-
2
-
-
36349021963
-
Security for wireless sensor networks
-
S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, "Security for Wireless Sensor Networks," in Wireless Sensor Networks, 2004, pp. 253-275.
-
(2004)
Wireless Sensor Networks
, pp. 253-275
-
-
Avancha, S.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
3
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing Wireless Sensor Networks: A Survey," IEEE Communications Surveys & Tutorials,, vol. 10, pp. 6-28, 2008.
-
(2008)
IEEE Communications Surveys & Tutorials
, vol.10
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
5
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wirel. Netw., vol. 8, pp. 521-534, 2002.
-
(2002)
Wirel. Netw.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
-
6
-
-
49149099123
-
-
Department of Computer Science, University of Tennessee, Knoxville
-
M. Saraogi, "Security in wireless sensor networks," Department of Computer Science, University of Tennessee, Knoxville 2005.
-
(2005)
Security in Wireless Sensor Networks
-
-
Saraogi, M.1
-
8
-
-
0036688074
-
A survey on sensor networks
-
IEEE
-
I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
-
(2002)
Communications Magazine
, vol.40
, pp. 102-114
-
-
Akyildiz, I.F.1
Weilian, S.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
9
-
-
14344252668
-
Real-time communication and coordination in embedded sensor networks
-
J. A. Stankovic, T. E. Abdelzaher, C. Lu, L. Sha, and J. C. Hou, "Real-time communication and coordination in embedded sensor networks," Proceedings of the IEEE, vol. 91, pp. 1002-1022, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, pp. 1002-1022
-
-
Stankovic, J.A.1
Abdelzaher, T.E.2
Lu, C.3
Sha, L.4
Hou, J.C.5
-
10
-
-
77954323885
-
Capsule: An energy-optimized object storage system for memory-constrained sensor devices
-
Colorado, USA: ACM
-
M. Gaurav, D. Peter, G. Deepak, and S. Prashant, "Capsule: an energy-optimized object storage system for memory-constrained sensor devices," in Proceedings of the 4th international conference on Embedded networked sensor systems Boulder, Colorado, USA: ACM, 2006.
-
(2006)
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems Boulder
-
-
Gaurav, M.1
Peter, D.2
Deepak, G.3
Prashant, S.4
-
12
-
-
33846161991
-
Search on security in sensor networks
-
Dec.
-
P. Li, Y. Lin, and W. Zeng, "Search on Security in Sensor Networks," Journal of Software, vol. 17, pp. 2577-2588, Dec. 2006.
-
(2006)
Journal of Software
, vol.17
, pp. 2577-2588
-
-
Li, P.1
Lin, Y.2
Zeng, W.3
-
13
-
-
67650535901
-
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
-
A. C. Alvaro, R. Tanya, and S. Shankar, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Netw., vol. 7, pp. 1434-1447, 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, pp. 1434-1447
-
-
Alvaro, A.C.1
Tanya, R.2
Shankar, S.3
-
14
-
-
62749140180
-
Survey of security requirements, attacks and network integration in wireless mesh networks
-
H. Redwan and K. Ki-Hyung, "Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks," in Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on, 2008, pp. 3-9.
-
(2008)
Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
, pp. 3-9
-
-
Redwan, H.1
Ki-Hyung, K.2
-
15
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in 2005 IEEE Symposium on Security and Privacy, 2005, pp. 49-63.
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
16
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
IEEE
-
W. Yong, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," Communications Surveys & Tutorials, IEEE, vol. 8, pp. 2-23, 2006.
-
(2006)
Communications Surveys & Tutorials
, vol.8
, pp. 2-23
-
-
Yong, W.1
Attebury, G.2
Ramamurthy, B.3
-
18
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
19
-
-
0345565893
-
A survey of key management for secure group communication
-
R. Sandro and H. David, "A survey of key management for secure group communication," ACM Comput. Surv., vol. 35, pp. 309-329, 2003.
-
(2003)
ACM Comput. Surv.
, vol.35
, pp. 309-329
-
-
Sandro, R.1
David, H.2
-
20
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, USA: ACM
-
H. Yih-Chun, P. Adrian, and B. J. David, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proceedings of the 2nd ACM workshop on Wireless security San Diego, CA, USA: ACM, 2003.
-
(2003)
Proceedings of the 2nd ACM Workshop on Wireless Security
-
-
Yih-Chun, H.1
Adrian, P.2
David, B.J.3
-
22
-
-
39449120475
-
Low-power direct conversion transceiver for 915 MHz band IEEE 802.15.4b standard based on 0.18 μm CMOS technology
-
February
-
T.-K. Nguyen, V.-H. Le, Q.-H. Duong, S.-K. Han, S.-G. Lee, N.-S. Seong, N.-S. Kim, and C.-S. Pyo, "Low-Power Direct Conversion Transceiver for 915 MHz Band IEEE 802.15.4b Standard Based on 0.18 μm CMOS Technology," ETRI Journal, vol. 30, pp. 33-46, February 2008.
-
(2008)
ETRI Journal
, vol.30
, pp. 33-46
-
-
Nguyen, T.-K.1
Le, V.-H.2
Duong, Q.-H.3
Han, S.-K.4
Lee, S.-G.5
Seong, N.-S.6
Kim, N.-S.7
Pyo, C.-S.8
|