-
1
-
-
0041472588
-
An energy efficient hierarchical clustering algorithm for wireless sensor networks
-
S. Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks," in Proc. INFOCOM'03, 2003, pp. 1713-1723.
-
(2003)
Proc. INFOCOM'03
, pp. 1713-1723
-
-
Bandyopadhyay, S.1
Coyle, E.J.2
-
2
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," J. High Speed Networks, vol. 15, pp. 33-51, 2006.
-
(2006)
J. High Speed Networks
, vol.15
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
3
-
-
34547794609
-
System level design for clustered wireless sensor networks
-
Aug.
-
A. Bonivento, C. Fischione, L. Necchi, F. Pianegiani, and A. Sangio-vanni-Vincentelli, "System level design for clustered wireless sensor networks," IEEE Trans. Ind. Informat., vol. 3, no. 3, pp. 202-214, Aug. 2007.
-
(2007)
IEEE Trans. Ind. Informat.
, vol.3
, Issue.3
, pp. 202-214
-
-
Bonivento, A.1
Fischione, C.2
Necchi, L.3
Pianegiani, F.4
Sangio-Vanni- Vincentelli, A.5
-
4
-
-
77956574096
-
Challenges in intrusion detection for wireless ad-hoc networks
-
P. Brutch and C. Ko, "Challenges in intrusion detection for wireless ad-hoc networks," in Proc. Appl. Internet Workshops, 2003, pp. 368-373.
-
(2003)
Proc. Appl. Internet Workshops
, pp. 368-373
-
-
Brutch, P.1
Ko, C.2
-
5
-
-
67650668232
-
IEEE 802.15.4 performance on a hierarchical hybrid sensor network platform
-
E. T. Capo-Chichi, H. Gutennet, and J.-M. Friedt, "IEEE 802.15.4 performance on a hierarchical hybrid sensor network platform," in Proc. IEEE 5th Intl. Conf. Networking and Services, 2009, pp. 303-308.
-
(2009)
Proc. IEEE 5th Intl. Conf. Networking and Services
, pp. 303-308
-
-
Capo-Chichi, E.T.1
Gutennet, H.2
Friedt, J.-M.3
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H.Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Res. Security and Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Res. Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
38049110063
-
An energy-efficient k-hop clustering framework for wireless sensor networks
-
LNCS
-
Q. Chen, J. Ma, Y. Zhu, D. Zhang, and L. M. Ni, "An energy-efficient k-hop clustering framework for wireless sensor networks," in Proc. EWSN'07, 2007, vol. 4373, LNCS, pp. 17-33.
-
(2007)
Proc. EWSN'07
, vol.4373
, pp. 17-33
-
-
Chen, Q.1
Ma, J.2
Zhu, Y.3
Zhang, D.4
Ni, L.M.5
-
8
-
-
23244467182
-
A pairwise key predis-tribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predis-tribution scheme for wireless sensor networks," in Proc. ACM CCS'03, 2003, pp. 228-258.
-
(2003)
Proc. ACM CCS'03
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
9
-
-
21644440888
-
Security for industrial communication systems
-
D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," in Proc. IEEE, 2005, vol. 93, no. 6, pp. 1152-1177.
-
(2005)
Proc. IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
11
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
Sep.
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. WSNA'03, Sep. 2003, pp. 151-159.
-
(2003)
Proc. WSNA'03
, pp. 151-159
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
12
-
-
85035363269
-
Adaptive protocols for information dissemination in wireless sensor networks
-
Aug.
-
W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks," in Proc. 5th ACM/IEEE Mobicom, Aug. 1999, pp. 174-185.
-
(1999)
Proc. 5th ACM/IEEE Mobicom
, pp. 174-185
-
-
Heinzelman, W.1
Kulik, J.2
Balakrishnan, H.3
-
13
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
Jan.
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy- efficient communication protocol for wireless microsensor networks," in Proc. 33rd Hawaii Int. Conf. Syst. Sciences, Jan. 2000, pp. 3005-3014.
-
(2000)
Proc. 33rd Hawaii Int. Conf. Syst. Sciences
, pp. 3005-3014
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
14
-
-
62449084821
-
EARQ: Energy aware routing for real-time and reliable communication in wireless industrial sensor networks
-
Feb.
