-
1
-
-
33845708421
-
A survey on wireless multimedia sensor networks
-
Akyildiz, I. F., Melodia, T., & Chowdhury, K. R. (2006). A survey on wireless multimedia sensor networks. Computer Networks, 921-960.
-
(2006)
Computer Networks
, pp. 921-960
-
-
Akyildiz, I.F.1
Melodia, T.2
Chowdhury, K.R.3
-
2
-
-
20744446446
-
Distributed video coding
-
January 2005
-
Girod, B., Aaron, A., Rane, S., & Rebollo-Monedero, D. (2005). Distributed video coding. In Proc. IEEE (Vol. 93, p. 7183). January 2005.
-
(2005)
Proc. IEEE
, vol.93
, pp. 7183
-
-
Girod, B.1
Aaron, A.2
Rane, S.3
Rebollo-Monedero, D.4
-
3
-
-
84905869044
-
Cyclops: In situ image sensing and interpretation in wireless sensor networks
-
ACM New York. 10.1145/1098918.1098939
-
Rahimi, M., Baer, R., Iroezi, O. I., Garcia, J. C., Warrior, J., Estrin, D., & Srivastava, M. (2005). Cyclops: in situ image sensing and interpretation in wireless sensor networks. In SenSys '05: Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 192-204). New York: ACM.
-
(2005)
SenSys '05: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems
, pp. 192-204
-
-
Rahimi, M.1
Baer, R.2
Iroezi, O.I.3
Garcia, J.C.4
Warrior, J.5
Estrin, D.6
Srivastava, M.7
-
5
-
-
84883065413
-
SensEye: A multi-tier camera sensor network
-
ACM New York. 10.1145/1101149.1101191
-
Kulkarni, P., Ganesan, D., Shenoy, P., & Lu, Q. (2005). SensEye: a multi-tier camera sensor network. In MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on multimedia (pp. 229-238). New York: ACM.
-
(2005)
MULTIMEDIA '05: Proceedings of the 13th Annual ACM International Conference on Multimedia
, pp. 229-238
-
-
Kulkarni, P.1
Ganesan, D.2
Shenoy, P.3
Lu, Q.4
-
6
-
-
77955307709
-
-
Barcelona, Spain, September 2008.
-
Zilan, R., Barcelo-Ordinas, J. M., & Tavli, B. (2008). A survey of wireless multimedia sensor network platforms (Technical Report: UPC-DAC-RR-XCSD-2008-12). Barcelona, Spain, September 2008.
-
(2008)
A Survey of Wireless Multimedia Sensor Network Platforms (Technical Report: UPC-DAC-RR-XCSD-2008-12)
-
-
Zilan, R.1
Barcelo-Ordinas, J.M.2
Tavli, B.3
-
7
-
-
0034291065
-
Protocols for self-organization of a wireless sensor network
-
Personal Communications, IEEE. See also
-
Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. (2000). Protocols for self-organization of a wireless sensor network. Personal Communications, IEEE. See also IEEE Wireless Communications, 7(5), 16-27.
-
(2000)
IEEE Wirele -01ss Communications
, vol.7
, Issue.5
, pp. 16-27
-
-
Sohrabi, K.1
Gao, J.2
Ailawadhi, V.3
Pottie, G.4
-
8
-
-
0345851235
-
Wireless integrated network sensors
-
10.1145/332833.332838
-
G. J. Pottie W. J. Kaiser 2000 Wireless integrated network sensors Communications of the ACM 43 5 51 58 10.1145/332833.332838
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
10
-
-
33646456047
-
MMSPEED: Multipath Multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks
-
10.1109/TMC.2006.79
-
E. Falemban C. Lee E. Ekici 2006 MMSPEED: Multipath Multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks IEEE Transactions on Mobile Computing 5 6 738 754 10.1109/TMC.2006.79
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.6
, pp. 738-754
-
-
Falemban, E.1
Lee, C.2
Ekici, E.3
-
11
-
-
32644433771
-
QoS and energy aware routing for real-time traffic in wireless sensor networks
-
DOI 10.1016/j.comcom.2004.12.028, PII S014036640500040X
-
A. Mahapatra K. Anand D. P. Agrawal 2006 QoS and energy aware routing for real time traffic in wireless sensor networks Journal on Computer Communications 29 437 445 10.1016/j.comcom.2004.12.028 (Pubitemid 43243227)
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 437-445
-
-
Mahapatra, A.1
Anand, K.2
Agrawal, D.P.3
-
12
-
-
70450229717
-
Transmitting streaming data in wireless multimedia sensor networks with holes
-
ACM New York
-
Shu, L., Zhou, Z., Hauswirth, M., Phuoc, D. L., Peng, Y., & Zhang, L. (2007). Transmitting streaming data in wireless multimedia sensor networks with holes. In MUM'07: Proceedings of the sixth international conference on mobile and ubiquitous multimedia. New York: ACM.
