메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Impact of operating systems on Wireless Sensor Networks (security) applications and testbeds

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION PROTOCOLS; ENERGY AWARE; ENERGY CONSUMPTION; EXECUTION TIME; HARDWARE PLATFORM; OPERATING SYSTEMS; RESOURCE-CONSTRAINED; SECURITY MECHANISM;

EID: 77958499306     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2010.5560028     Document Type: Conference Paper
Times cited : (15)

References (38)
  • 6
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communication, vol. 30, no. 11-12, pp. 2314-2341, 2007. (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 7
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Y. W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks," ACM Trans. Sen. Netw., vol. 2, no. 1, pp. 65-93, 2006.
    • (2006) ACM Trans. Sen. Netw. , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 8
    • 35348832896 scopus 로고    scopus 로고
    • A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
    • R. Roman, C. Alcaraz, and J. Lopez, "A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes," Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, 2007.
    • (2007) Mobile Networks and Applications , vol.12 , Issue.4 , pp. 231-244
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 13
    • 33745726712 scopus 로고    scopus 로고
    • Security considerations and key negotiation techniques for power constrained sensor networks
    • B. Doyle, S. Bell, A. Smeaton, K. McCusker, and N. O'Connor, "Security considerations and key negotiation techniques for power constrained sensor networks," The Computer Journal, vol. 49, no. 4, pp. 443-453, 2006.
    • (2006) The Computer Journal , vol.49 , Issue.4 , pp. 443-453
    • Doyle, B.1    Bell, S.2    Smeaton, A.3    McCusker, K.4    O'Connor, N.5
  • 18
    • 67749118171 scopus 로고    scopus 로고
    • The marvin message authentication code and the LetterSoup authenticated encryption scheme
    • C. M. i March
    • M. Simplicio, P. Barbuda, P. Barreto, T. Carvalho, and C. M. i, "The Marvin Message Authentication Code and the LetterSoup Authenticated Encryption Scheme," Security and Communication Networks, vol. 2, no. 2, pp. 165 - 180, March 2009.
    • (2009) Security and Communication Networks , vol.2 , Issue.2 , pp. 165-180
    • Simplicio, M.1    Barbuda, P.2    Barreto, P.3    Carvalho, T.4
  • 21
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication U.S. Department of Commerce, May
    • NIST, Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication, National Institute of Standards and Technology, U.S. Department of Commerce, May 2005, http://csrc.nist.gov/ publications/PubsSPs.html.
    • (2005) National Institute of Standards and Technology
  • 23
    • 77958499149 scopus 로고    scopus 로고
    • Crossbow
    • Crossbow, "TelosB Datasheet," http://www.xbow.com/Products/ Product-pdf-files/Wireless-pdf/TelosB-Datasheet.pdf, 2008.
    • (2008) TelosB Datasheet
  • 26
    • 84887798375 scopus 로고    scopus 로고
    • Rime - A lightweight layered communication stack for sensor networks
    • Delft, The Netherlands, Jan. [Online]. Available
    • -, "Rime - A Lightweight Layered Communication Stack for Sensor Networks," in Proc. of the European Conference on Wireless Sensor Networks (EWSN), Poster/Demo session, Delft, The Netherlands, Jan. 2007. [Online]. Available: http://www.sics.se/~adam/dunkels07rime.pdf
    • (2007) Proc. of the European Conference on Wireless Sensor Networks (EWSN), Poster/Demo Session
  • 27
    • 77958482472 scopus 로고    scopus 로고
    • Sensirion, "SHT1x Datasheet," http://www.sensirion.com/en/pdf/ product-information/Datasheet-humidity-sensor-SHT1x.pdf, 2009.
    • (2009) SHT1x Datasheet
  • 28
    • 77954770221 scopus 로고    scopus 로고
    • Chipcon
    • Chipcon, "CC2420 Datasheet," http://focus.ti.com/lit/ds/ symlink/cc2420.pdf, 2007.
    • (2007) CC2420 Datasheet
  • 31
    • 77958467606 scopus 로고    scopus 로고
    • -, "Agilent 34401A Multimeter," http://cp.literature.agilent. com/litweb/pdf/5968-0162EN.pdf, 2007.
    • (2007) Agilent 34401A Multimeter
  • 32
    • 77958483521 scopus 로고    scopus 로고
    • NationalInstruments, "LabView," http://www.ni.com/labview/, 2009.
    • (2009) LabView
  • 34
    • 0347227352 scopus 로고    scopus 로고
    • NIST, Special Publication 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
    • NIST, Special Publication 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, National Institute of Standards and Technology, 2005.
    • (2005) National Institute of Standards and Technology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.