low cost outdoor localization for very small devices," IEEE Personal Commun. Mag., vol.7, no.5, pp. 28-34, Oct. 2000.
-
(2000)
IEEE Personal Commun. Mag.
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
3
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. IEEE INFOCOM, 2005, vol.3, pp. 1917-1928.
-
(2005)
Proc. IEEE INFOCOM
, vol.3
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.2
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM CCS, 2002, pp. 41-47.
-
(2002)
Proc. ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
5
-
-
1542329081
-
Range-free localization schemes in large scale sensor network
-
T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher, "Range-free localization schemes in large scale sensor network," in Proc. ACM MobiCom, 2003, pp. 81-95.
-
(2003)
Proc. ACM MobiCom
, pp. 81-95
-
-
He, T.1
Huang, C.2
Blum, B.3
Stankovic, J.4
Abdelzaher, T.5
-
7
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks," in Proc. ACM MobiCom, 2000, pp. 243-254.
-
(2000)
Proc. ACM MobiCom
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
8
-
-
11244264140
-
SeRLoc: Secure range-independent localization forWireless sensor networks
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization forWireless sensor networks," in Proc. ACM WiSe, 2004, pp. 21-30.
-
(2004)
Proc. ACM WiSe
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
9
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
L. Lazos, R. Poovendran, and S. Capkun, "ROPE: Robust position estimation in wireless sensor networks," inProc. IPSN, 2005, pp. 324-331.
-
(2005)
Proc. IPSN
, pp. 324-331
-
-
Lazos, L.1
Poovendran, R.2
Capkun, S.3
-
10
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. ACM CCS, 2003, pp. 52-56.
-
(2003)
Proc. ACM CCS
, pp. 52-56
-
-
Liu, D.1
Ning, P.2
-
11
-
-
35248891504
-
Organizing a global coordinate system from local information on an ad hoc sensor network
-
LNCS 2634
-
R. Nagpal, H. Shrobe, andJ.Bachrach, "Organizing a global coordinate system from local information on an ad hoc sensor network," in Proc. IPSN, 2003, LNCS 2634, pp. 333-348.
-
(2003)
Proc. IPSN
, pp. 333-348
-
-
Nagpal, R.1
Shrobe, J.2
Bachrach, H.3
-
12
-
-
0035684931
-
Ad-hoc positioning systems (APS)
-
D. Nicolescu and B. Nath, "Ad-hoc positioning systems (APS)," in Proc. IEEE GLOBECOM, 2001, vol.5, pp. 2926-2931.
-
(2001)
Proc. IEEE GLOBECOM
, vol.5
, pp. 2926-2931
-
-
Nicolescu, D.1
Nath, B.2
-
13
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culer, and J. Tygar, "SPINS: Security protocols for sensor networks," in Proc. ACM MobiCom, 2001, pp. 189-199.
-
(2001)
Proc. ACM MobiCom
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culer, D.4
Tygar, J.5
-
14
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. ACM SenSys, 2003, pp. 255-265.
-
(2003)
Proc. ACM SenSys
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
15
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
16
-
-
77249121326
-
-
TinyOS community forum [Online
-
"TinyOS community forum," [Online. Available: http://www. tinyos.net
-
-
-
-
17
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
A. Woo, T. Tong, and D. Culler, "Taming the underlying challenges of reliable multihop routing in sensor networks," in Proc. ACM SenSys, 2003, pp. 14-27.
-
(2003)
Proc. ACM SenSys
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
18
-
-
17144414947
-
Commutative cipher based en-route filtering in wireless sensor networks
-
H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. IEEE VTC, 2004, vol.2, pp. 1223-1227.
-
(2004)
Proc. IEEE VTC
, vol.2
, pp. 1223-1227
-
-
Yang, H.1
Lu, S.2
-
19
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks," in Proc. ACM MobiHoc, 2005, pp. 34-45. (Pubitemid 43037581)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
20
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route detection and filtering of injected false data in sensor networks," in Proc. IEEE IN-FOCOM, 2004, vol.4, pp. 2446-2457.
-
(2004)
Proc. IEEE IN-FOCOM
, vol.4
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
21
-
-
77249097573
-
Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks
-
Y. Yu, R. Govindan, and D. Estrin, "Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks," Comput. Sci. Dept., Univ. California, Los Angeles, UCLA-CSD TR-01-0023, 2001.
-
(2001)
Comput. Sci. Dept., Univ. California, Los Angeles, UCLA-CSD TR-01-0023
-
-
Yu, Y.1
Govindan, R.2
Estrin, D.3
-
22
-
-
38549177436
-
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
-
Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data injection in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Yu, Z.1
Guan, Y.2
-
23
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. ACM CCS, 2003, pp. 62-72.
-
(2003)
Proc. ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
24
-
-
3543056512
-
An interleaved hop-by-Hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-Hop authentication scheme for filtering of injected false data in sensor networks," in Proc. IEEE Symp. Security Privacy, 2004, pp. 259-271.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|