-
(2007)
MUM'07: Proceedings of the Sixth International Conference on Mobile and Ubiquitous Multimedia
-
-
Shu, L.1
Zhou, Z.2
Hauswirth, M.3
Phuoc, D.L.4
Peng, Y.5
Zhang, L.6
-
13
-
-
48249100462
-
Multi-priority multi-path selection for video streaming in wireless multimedia sensor networks
-
LNCS Springer Berlin
-
Zhang, L., Hauswirth, M., Shu, L., Zhou, Z., Reynolds, V., & Han, G. (2008). Multi-priority multi-path selection for video streaming in wireless multimedia sensor networks. In LNCS : Vol. 5061. UIC'08:Proceedings of the 5th international conference on ubiquitous intelligence and computing (pp. 439-452). Berlin: Springer.
-
(2008)
UIC'08:Proceedings of the 5th International Conference on Ubiquitous Intelligence and Computing
, vol.5061
, pp. 439-452
-
-
Zhang, L.1
Hauswirth, M.2
Shu, L.3
Zhou, Z.4
Reynolds, V.5
Han, G.6
-
14
-
-
38349187668
-
ASAR: An Ant-based Service Aware Routing algorithm for multimedia sensor networks
-
10.1007/s11460-008-0013-7
-
Y. Sun H. Ma L. Liu Y. Zheng 2008 ASAR: an Ant-based Service Aware Routing algorithm for multimedia sensor networks Frontiers of Electrical and Electronic Engineering in China 3 1 25 33 10.1007/s11460-008-0013-7
-
(2008)
Frontiers of Electrical and Electronic Engineering in China
, vol.3
, Issue.1
, pp. 25-33
-
-
Sun, Y.1
Ma, H.2
Liu, L.3
Zheng, Y.4
-
15
-
-
67249089643
-
A cross-layer solution for ultrawideband based wireless video sensor networks
-
30 November-4 December 2008. IEEE.
-
Campelli, L., Akyildiz, I., Fratta, L., & Cesana, M. (2008). A cross-layer solution for ultrawideband based wireless video sensor networks. In IEEE Globecom 2008. 30 November-4 December 2008. IEEE.
-
(2008)
IEEE Globecom 2008
-
-
Campelli, L.1
Akyildiz, I.2
Fratta, L.3
Cesana, M.4
-
22
-
-
23944459661
-
Public key cryptography in sensor networks-revisited
-
C. Castelluccia H. Hartenstein C. Paar D. Westhoff (eds). ESAS, Springer Berlin
-
Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks-revisited. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Lecture notes in computer science : Vol. 3313. ESAS (pp. 2-18). Berlin: Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.P.2
Sunar, B.3
-
23
-
-
77951430216
-
State of the art in ultra-low power public key
-
IEEE.
-
Gaubatz, G., Kaps, J. P., Ozturk, E., & Sunar, B. (2005). State of the art in ultra-low power public key. In Proceedings of the 2nd IEEE international workshop on pervasive computing and communication security. IEEE.
-
(2005)
Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security
-
-
Gaubatz, G.1
Kaps, J.P.2
Ozturk, E.3
Sunar, B.4
-
24
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
ACM New York. 10.1145/1029102.1029113
-
Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59-64). New York: ACM.
-
(2004)
SASN '04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
25
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. in Sensor and ad hoc communications and networks
-
First annual IEEE communications society conference
-
Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Sensor and ad hoc communications and networks. IEEE SECON 2004. First annual IEEE communications society conference (pp. 71-80).
-
(2004)
IEEE SECON 2004
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
26
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
IEEE
-
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the third IEEE international conference on pervasive computing and communications (pp. 324-328). IEEE.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
27
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
ACM New York
-
Piotrowski, K., Langendoerfer, P., & Peter, S. (2006). How public key cryptography influences wireless sensor node lifetime. In Proceedings of ACM SASN. New York: ACM.
