-
1
-
-
33745217624
-
A survey of applications of wireless sensors and wireless sensor networks
-
June
-
T. Arampatzis, J. Lygeros, and S. Manesis, "A survey of applications of wireless sensors and wireless sensor networks," in Proc. of the 2005 IEEE International Symposium on Intelligent Control - Mediterrean Conference on Control and Automation, June 2005, pp. 719-724.
-
(2005)
Proc. of the 2005 IEEE International Symposium on Intelligent Control - Mediterrean Conference on Control and Automation
, pp. 719-724
-
-
Arampatzis, T.1
Lygeros, J.2
Manesis, S.3
-
3
-
-
4344668573
-
Overview of sensor networks
-
D. Culler, D. Estrin, and M. Srivastava, "Overview of sensor networks," Computer Magazine, vol. 37, no. 8, pp. 41-49, 2004.
-
(2004)
Computer Magazine
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
4
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
New York, NY, USA: ACM
-
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson, "Wireless sensor networks for habitat monitoring," in WSNA '02: Proc. of the 1st ACM international workshop on Wireless sensor networks and applications. New York, NY, USA: ACM, 2002, pp. 88-97.
-
(2002)
WSNA '02: Proc. of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 88-97
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
5
-
-
84905819805
-
A macro-scope in the redwoods
-
New York, NY, USA: ACM
-
G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, and W. Hong, "A macro-scope in the redwoods," in SenSys '05: Proc. of the 3rd international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2005, pp. 51-63.
-
(2005)
SenSys '05: Proc. of the 3rd International Conference on Embedded Networked Sensor Systems
, pp. 51-63
-
-
Tolle, G.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Turner, N.5
Tu, K.6
Burgess, S.7
Dawson, T.8
Buonadonna, P.9
Gay, D.10
Hong, W.11
-
6
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communication, vol. 30, no. 11-12, pp. 2314-2341, 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
7
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks," ACM Trans. Sen. Netw., vol. 2, no. 1, pp. 65-93, 2006.
-
(2006)
ACM Trans. Sen. Netw.
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
8
-
-
35348832896
-
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
-
R. Roman, C. Alcaraz, and J. Lopez, "A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes," Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, 2007.
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.4
, pp. 231-244
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
-
10
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
New York, NY, USA: ACM
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in WSNA '03: Proc. of the 2nd ACM international conference on Wireless sensor networks and applications. New York, NY, USA: ACM, 2003, pp. 151-159.
-
(2003)
WSNA '03: Proc. of the 2nd ACM International Conference on Wireless Sensor Networks and Applications
, pp. 151-159
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
11
-
-
46749097974
-
TinyTate: Computing the tate pairing in resource-constrained sensor nodes
-
L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, J. López, and R. Dahab, "TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes," in 6th IEEE International Symposium on Network Computing and Applications (NCA 2007), 2007, pp. 318-323.
-
(2007)
6th IEEE International Symposium on Network Computing and Applications (NCA 2007)
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
López, J.5
Dahab, R.6
-
12
-
-
53149126145
-
-
June
-
L. Oliveira, M. Scott, J. Lopez, and R. Dahab, "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks," June 2008, pp. 173-180.
-
(2008)
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
, pp. 173-180
-
-
Oliveira, L.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
13
-
-
33745726712
-
Security considerations and key negotiation techniques for power constrained sensor networks
-
B. Doyle, S. Bell, A. Smeaton, K. McCusker, and N. O'Connor, "Security considerations and key negotiation techniques for power constrained sensor networks," The Computer Journal, vol. 49, no. 4, pp. 443-453, 2006.
-
(2006)
The Computer Journal
, vol.49
, Issue.4
, pp. 443-453
-
-
Doyle, B.1
Bell, S.2
Smeaton, A.3
McCusker, K.4
O'Connor, N.5
-
16
-
-
84857450252
-
CURUPIRA, a block cipher for constrained platforms
-
SBC
-
P. Barreto and M. Simplicio, "CURUPIRA, a block cipher for constrained platforms," in Anais do 25° Simpósio Brasileiro de Redes de Computadores e Sistemas Distribudos - SBRC'07, vol. 1. SBC, 2007, pp. 61-74.
-
(2007)
Anais do 25° Simpósio Brasileiro de Redes de Computadores e Sistemas Distribudos - SBRC'07
, vol.1
, pp. 61-74
-
-
Barreto, P.1
Simplicio, M.2
-
17
-
-
77958512627
-
The CURUPIRA-2 block cipher for constrained platforms: Specification and benchmarking
-
CEUR-WS [Online]. Available
-
M. Simplicio, P. Barreto, T. Carvalho, C. Margi, and M. Näslund, "The CURUPIRA-2 block cipher for constrained platforms: Specification and benchmarking," in Proc. of the 1st International Workshop on Privacy in Location-Based Applications - 13th European Symposium on Research in Computer Security (ESORICS'2008), vol. 397. CEUR-WS, 2008. [Online]. Available: http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-397/
-
(2008)
Proc. of the 1st International Workshop on Privacy in Location-Based Applications - 13th European Symposium on Research in Computer Security (ESORICS'2008)
, vol.397
-
-
Simplicio, M.1
Barreto, P.2
Carvalho, T.3
Margi, C.4
Näslund, M.5
-
18
-
-
67749118171
-
The marvin message authentication code and the LetterSoup authenticated encryption scheme
-
C. M. i March
-
M. Simplicio, P. Barbuda, P. Barreto, T. Carvalho, and C. M. i, "The Marvin Message Authentication Code and the LetterSoup Authenticated Encryption Scheme," Security and Communication Networks, vol. 2, no. 2, pp. 165 - 180, March 2009.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.2
, pp. 165-180
-
-
Simplicio, M.1
Barbuda, P.2
Barreto, P.3
Carvalho, T.4
-
19
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," in Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
21
-
-
0347227352
-
-
Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication U.S. Department of Commerce, May
-
NIST, Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication, National Institute of Standards and Technology, U.S. Department of Commerce, May 2005, http://csrc.nist.gov/ publications/PubsSPs.html.
