-
1
-
-
34547420644
-
Wireless sensor networks for structural health monitoring
-
Campbell AT, Bonnet P, Heidemann JS (eds.), ACM
-
Kim S, Pakzad S, Culler DE, Demmel J, Fenves G, Glaser S, Turon M. Wireless sensor networks for structural health monitoring. SenSys, Campbell AT, Bonnet P, Heidemann JS (eds.), ACM, 2006; 427-428.
-
(2006)
SenSys
, pp. 427-428
-
-
Kim, S.1
Pakzad, S.2
Culler, D.E.3
Demmel, J.4
Fenves, G.5
Glaser, S.6
Turon, M.7
-
2
-
-
78650435544
-
Deploying a sensor network on an active volcano
-
General Track, USENIX
-
Welsh M. Deploying a sensor network on an active volcano. USENIX Annual Technical Conference, General Track, USENIX, 2006.
-
(2006)
USENIX Annual Technical Conference
-
-
Welsh, M.1
-
3
-
-
35348904948
-
Wireless sensor networks for home health care
-
IEEE Computer Society
-
Baker CR, Armijo K, Belka S, Benhabib M, Bhargava V, Burkhart N, Minassians AD, Dervisoglu G, Gutnik L, Haick MB, et al.. Wireless sensor networks for home health care. AINA Workshops (2), IEEE Computer Society, 2007; 832-837.
-
(2007)
AINA Workshops
, Issue.2
, pp. 832-837
-
-
Baker, C.R.1
Armijo, K.2
Belka, S.3
Benhabib, M.4
Bhargava, V.5
Burkhart, N.6
Minassians, A.D.7
Dervisoglu, G.8
Gutnik, L.9
Haick, M.B.10
-
4
-
-
50049130312
-
Using wireless sensor network for wildfire detection. A discrete event approach of environmental monitoring tool
-
Thierry AS, Francois SJ, de Gentili Emmanuelle, Bernadette C. Using wireless sensor network for wildfire detection. a discrete event approach of environmental monitoring tool. Environment Identities and Mediterranean Area, 2006. ISEIMA '06. First international Symposium on, 2006.
-
(2006)
Environment Identities and Mediterranean Area, 2006. ISEIMA '06. First International Symposium on
-
-
Thierry, A.S.1
Francois, S.J.2
De Gentili, E.3
Bernadette, C.4
-
6
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
Glenwood, MD
-
Carman DW, Krus PS, Matt BJ. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, 2000.
-
(2000)
Technical Report 00-010, NAI Labs, Network Associates, Inc.
-
-
Carman, D.W.1
Krus, P.S.2
Matt, B.J.3
-
7
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput. Netw. 2002; 38(4):393-422, doi:http://dx.doi.org/10. 1016/S1389-1286(01)00302-4. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
8
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Al-Karaki JN, Kamal AE. Routing techniques in wireless sensor networks: a survey. IEEE Wireless Comm., vol. 11, 2004; 6-28.
-
(2004)
IEEE Wireless Comm.
, vol.11
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
9
-
-
66549119394
-
-
Crossbow Technology Inc.
-
Crossbow technology inc. mpr/mib user's manual. http://www.xbow.com/ Support/Support-pdf-files/MPRMIB/Series-Users-Manual.pdf2010.
-
Mpr/mib User's Manual
-
-
-
11
-
-
0036793924
-
Denial of services in sensor networks
-
October
-
Wood A, Stankovic J. Denial of services in sensor networks. IEEE Computer October 2002; .
-
(2002)
IEEE Computer
-
-
Wood, A.1
Stankovic, J.2
-
12
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
IEEE Computer Society
-
Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks. IEEE Symposium on Security and Privacy, IEEE Computer Society, 2005; 49-63.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
13
-
-
26444474622
-
Sensor network configuration under physical attacks
-
Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
-
Wang X, Gu W, Schosek K, Chellappan S, Xuan D. Sensor network configuration under physical attacks. ICCNMC, Lecture Notes in Computer Science, vol. 3619, Lu X, Zhao W (eds.), Springer, 2005; 23-32. (Pubitemid 41435742)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 23-32
-
-
Wang, X.1
Gu, W.2
Schosek, K.3
Chellappan, S.4
Xuan, D.5
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1(2- 3):293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
17
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
doi:10.1109/IPSN.2004.1307346
-
Newsome J, Shi E, Song D, Perrig A. The sybil attack in sensor networks: analysis & defenses. Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, 2004; 259-268, doi:10.1109/IPSN.2004. 1307346.
-
(2004)
Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Lecture Notes in Computer Science, Christianson B, Crispo B, Malcolm JA, Roe M (eds.), Springer
-
Stajano F, Anderson RJ. The resurrecting duckling: Security issues for ad-hoc wireless networks. Security Protocols Workshop, Lecture Notes in Computer Science, vol. 1796, Christianson B, Crispo B, Malcolm JA, Roe M (eds.), Springer, 1999; 172-194.