-
(2006)
Proceedings of ACM SASN
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
28
-
-
46749097974
-
Tinytate: Computing the tate pairing in resource-constrained sensor nodes
-
IEEE
-
Oliveira, L. B., Aranha, D., Morais, E., Daguano, F., Lpez, J., & Dahab, R. (2007). Tinytate: Computing the tate pairing in resource-constrained sensor nodes. In Proceedings of the 6th IEEE international symposium on network computing and applications (pp. 318-323). IEEE.
-
(2007)
Proceedings of the 6th IEEE International Symposium on Network Computing and Applications
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.2
Morais, E.3
Daguano, F.4
Lpez, J.5
Dahab, R.6
-
29
-
-
53149126145
-
Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
Oliveira, L. B., Scott, M., Lopez, J., & Dahab, R. (2008). Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In Proceedings of the 5th international conference on networked sensing systems.
-
(2008)
Proceedings of the 5th International Conference on Networked Sensing Systems
-
-
Oliveira, L.B.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
30
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Perrig, A., Canetti, R., Song, D., & Tygar, D. (2001). Efficient and secure source authentication for multicast. In Network and distributed system security symposium (NDSS'01).
-
(2001)
Network and Distributed System Security Symposium (NDSS'01).
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
31
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., & Tygar, J. D. (2001). SPINS: security protocols for sensor networks. In Proceedings of the 7th annual international conference on mobile computing and networking (pp. 189-199).
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
32
-
-
85000276942
-
Tesla: Broadcast authentication for distributed sensor networks
-
10.1145/1027794.1027800
-
D. Liu P. Ning 2004 Tesla: Broadcast authentication for distributed sensor networks Transactions on Embedded Computing Systems 3 4 800 836 10.1145/1027794.1027800
-
(2004)
Transactions on Embedded Computing Systems
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
34
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
DOI 10.1145/1128817.1128864, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
Chang, S. M., Shieh, S., Lin, W. W., & Hsieh, C. M. (2006). An efficient broadcast authentication scheme in wireless sensor networks. In Proceedings of the 2006 ACM symposium on information, computer and communications security (pp. 311-320). New York: ACM. (Pubitemid 46644749)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 311-320
-
-
Chang, S.-M.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.-M.4
-
36
-
-
48649094490
-
One-time sensors: A novel concept to mitigate node-capture attacks
-
Bicakci, K., Gamage, C., Crispo, B., & Tanenbaum, A. (2005). One-time sensors: A novel concept to mitigate node-capture attacks. In Proceedings of the 2nd European workshop on security and privacy in ad hoc and sensor networks.
-
(2005)
Proceedings of the 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks
-
-
Bicakci, K.1
Gamage, C.2
Crispo, B.3
Tanenbaum, A.4
-
38
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Special Issue on Sensor Network Applications and Protocols
-
C. Karlof D. Wagner 2003 Secure routing in wireless sensor networks: Attacks and countermeasures Elsevier's AdHoc Networks Journal 1 2-3 293 315 Special Issue on Sensor Network Applications and Protocols
-
(2003)
Elsevier's AdHoc Networks Journal
, vol.1
, Issue.23
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
39
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
-
Ganeriwal, S., Capkun, S., Han, C. C., & Srivastava, M. B. (2005). Secure time synchronization service for sensor networks. In Proceedings of the 4th ACM workshop on wireless security (pp. 97-106). New York: ACM. (Pubitemid 44447322)
-
(2005)
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
40
-
-
4544244334
-
SIA: Secure information aggregation in sensor networks
-
Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In ACM SenSys 2003.
-
(2003)
ACM SenSys 2003
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
42
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
A. Wood J. Stankovic 2002 Denial of service in sensor network Computer 35 10 54 62 10.1109/MC.2002.1039518 (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
43
-
-
85092924851
-
Privacy-aware location sensor networks
-
Gruteser, M., Schelle, G., Jain, A., Han, R., & Grunwald, D. (2003). Privacy-aware location sensor networks. In Proceedings of the USENIX 9th workshop on hot topics in operating systems (pp. 163-167).