-
J. Heo, J. Hong, and Y. Cho, "EARQ: Energy aware routing for real-time and reliable communication in wireless industrial sensor networks," IEEE Trans. Ind. Informat., vol. 5, no. 1, pp. 3-11, Feb. 2009.
-
(2009)
IEEE Trans. Ind. Informat.
, vol.5
, Issue.1
, pp. 3-11
-
-
Heo, J.1
Hong, J.2
Cho, Y.3
-
17
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Nov.
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. Sensys'04, ACM, Nov. 2004, pp. 162-175.
-
(2004)
Proc. Sensys'04 ACM
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
18
-
-
34249859365
-
Modular wireless real-time sensor/actuator network for factory automation applications
-
May
-
H. Körber, H. Watter, and G. Scholl, "Modular wireless real-time sensor/actuator network for factory automation applications," IEEE Trans. Ind. Informat., vol. 3, no. 2, pp. 111-119, May 2007.
-
(2007)
IEEE Trans. Ind. Informat.
, vol.3
, Issue.2
, pp. 111-119
-
-
Körber, H.1
Watter, H.2
Scholl, G.3
-
19
-
-
84905854254
-
Design and deployment of industrial sensor networks: Experiences from a semiconductor plant and the north sea
-
L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Dushalnagar, L. Nachman, and M. Yarvis, "Design and deployment of industrial sensor networks: Experiences from a semiconductor plant and the north sea," in Proc. Sensys'05, 2005, pp. 64-75.
-
(2005)
Proc. Sensys'05
, pp. 64-75
-
-
Krishnamurthy, L.1
Adler, R.2
Buonadonna, P.3
Chhabra, J.4
Flanigan, M.5
Dushalnagar, N.6
Nachman, L.7
Yarvis, M.8
-
20
-
-
33745925857
-
Experimental study on wireless sensor network security
-
LNCS
-
T. Kwon and S.-H. Park, "Experimental study on wireless sensor network security," in Proc. ISI 2006, 2006, vol. 3975, LNCS, pp. 741-743.
-
(2006)
Proc. ISI 2006
, vol.3975
, pp. 741-743
-
-
Kwon, T.1
Park, S.-H.2
-
21
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
Dec.
-
C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami, "Intrusion detection for routing attacks in sensor networks," Int. J. Distrib. Sens. Netw., vol. 2, no. 4, pp. 313-332, Dec. 2006.
-
(2006)
Int. J. Distrib. Sens. Netw.
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
22
-
-
33847175212
-
Wireless sensor networks for industrial environments
-
K. S. Low, W. N. N. Win, and M. J. Er, "Wireless sensor networks for industrial environments," in Proc. IEEE CIMCA-IAWTIC'05, 2005, pp. 271-276.
-
(2005)
Proc. IEEE CIMCA-IAWTIC'05
, pp. 271-276
-
-
Low, K.S.1
Win, W.N.N.2
Er, M.J.3
-
23
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Netw. Commun. (WiMobapos Aug. 2005
-
I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in Proc. IEEE Int. Conf. Wireless and Mobile Comput., Netw. Commun. (WiMobapos 2005), Aug. 2005, vol. 3, pp. 253-259.
-
(2005)
Proc. IEEE Int. Conf. Wireless and Mobile Comput.
, vol.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
24
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, W. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," Wireless Netw., pp. 521-534, 2002.
-
(2002)
Wireless Netw.
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, W.3
Culler, D.4
Tygar, J.D.5
-
25
-
-
46949090794
-
Distributed anomaly detection in wireless sensor networks
-
Commun. Syst.
-
S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, "Distributed anomaly detection in wireless sensor networks," in Proc. 10th IEEE Singapore Int. Conf., Commun. Syst., 2006, pp. 1-5.
-
(2006)
Proc. 10th IEEE Singapore Int. Conf.
, pp. 1-5
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
Bezdek, J.C.4
-
26
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
Jan.
-
R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Proc. IEEE Consumer Commun. Netw. Conf., Jan. 2006, pp. 640-644.
-
(2006)
Proc. IEEE Consumer Commun. Netw. Conf.
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
27
-
-
4444228500
-
Wireless sensor networks for industrial applications
-
X. Shen, Z. Wang, and Y. Sun, "Wireless sensor networks for industrial applications," in Proc. IEEE WCICA 2004, 2004, pp. 3636-3640.