-
(2005)
National Institute of Standards and Technology
-
-
-
23
-
-
77958499149
-
-
Crossbow
-
Crossbow, "TelosB Datasheet," http://www.xbow.com/Products/ Product-pdf-files/Wireless-pdf/TelosB-Datasheet.pdf, 2008.
-
(2008)
TelosB Datasheet
-
-
-
24
-
-
1542316037
-
The nesc language: A holistic approach to networked embedded systems
-
New York, NY, USA: ACM
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler, "The nesc language: A holistic approach to networked embedded systems," in PLDI'03: Proc. of the ACM SIGPLAN 2003 conference on Programming language design and implementation. New York, NY, USA: ACM, 2003, pp. 1-11.
-
(2003)
PLDI'03: Proc. of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
25
-
-
84962060694
-
Full TCP/IP for 8-bit architectures
-
New York, NY, USA: ACM
-
A. Dunkels, "Full TCP/IP for 8-bit architectures," in MobiSys '03: Proc. of the 1st international conference on Mobile systems, applications and services. New York, NY, USA: ACM, 2003, pp. 85-98.
-
(2003)
MobiSys '03: Proc. of the 1st International Conference on Mobile Systems, Applications and Services
, pp. 85-98
-
-
Dunkels, A.1
-
26
-
-
84887798375
-
Rime - A lightweight layered communication stack for sensor networks
-
Delft, The Netherlands, Jan. [Online]. Available
-
-, "Rime - A Lightweight Layered Communication Stack for Sensor Networks," in Proc. of the European Conference on Wireless Sensor Networks (EWSN), Poster/Demo session, Delft, The Netherlands, Jan. 2007. [Online]. Available: http://www.sics.se/~adam/dunkels07rime.pdf
-
(2007)
Proc. of the European Conference on Wireless Sensor Networks (EWSN), Poster/Demo Session
-
-
-
27
-
-
77958482472
-
-
Sensirion, "SHT1x Datasheet," http://www.sensirion.com/en/pdf/ product-information/Datasheet-humidity-sensor-SHT1x.pdf, 2009.
-
(2009)
SHT1x Datasheet
-
-
-
28
-
-
77954770221
-
-
Chipcon
-
Chipcon, "CC2420 Datasheet," http://focus.ti.com/lit/ds/ symlink/cc2420.pdf, 2007.
-
(2007)
CC2420 Datasheet
-
-
-
29
-
-
33847126121
-
Characterizing energy consumption in a visual sensor network testbed
-
C. B. Margi, V. Petkov, K. Obraczka, and R. Manduchi, "Characterizing energy consumption in a visual sensor network testbed," in 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2006), 2006.
-
(2006)
2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2006)
-
-
Margi, C.B.1
Petkov, V.2
Obraczka, K.3
Manduchi, R.4
-
31
-
-
77958467606
-
-
-, "Agilent 34401A Multimeter," http://cp.literature.agilent. com/litweb/pdf/5968-0162EN.pdf, 2007.
-
(2007)
Agilent 34401A Multimeter
-
-
-
32
-
-
77958483521
-
-
NationalInstruments, "LabView," http://www.ni.com/labview/, 2009.
-
(2009)
LabView
-
-
-
33
-
-
0242656059
-
OMAC: One-key CBC MAC
-
Springer
-
T. Iwata and K. Kurosawa, "OMAC: One-key CBC MAC," in Fast Software Encryption - FSE'2003, ser. Lecture Notes in Computer Science, vol. 2887. Springer, 2003, pp. 129-153.
-
(2003)
Fast Software Encryption - FSE'2003, Ser. Lecture Notes in Computer Science
, vol.2887
, pp. 129-153
-
-
Iwata, T.1
Kurosawa, K.2
-
34
-
-
0347227352
-
-
NIST, Special Publication 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
-
NIST, Special Publication 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, National Institute of Standards and Technology, 2005.
-
(2005)
National Institute of Standards and Technology
-
-
-
35
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Baltimore, USA: ACM
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in 2nd International Conference on Embedded Networked Sensor Systems - SenSys'2004. Baltimore, USA: ACM, 2004, pp. 162-175.
-
(2004)
2nd International Conference on Embedded Networked Sensor Systems - SenSys'2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
36
-
-
35348897342
-
Minisec: A secure sensor network communication architecture
-
New York, NY, USA: ACM
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "Minisec: A secure sensor network communication architecture," in IPSN'07: Proc. of the 6th international conference on Information processing in sensor networks. New York, NY, USA: ACM, 2007, pp. 479-488.
-
(2007)
IPSN'07: Proc. of the 6th International Conference on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
37
-
-
34547480316
-
X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks
-
NY, USA: ACM
-
M. Buettner, G. V. Yee, E. Anderson, and R. Han, "X-mac: a short preamble mac protocol for duty-cycled wireless sensor networks," in SenSys '06: Proc. of the 4th international conference on Embedded networked sensor systems. NY, USA: ACM, 2006, pp. 307-320.
-
(2006)
SenSys '06: Proc. of the 4th International Conference on Embedded Networked Sensor Systems
, pp. 307-320
-
-
Buettner, M.1
Yee, G.V.2
Anderson, E.3
Han, R.4
|