-
(2003)
Proceedings of the USENIX 9th Workshop on Hot Topics in Operating Systems
, pp. 163-167
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
44
-
-
0035946056
-
How to sign digital streams
-
10.1006/inco.2000.2916
-
R. Gennaro P. Rohatgi 2001 How to sign digital streams Information and Computation 165 100 116 10.1006/inco.2000.2916
-
(2001)
Information and Computation
, vol.165
, pp. 100-116
-
-
Gennaro, R.1
Rohatgi, P.2
-
45
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
10.1109/JPROC.2007.909914
-
D. Kundur W. Luh U. Okorafor T. Zourntos 2008 Security and privacy for distributed multimedia sensor networks Proceedings of the IEEE 96 1 112 130 10.1109/JPROC.2007.909914
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.3
Zourntos, T.4
-
46
-
-
33846220040
-
A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
-
W. Luh D. Kundur T. Zourntos 2007 A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems EURASIP Journal on Applied Signal Processing 2007 1 218
-
(2007)
EURASIP Journal on Applied Signal Processing
, vol.2007
, Issue.1
, pp. 218
-
-
Luh, W.1
Kundur, D.2
Zourntos, T.3
-
47
-
-
47649089096
-
Reliable event-detection in wireless visual sensor networks through scalar collaboration and game theoretic consideration
-
10.1109/TMM.2008.922775
-
A. Czarlinska D. Kundur 2008 Reliable event-detection in wireless visual sensor networks through scalar collaboration and game theoretic consideration IEEE Transactions on Multimedia 10 5 675 690 10.1109/TMM.2008.922775
-
(2008)
IEEE Transactions on Multimedia
, vol.10
, Issue.5
, pp. 675-690
-
-
Czarlinska, A.1
Kundur, D.2
-
49
-
-
77955309925
-
Wireless image sensor networks: Event acquisition in attack-prone and uncertain environments
-
Czarlinska, A., & Kundur, D. (2008). Wireless image sensor networks: Event acquisition in attack-prone and uncertain environments. Multidimensional Systems and Signal Processing.
-
(2008)
Multidimensional Systems and Signal Processing
-
-
Czarlinska, A.1
Kundur, D.2
-
50
-
-
33846639667
-
From imaging networks to behavior profiling: Ubiquitous sensing for managed homecare of the elderly
-
Lo, B. P. L., Wang, J. L., & Yang, G. Z. (2005). From imaging networks to behavior profiling: Ubiquitous sensing for managed homecare of the elderly. In Proceedings of the pervasive computing conference (pp. 101-104).
-
(2005)
Proceedings of the Pervasive Computing Conference
, pp. 101-104
-
-
Lo, B.P.L.1
Wang, J.L.2
Yang, G.Z.3
-
52
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
Wickramasuriya, J., Datt, M., Mehrotra, S., & Venkatasubramanian, N. (2004). Privacy protecting data collection in media spaces. In Proceedings of the ACM international conference on multimedia (pp. 48-55).
-
(2004)
Proceedings of the ACM International Conference on Multimedia
, pp. 48-55
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
56
-
-
32344446967
-
Key management and delayed verification for ad hoc networks
-
M. G. Zapata 2006 Key management and delayed verification for ad hoc networks Journal of High Speed Networks 15 1 93 109
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 93-109
-
-
Zapata, M.G.1
-
57
-
-
35048818581
-
-
Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and rsa on 8-bit cpus (pp. 119-132).
-
(2004)
Comparing Elliptic Curve Cryptography and rsa on 8-bit cpus
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
60
-
-
31844437036
-
Fusion and filtering in distributed intrusion detection systems
-
Barford, P., Jha, S., & Yegneswaran, V. (2004). Fusion and filtering in distributed intrusion detection systems. In Proceedings of the 42nd annual Allerton conference on communication, control and computing.
-
(2004)
Proceedings of the 42nd Annual Allerton Conference on Communication, Control and Computing.
-
-
Barford, P.1
Jha, S.2
Yegneswaran, V.3
-
61
-
-
3543079858
-
Optimizing the scalability of network intrusion detection systems using mobile agents
-
10.1023/B:JONS.0000015700.02134.1c
-
D. G. Marks P. Mell M. Stinson 2004 Optimizing the scalability of network intrusion detection systems using mobile agents Journal of Network and Systems Management 12 1 95 110 10.1023/B:JONS.0000015700.02134.1c
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
, pp. 95-110
-
-
Marks, D.G.1
Mell, P.2
Stinson, M.3
-
64
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
513-525
-
Biham, E., & Shamir, A. (1997). Differential fault analysis of secret key cryptosystems. In CRYPTO (pp. 513-525).
