-
1
-
-
33744923193
-
Virtual sink rotation: Low-energy scalable routing protocol for ubiquitous sensor networks
-
L. Choi, K. Choi, J. Kim, B.J. Park, Virtual sink rotation: Low-energy scalable routing protocol for ubiquitous sensor networks, in: Proceedings of the USN, 2005, pp. 1128-1137
-
(2005)
Proceedings of the USN
, pp. 1128-1137
-
-
Choi, L.1
Choi, K.2
Kim, J.3
Park, B.J.4
-
2
-
-
33745152708
-
A stream-oriented power management protocol for low duty cycle sensor network applications
-
N. Ramanathan, M. Yarvis, J. Chhabra, N. Kushalnagar, L. Krishnamurthy, D. Estrin, A stream-oriented power management protocol for low duty cycle sensor network applications, in: Proceedings of the EmNets, 2005, pp. 53-62
-
(2005)
Proceedings of the EmNets
, pp. 53-62
-
-
Ramanathan, N.1
Yarvis, M.2
Chhabra, J.3
Kushalnagar, N.4
Krishnamurthy, L.5
Estrin, D.6
-
3
-
-
4344714071
-
Medium access control with coordinated adaptive sleeping for wireless sensor networks
-
W. Ye, J. Heidemann, and D. Estrin Medium access control with coordinated adaptive sleeping for wireless sensor networks IEEE Transactions on Networking 12 3 June 2004 493 506
-
(2004)
IEEE Transactions on Networking
, vol.12
, Issue.3
, pp. 493-506
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
4
-
-
38149029104
-
Event-driven power management for wireless sensor networks
-
Springer
-
S.H. Lee, B.H. Cho, L. Choi, and S.J. Kim Event-driven power management for wireless sensor networks Lecture Notes in Computer Science vol. 4761/2007 2007 Springer 419 428
-
(2007)
Lecture Notes in Computer Science
, vol.4761
, pp. 419-428
-
-
Lee, S.H.1
Cho, B.H.2
Choi, L.3
Kim, S.J.4
-
5
-
-
35148897382
-
Detecting compromised nodes in wireless sensor networks
-
M. Mathews, M. Song, S. Shetty, R. McKenzie, Detecting compromised nodes in wireless sensor networks, in: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007, pp. 273-278
-
(2007)
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, pp. 273-278
-
-
Mathews, M.1
Song, M.2
Shetty, S.3
McKenzie, R.4
-
6
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
H.Y. Chun, and A. Perrig A survey of secure wireless ad hoc routing IEEE Security & Privacy Magazine 2 3 May-June 2004 28 39
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Chun, H.Y.1
Perrig, A.2
-
9
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi, and A. Perrig Designing secure sensor networks IEEE Wireless Communications 11 6 Dec. 2004 38 43
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
10
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
DOI 10.1109/ICW.2005.47, 1515560, Proceedings - 2005 Systems Communications: ICW 2005, Wireless - ICHSN 2005, High Speed Networks - ICMCS 2005, Multimedia Communications Systems - SENET 2005, Sensor Networks
-
G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: International Conference on Systems Communications, 2005, pp. 428-433 (Pubitemid 43791923)
-
(2005)
Proceedings - 2005 Systems Communications: ICW 2005, Wireless - ICHSN 2005, High Speed Networks - ICMCS 2005, Multimedia Communications Systems - SENET 2005, Sensor Networks
, vol.2005
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
11
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
I. Onat, A. Miri, An intrusion detection system for wireless sensor networks, in: IEEE Conference on Wireless and Mobile Computing, Networking and Communications, 2005, pp. 253-259
-
(2005)
IEEE Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
12
-
-
0036793924
-
Denial of service in sensor networks
-
A.D. Wood, and J.A. Stankovic Denial of service in sensor networks IEEE Computer 35 10 Oct. 2002 54 62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
13
-
-
40949122311
-
Impact of node density and sensing range on intrusion detection in wireless sensor networks