-
(1999)
Security Protocols Workshop
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
20
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
IEEE Computer Society:Washington, DC, USA, doi
-
Deng J, Han R, Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks. SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, IEEE Computer Society:Washington, DC, USA, 2005; 113-126, doi:http://dx.doi.org/10.1109/SECURECOMM.2005.16.
-
(2005)
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
21
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
ACM: New York, NY, USA, doi
-
Piotrowski K, Langendoerfer P, Peter S. How public key cryptography influences wireless sensor node lifetime. SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, ACM: New York, NY, USA, 2006; 169- 176, doi:http://doi.acm.org/10.1145/1180345.1180366.
-
(2006)
SASN '06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
22
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
IEEE Computer Society: Washington, DC, USA, doi
-
Liu A, Ning P. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. IPSN '08: Proceedings of the 7th international conference on Information processing in sensor networks, IEEE Computer Society: Washington, DC, USA, 2008; 245-256, doi:http://dx.doi.org/10. 1109/IPSN.2008.47.
-
(2008)
IPSN '08: Proceedings of the 7th International Conference on Information Processing in Sensor Networks
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
23
-
-
78650463097
-
-
Tinyos. http:/www.tinyos.net/2010.
-
Tinyos
-
-
-
24
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Stankovic JA, Arora A, Govindan R (eds.), ACM
-
Karlof C, Sastry N, Wagner D. Tinysec: a link layer security architecture for wireless sensor networks. SenSys, Stankovic JA, Arora A, Govindan R (eds.), ACM, 2004; 162-175.
-
(2004)
SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
26
-
-
18844407590
-
Poster abstract: LEAP - Efficient security mechanisms for large-scale distributed sensor networks
-
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
-
Zhu S, Setia S, Jajodia S. Leap - efficient security mechanisms for large-scale distributed sensor networks. SenSys, Akyildiz IF, Estrin D, Culler DE, Srivastava MB (eds.), ACM, 2003; 308-309. (Pubitemid 40682362)
-
(2003)
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
, pp. 308-309
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
29
-
-
37149010269
-
A new resilient key management protocol for wireless sensor networks
-
Lecture Notes in Computer Science, Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.), Springer
-
Bekara C, Laurent-Maknavicius M. A new resilient key management protocol for wireless sensor networks. WISTP, Lecture Notes in Computer Science, vol. 4462, Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.), Springer, 2007; 14-26.
-
(2007)
WISTP
, vol.4462
, pp. 14-26
-
-
Bekara, C.1
Laurent-Maknavicius, M.2
-
30
-
-
85092924851
-
Privacyaware location sensor networks
-
Jones MB (ed.), USENIX
-
Gruteser M, Schelle G, Jain A, Han R, Grunwald D. Privacyaware location sensor networks. HotOS, Jones MB (ed.), USENIX, 2003; 163-168.
-
(2003)
HotOS
, pp. 163-168
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
31
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
IEEE Computer Society
-
Liu D, Ning P, Du W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. ICDCS, IEEE Computer Society, 2005; 609-619.
-
(2005)
ICDCS
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
33
-
-
17144420084
-
Computing of trust in wireless networks
-
Los Angles, California
-
Zhu H, Bao F, Deng RH, Kim K. Computing of trust in wireless networks. Proceedings of 60th IEEE Vehicular Technology Conference, Los Angles, California, 2004.
-
(2004)
Proceedings of 60th IEEE Vehicular Technology Conference
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
Kim, K.4
-
35
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 2004; 45(6):687-699.
-
(2004)
Computer Networks
, vol.45
, Issue.6
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
36
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
Setia S, Swarup V (eds.), ACM
-
Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. SASN, Setia S, Swarup V (eds.), ACM, 2004; 66-77.
-
(2004)
SASN
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
37
-
-
46449095220
-
Trust-aware query processing in data intensive sensor networks
-
IEEE Computer Society: Washington, DC, USA, doi
-
Oleshchuk V, Zadorozhny V. Trust-aware query processing in data intensive sensor networks. SENSORCOMM '07: Proceedings of the 2007 International Conference on Sensor Technologies and Applications, IEEE Computer Society: Washington, DC, USA, 2007; 176-180, doi:http://dx.doi.org/10.1109/SENSORCOMM. 2007.100.
-
(2007)
SENSORCOMM '07: Proceedings of the 2007 International Conference on Sensor Technologies and Applications
, pp. 176-180
-
-
Oleshchuk, V.1
Zadorozhny, V.2
-
38
-
-
27544488231
-
Pet: A personalized trust model with reputation and risk evaluation for p2p resource sharing
-
IEEE Computer Society
-
Liang Z, Shi W. Pet: A personalized trust model with reputation and risk evaluation for p2p resource sharing. HICSS, IEEE Computer Society, 2005.
-
(2005)
HICSS
-
-
Liang, Z.1
Shi, W.2
|