-
(1997)
CRYPTO
-
-
Biham, E.1
Shamir, A.2
-
65
-
-
34248333875
-
Detailed DoS attacks in wireless networks and countermeasures
-
DOI 10.1504/IJAHUC.2007.012417
-
L. A. Mohammed B. Issac 2007 Detailed DoS attacks in wireless networks and countermeasures International Journal of Ad Hoc and Ubiquitous Computing 2 3 157 166 10.1504/IJAHUC.2007.012417 (Pubitemid 46739015)
-
(2007)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.2
, Issue.3
, pp. 157-166
-
-
Mohammed, L.A.1
Issac, B.2
-
66
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
DOI 10.1145/1102219.1102234, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
Law, Y. W., van Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2005). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. In SASN '05: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 76-88). New York: ACM. (Pubitemid 44059934)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 76-88
-
-
Law, Y.W.1
Van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
67
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
DOI 10.1145/1236360.1236423, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: defending wireless sensor networks from interference. In IPSN '07: Proceedings of the 6th international conference on information processing in sensor networks (pp. 499-508). New York: ACM. (Pubitemid 47582180)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 499-508
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
68
-
-
51849119602
-
Defending wireless sensor networks from radio interference through channel adaptation
-
10.1145/1387663.1387664
-
W. Xu W. Trappe Y. Zhang 2008 Defending wireless sensor networks from radio interference through channel adaptation ACM Transactions on Sensor Networks 4 4 1 34 10.1145/1387663.1387664
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.4
, pp. 1-34
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
69
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
DOI 10.1109/MNET.2006.1637931
-
W. Xu K. Ma W. Trappe Y. Zhang 2006 Jamming sensor networks: attack and defense strategies Network, IEEE 20 3 41 47 10.1109/MNET.2006.1637931 (Pubitemid 43885286)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
70
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
ACM New York. 10.1145/1062689.1062697
-
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc '05: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (pp. 46-57). New York: ACM.
-
(2005)
MobiHoc '05: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
71
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
ACM New York. 10.1145/1023646.1023661
-
Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: defenses against wireless denial of service. In WiSe '04: Proceedings of the 3rd ACM workshop on wireless security (pp. 80-89). New York: ACM.
-
(2004)
WiSe '04: Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
72
-
-
35148881909
-
A cross-layer based intrusion detection approach for wireless ad hoc networks
-
Thamilarasu, G., Balasubramanian, A., Mishra, S., & Sridhar, R. (2005). A cross-layer based intrusion detection approach for wireless ad hoc networks. In IEEE international conference. Mobile adhoc and sensor systems conference (p. 7).
-
(2005)
IEEE International Conference. Mobile Adhoc and Sensor Systems Conference
, pp. 7
-
-
Thamilarasu, G.1
Balasubramanian, A.2
Mishra, S.3
Sridhar, R.4
-
73
-
-
77955304464
-
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: Analysis and counter measures
-
10.1504/IJWMC.2006.012561
-
Y. Zhou D. Wu S. M. Nettles 2006 On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures International Journal of Wireless and Mobile Computing 1 3/4 268 275 10.1504/IJWMC.2006.012561
-
(2006)
International Journal of Wireless and Mobile Computing
, vol.1
, Issue.3-4
, pp. 268-275
-
-
Zhou, Y.1
Wu, D.2
Nettles, S.M.3
-
74
-
-
31844455819
-
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
-
DOI 10.1145/1089803.1089981, PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
Guang, L., & Assi, C. (2005). On the resiliency of mobile ad hoc networks to MAC layer misbehavior. In PE-WASUN '05: Proceedings of the 2nd ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp. 160-167). New York: ACM. (Pubitemid 43183465)
-
(2005)
PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 160-167
-
-
Guang, L.1
Assi, C.2
-
75
-
-
34247504187
-
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
-
DOI 10.1016/j.comcom.2007.02.014, PII S0140366407000953
-
L. Guang C. Assi Y. Ye 2007 DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks Computer Communications 30 8 1841 1853 10.1016/j.comcom.2007.02.014 (Pubitemid 46659755)
-
(2007)
Computer Communications
, vol.30
, Issue.8
, pp. 1841-1853
-
-
Guang, L.1
Assi, C.2
Ye, Y.3
-
76
-
-
33845762444
-
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
-
S. Radosavac A. A. Cárdenas J. S. Baras G. V. Moustakides 2007 Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers Journal of Computer Security 15 1 103 128
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 103-128
-
-
Radosavac, S.1
Cárdenas, A.A.2
Baras, J.S.3
Moustakides, G.V.4
-
78
-
-
67349109409
-
Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks
-
Bicakci, K., & Tavli, B. (2009). Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards and Interfaces.