-
(2004)
Proc. IEEE WCICA
, vol.2004
, pp. 3636-3640
-
-
Shen, X.1
Wang, Z.2
Sun, Y.3
-
28
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
DOI 10.1145/1089761.1089765, Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proc. 1st ACM Int. Workshop on Quality of Service Security in Wireless and Mobile Networks, 2005, pp. 16-23. (Pubitemid 43206617)
-
(2005)
Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Loureiro, A.A.F.2
Martins, M.H.T.3
Ruiz, L.B.4
Rocha, B.P.S.5
Wong, H.C.6
-
29
-
-
3543065166
-
Distributed control applications within sensor networks
-
Aug.
-
B. Sinopoli, C. Sharp, S. Schaffert, and S. S. Sastry, "Distributed control applications within sensor networks," in Proc. IEEE, Aug. 2003, vol. 91, no. 8, pp. 1234-1246.
-
(2003)
Proc. IEEE
, vol.91
, Issue.8
, pp. 1234-1246
-
-
Sinopoli, B.1
Sharp, C.2
Schaffert, S.3
Sastry, S.S.4
-
31
-
-
24944560667
-
The new intrusion prevention and detection approaches for clustering-based sensor networks
-
Mar. 13-17
-
C.-C. Su, K.-M. Chang, Y.-H. Kuo, and M.-F. Horng, "The new intrusion prevention and detection approaches for clustering-based sensor networks," in Proc. IEEE WCNC'05: Broadband Wireless for the Masses Ready for Takeoff, Mar. 13-17, 2005, pp. 1927-1932.
-
(2005)
Proc. IEEE WCNC'05: Broadband Wireless for the Masses Ready for Takeoff
, pp. 1927-1932
-
-
Su, C.-C.1
Chang, K.-M.2
Kuo, Y.-H.3
Horng, M.-F.4
-
32
-
-
38349181460
-
Secure distributed cluster formation in wireless sensor networks
-
DOI 10.1109/ACSAC.2006.46, 4041161, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
K. Sun, P. Peng, P. Ning, and C. Wang, "Secure distributed cluster formation in wireless sensor networks," in Proc. 22nd ACSAC'06, Dec. 2006, pp. 131-140. (Pubitemid 351232909)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 131-140
-
-
Sun, K.1
Peng, P.2
Ning, P.3
Wang, C.4
-
34
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tutorials, pp. 2-23, 2006.
-
(2006)
IEEE Commun. Surveys Tutorials
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
35
-
-
44249108577
-
Recent and emerging topics in wireless industrial communications: A selection
-
May
-
A. Willig, "Recent and emerging topics in wireless industrial communications: A selection," IEEE Trans. Ind. Informat., vol. 4, no. 2, pp. 102-124, May 2008.
-
(2008)
IEEE Trans. Ind. Informat.
, vol.4
, Issue.2
, pp. 102-124
-
-
Willig, A.1
-
36
-
-
0036793924
-
Denial of service in sensor network
-
Oct.
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor network," IEEE Computer, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
37
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attack and defense strategies," IEEE Networks, vol. 20, pp. 41-47, 2006.
-
(2006)
IEEE Networks
, vol.20
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
38
-
-
4544285741
-
Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach
-
Mar.
-
O. Younis and S. Fahmy, "Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach," in Proc. IEEE IN-FOCOM'04, Mar. 2004.
-
(2004)
Proc. IEEE IN-FOCOM'04
-
-
Younis, O.1
Fahmy, S.2
-
39
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM CCS'03, Oct. 2003, pp. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
41
-
-
39049138140
-
-
[Online] Available:
-
Crossbow Technology. [Online]. Available: http://www.xbow.com
-
Crossbow Technology
-
-
-
42
-
-
78149464560
-
-
[Online]. Available
-
The Sentilla Corporation. [Online]. Available: http://www.sentilla.com
-
The Sentilla Corporation
-
-
-
43
-
-
78149471088
-
-
nesC. [Online]. Available
-
nesC. [Online]. Available: http://sourceforge.net/projects/nescc
-
-
-
-
44
-
-
78149470913
-
-
TinyOS. [Online]. Available
-
TinyOS. [Online]. Available: http://www.tinyos.net
-
-
-
-
45
-
-
21644488714
-
-
[Online] Available:
-
ZigBee Alliance. [Online]. Available: http://www.zigbee.org
-
ZigBee Alliance
-
-
|