-
X. Wang, Y. Yoo, Y. Wang, D.P. Agrawal, Impact of node density and sensing range on intrusion detection in wireless sensor networks, in: 15th IEEE International Conf. on Computer Communications and Networks, 2006, pp. 323-327
-
(2006)
15th IEEE International Conf. on Computer Communications and Networks
, pp. 323-327
-
-
Wang, X.1
Yoo, Y.2
Wang, Y.3
Agrawal, D.P.4
-
15
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
T. Park, and K.G. Shin Soft tamper-proofing via program integrity verification in wireless sensor networks IEEE Trans. Mobile Computing 4 3 2005 297 309
-
(2005)
IEEE Trans. Mobile Computing
, vol.4
, Issue.3
, pp. 297-309
-
-
Park, T.1
Shin, K.G.2
-
16
-
-
34347249729
-
Remote software-based attestation for wireless sensors
-
July 2005
-
M. Shaneck, K. Mahadevan, V. Kher, Y. Kim, Remote software-based attestation for wireless sensors, in: ESAS, LNCS, vol. 3818, July 2005, pp. 27-41
-
ESAS, LNCS
, vol.3818
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
17
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Oct. 2007
-
Y. Yang, X. Wang, S. Zhu, G. Cao, Distributed software-based attestation for node compromise detection in sensor networks, in: 26th IEEE International Symposium on Reliable Distributed Systems, Oct. 2007, pp. 219-230
-
26th IEEE International Symposium on Reliable Distributed Systems
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
18
-
-
34247361254
-
SCUBA: Secure Code Update by Attestation in sensor networks
-
September 2006
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, P. Khosla, SCUBA: Secure Code Update by Attestation in sensor networks, in: 5th ACM Workshop on Wireless Security, September 2006, pp. 85-94
-
5th ACM Workshop on Wireless Security
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
19
-
-
41549139189
-
Distributed authentication of program integrity verification in wireless sensor networks
-
K. Chang, and K.G. Shin Distributed authentication of program integrity verification in wireless sensor networks IEEE Transactions on Information and System Security 11 3 March 2008
-
(2008)
IEEE Transactions on Information and System Security
, vol.11
, Issue.3
-
-
Chang, K.1
Shin, K.G.2
-
20
-
-
33646915765
-
QoS and energy consumption in wireless sensor networks using CSMA/CA
-
Aug. 2005
-
M. Achir, L. Ouvry, QoS and energy consumption in wireless sensor networks using CSMA/CA, in: IEEE Conference on Systems Communications, Aug. 2005, pp. 33-39
-
IEEE Conference on Systems Communications
, pp. 33-39
-
-
Achir, M.1
Ouvry, L.2
-
21
-
-
8344272010
-
Modeling the performance of wireless sensor networks
-
March 2004
-
C.-F. Chiasserini, M. Garetto, Modeling the performance of wireless sensor networks, in: INFOCOM, March 2004
-
INFOCOM
-
-
Chiasserini, C.-F.1
Garetto, M.2
-
22
-
-
44949216521
-
Measuring energy consumption in wireless sensor networks
-
Sept. 2006
-
M. Calle, J. Kabara, Measuring energy consumption in wireless sensor networks, in: IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, Sept. 2006, pp. 1-5
-
IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications
, pp. 1-5
-
-
Calle, M.1
Kabara, J.2
-
24
-
-
84856199931
-
Wireless sensor payload design for sounding rocket
-
March 2007
-
S. Shetty, M. Song, R.A.E. Ancel, K. Bone, Wireless sensor payload design for sounding rocket, in: 22nd International Conference on Computers and Their Applications, March 2007
-
22nd International Conference on Computers and Their Applications
-
-
Shetty, S.1
Song, M.2
Ancel, R.A.E.3
Bone, K.4
-
25
-
-
67650844989
-
Sensor network security: A survey
-
X. Chen, K. Makki, Y. Kang, and N. Pissinou Sensor network security: A survey IEEE Communications Surveys and Tutorials 11 2 2009 52 73
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Kang, Y.3
Pissinou, N.4
|