-
(2009)
Computer Standards and Interfaces
-
-
Bicakci, K.1
Tavli, B.2
-
79
-
-
33646906440
-
MAC protocols for wireless sensor networks: A survey
-
DOI 10.1109/MCOM.2006.1632658
-
I. Demirkol C. Ersoy F. Alagoz 2006 MAC protocols for wireless sensor networks: a survey IEEE Communications Magazine 44 4 115 121 10.1109/MCOM.2006.1632658 (Pubitemid 43792677)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 115-121
-
-
Demirkol, I.1
Ersoy, C.2
Alagoz, F.3
-
80
-
-
47349098625
-
An energy-efficient TDMA MAC for wireless sensor networks
-
Bai, R. G., Qu, Y. G., Guo, Y., Zhao, B. H. (2007). An energy-efficient TDMA MAC for wireless sensor networks. In The 2nd IEEE Asia-Pacific service computing conference (pp. 69-74).
-
(2007)
The 2nd IEEE Asia-Pacific Service Computing Conference
, pp. 69-74
-
-
Bai, R.G.1
Qu, Y.G.2
Guo, Y.3
Zhao, B.H.4
-
84
-
-
84905861805
-
Z-MAC: A hybrid MAC for wireless sensor networks
-
ACM New York. 10.1145/1098918.1098929
-
Rhee, I., Warrier, A., Aia, M., & Min, J. (2005). Z-MAC: a hybrid MAC for wireless sensor networks. In SenSys '05: Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 90-101). New York: ACM.
-
(2005)
SenSys '05: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems
, pp. 90-101
-
-
Rhee, I.1
Warrier, A.2
Aia, M.3
Min, J.4
-
85
-
-
46949099809
-
An energy efficient pre-schedule scheme for hybrid CSMA/TDMA MAC in wireless sensor networks
-
1-5
-
Wang, W., Wang, H., Peng, D., & Sharif, H. (2006). An energy efficient pre-schedule scheme for hybrid CSMA/TDMA MAC in wireless sensor networks. In 10th IEEE Singapore international conference on communication systems. ICCS 2006 (pp. 1-5).
-
(2006)
10th IEEE Singapore International Conference on Communication Systems. ICCS 2006
-
-
Wang, W.1
Wang, H.2
Peng, D.3
Sharif, H.4
-
86
-
-
2942579328
-
Mh-trace: Multi-hop time reservation using adaptive control for energy efficiency
-
10.1109/JSAC.2004.826932
-
B. Tavli W. Heinzelman 2004 Mh-trace: Multi-hop time reservation using adaptive control for energy efficiency IEEE Journal on Selected Areas in Communications 22 942 953 10.1109/JSAC.2004.826932
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, pp. 942-953
-
-
Tavli, B.1
Heinzelman, W.2
-
88
-
-
27644586304
-
Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks
-
ACM New York. 10.1145/1031495.1031509
-
Seada, K., Zuniga, M., Helmy, A., & Krishnamachari, B. (2004). Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In SenSys '04: Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 108-121). New York: ACM.
-
(2004)
SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 108-121
-
-
Seada, K.1
Zuniga, M.2
Helmy, A.3
Krishnamachari, B.4
-
89
-
-
34250739920
-
The Anchor Location Service (ALS) protocol for large-scale wireless sensor networks
-
DOI 10.1145/1142680.1142704, ACM International Conference Proceeding Series - Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks
-
Zhang, R., Zhao, H., & Labrador, M. A. (2006). The Anchor Location Service (ALS) protocol for large-scale wireless sensor networks. In InterSense '06: Proceedings of the first international conference on integrated Internet ad hoc and sensor networks (p. 18). New York: ACM. (Pubitemid 46966796)
-
(2006)
ACM International Conference Proceeding Series
, vol.138
, pp. 1142704
-
-
Zhang, R.1
Zhao, H.2
Labrador, M.A.3
-
90
-
-
33745909177
-
Battery-aware routing for streaming data transmissions in wireless sensor networks
-
DOI 10.1007/s11036-006-7800-2
-
C. Ma Y. Yang 2006 Battery aware routing for streaming data transmissions in wireless sensor networks Mobile Networks and Applications 11 757 767 10.1007/s11036-006-7800-2 (Pubitemid 44048676)
-
(2006)
Mobile Networks and Applications
, vol.11
, Issue.5
, pp. 757-767
-
-
Ma, C.1
Yang, Y.2
-
92
-
-
33144475784
-
Wormhole attacks in wireless networks
-
DOI 10.1109/JSAC.2005.861394
-
Y. C. Hu A. Perrig D. Johnson 2006 Wormhole attacks in wireless networks IEEE Journal on Selected Areas in Communications 24 2 370 380 10.1109/JSAC.2005.861394 (Pubitemid 43269756)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-379
-
-
Hu, Y.-C.1
Perrig, A.2
-
93
-
-
52249100824
-
Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation
-
10.1109/FGCN.2007.184
-
H. Weerasinghe H. Fu 2007 Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation Future Generation Communication and Networking 2 362 367 10.1109/FGCN.2007.184
-
(2007)
Future Generation Communication and Networking
, vol.2
, pp. 362-367
-
-
Weerasinghe, H.1
Fu, H.2
-
94
-
-
51249101665
-
An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol
-
2780-2785
-
Djahel, S., Nait-Abdesselam, F., & Khokhar, A. (2008). An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol. In IEEE international conference on communications ICC '08 (pp. 2780-2785).
-
(2008)
IEEE International Conference on Communications ICC '08
-
-
Djahel, S.1
Nait-Abdesselam, F.2
Khokhar, A.3
-
95
-
-
49749126034
-
Struggling against selfishness and black hole attacks in MANETs
-
10.1002/wcm.493
-
D. Djenouri N. Badache 2008 Struggling against selfishness and black hole attacks in MANETs Wireless Communications and Mobile Computing 8 6 689 704 10.1002/wcm.493
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.6
, pp. 689-704
-
-
Djenouri, D.1
Badache, N.2
-
96
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
DOI 10.1007/s11276-006-3723-x
-
R. Poovendran L. Lazos 2007 A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Networks 13 1 27 59 10.1007/s11276-006-3723-x (Pubitemid 46034258)
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
97
-
-
20144364151
-
Securing wireless communication against wormhole attacks
-
World Scientific and Engineering Academy and Society (WSEAS) Stevens Point
-
Moss, C., & Evans, D. W. (2005). Securing wireless communication against wormhole attacks. In EHAC'05: Proceedings of the 4th WSEAS international conference on electronics, hardware, wireless and optical communications (pp. 1-6). Stevens Point: World Scientific and Engineering Academy and Society (WSEAS).
-
(2005)
EHAC'05: Proceedings of the 4th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
, pp. 1-6
-
-
Moss, C.1
Evans, D.W.2
-
98
-
-
50949092585
-
WAP: Wormhole attack prevention algorithm in mobile ad hoc networks
-
Choi, S., Kim, D. Y., Lee, D. H., & Jung, J. I. (2008). WAP: Wormhole attack prevention algorithm in mobile ad hoc networks. In IEEE international conference on sensor networks, ubiquitous and trustworthy computing. SUTC '08 (pp. 343-348).
-
(2008)
IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing. SUTC '08
, pp. 343-348
-
-
Choi, S.1
Kim, D.Y.2
Lee, D.H.3
Jung, J.I.4
-
99
-
-
46449122114
-
Wireless sensor network survey
-
10.1016/j.comnet.2008.04.002
-
J. Yick B. Mukherjee D. Ghosal 2008 Wireless sensor network survey Computer Networks 52 12 2292 2330 10.1016/j.comnet.2008.04.002
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
101
-
-
4444339343
-
A scalable approach for reliable downstream data delivery in wireless sensor networks
-
ACM New York. 10.1145/989459.989470
-
Park, S. J., Vedantham, R., Sivakumar, R., & Akyildiz, I. F. (2004). A scalable approach for reliable downstream data delivery in wireless sensor networks. In MobiHoc '04: Proceedings of the 5th ACM international symposium on mobile ad hoc networking and computing (pp. 78-89). New York: ACM.
-
(2004)
MobiHoc '04: Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 78-89
-
-
Park, S.J.1
Vedantham, R.2
Sivakumar, R.3
Akyildiz, I.F.4
-
102
-
-
33750935117
-
PORT: A price-oriented reliable transport protocol for wireless sensor networks
-
ISSRE 2005
-
Zhou, Y., Lyu, M., Liu, J., & Wang, H. (2005). PORT: A price-oriented reliable transport protocol for wireless sensor networks. In 16th IEEE international symposium on software reliability engineering, ISSRE 2005 (p. 10).
-
(2005)
16th IEEE International Symposium on Software Reliability Engineering
, pp. 10
-
-
Zhou, Y.1
Lyu, M.2
Liu, J.3
Wang, H.4
-
103
-
-
17144375624
-
Pump-Slowly, Fetch-Quickly (PSFQ): A reliable transport protocol for sensor networks
-
DOI 10.1109/JSAC.2005.843554
-
C. Y. Wan A. Campbell L. Krishnamurthy 2005 Pump-slowly, fetch-quickly (PSFQ): a reliable transport protocol for sensor networks IEEE Journal on Selected Areas in Communications 23 4 862 872 10.1109/JSAC.2005.843554 (Pubitemid 40519640)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 862-872
-
-
Wan, C.-Y.1
Campbell, A.T.2
Krishnamurthy, L.3
-
104
-
-
26644458553
-
Event-to-sink reliable transport in wireless sensor networks
-
DOI 10.1109/TNET.2005.857076
-
B. Akan Özgür I. F. Akyildiz 2005 Event-to-sink reliable transport in wireless sensor networks IEEE/ACM Transactions on Networks 13 5 1003 1016 10.1109/TNET.2005.857076 (Pubitemid 41685011)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 1003-1016
-
-
Akan, O.B.1
Akyildiz, I.F.2
-
106
-
-
4544307667
-
On providing anonymity in wireless sensor networks
-
IEEE Computer Society Washington. 10.1109/ICPADS.2004.1316121
-
Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M., & Jones, K. (2004). On providing anonymity in wireless sensor networks. In ICPADS '04: Proceedings of the parallel and distributed systems, tenth international conference (p. 411). Washington: IEEE Computer Society.
-
(2004)
ICPADS '04: Proceedings of the Parallel and Distributed Systems, Tenth International Conference
, pp. 411
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
108
-
-
52249090009
-
Providing anonymity in wireless sensor networks
-
Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., & Makedon, F. (2007). Providing anonymity in wireless sensor networks. In IEEE international conference on pervasive services (pp. 145-148).
-
(2007)
IEEE International Conference on Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le, Z.2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
110
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
IEEE Computer Society Washington
-
Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In ICDCS '05: Proceedings of the 25th IEEE international conference on distributed computing systems (pp. 599-608). Washington: IEEE Computer Society.
-
(2005)
ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
112
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
IPDPS 2006
-
Xi, Y., Schwiebert, L., & Shi, W. (2006). Preserving source location privacy in monitoring-based wireless sensor networks. In 20th international parallel and distributed processing symposium, IPDPS 2006 (p. 8).
-
(2006)
20th International Parallel and Distributed Processing Symposium
, pp. 8
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
113
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
ACM New York. 10.1145/1352533.1352547
-
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In WiSec '08: Proceedings of the first ACM conference on wireless network security (pp. 77-88). New York: ACM.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
115
-
-
38549085319
-
In-network aggregation trade-offs for data collection in wireless sensor networks
-
10.1504/IJSNET.2006.012035
-
I. Solis K. Obraczka 2006 In-network aggregation trade-offs for data collection in wireless sensor networks International Journal of Sensor Networks 1 3/4 200 212 10.1504/IJSNET.2006.012035
-
(2006)
International Journal of Sensor Networks
, vol.1
, Issue.3-4
, pp. 200-212
-
-
Solis, I.1
Obraczka, K.2
-
116
-
-
41549167232
-
A framework for identifying compromised nodes in wireless sensor networks
-
DOI 10.1145/1341731.1341733
-
Q. Zhang T. Yu P. Ning 2008 A framework for identifying compromised nodes in wireless sensor networks ACM Transactions on Information and Systems Security 11 3 1 37 10.1145/1341731.1341733 (Pubitemid 351462726)
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.3
, pp. 12
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
-
118
-
-
35148897382
-
Detecting compromised nodes in wireless sensor networks
-
Mathews, M., Song, M., Shetty, S., & McKenzie, R. (2007). Detecting compromised nodes in wireless sensor networks. In ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (Vol. 1, pp. 273-278).
-
(2007)
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing
, vol.1
, pp. 273-278
-
-
Mathews, M.1
Song, M.2
Shetty, S.3
McKenzie, R.4
-
121
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
ACM New York
-
Wickramasuriya, J., Datt, M., Mehrotra, S., & Venkatasubramanian, N. (2004). Privacy protecting data collection in media spaces. In Proceedings of the 12th annual ACM international conference on multimedia. New York: ACM.
-
(2004)
Proceedings of the 12th Annual ACM International Conference on Multimedia
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
|