-
1
-
-
80053492006
-
Libelium
-
(Last accessed on January 2011
-
Libelium (2010) Waspmote - sensor boards. http://www. libelium.com/products/waspmote/sensors. (Last accessed on January 2011).
-
(2010)
Waspmote - sensor boards
-
-
-
2
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
Pai, S., Bermudez, S.,Wicker, S., Meingast, M., Roosta,T., Sastry, S. and Mulligan, D. (2008)Transactional confidentiality in sensor networks. IEEE Secur. Priv., 6, 28-35.
-
(2008)
IEEE Secur. Priv.
, vol.6
, pp. 28-35
-
-
Pai, S.1
Bermudez S.Wicker, S.2
Meingast M., RoostaT.3
Sastry, S.4
Mulligan, D.5
-
3
-
-
51249113844
-
A source- location privacy protocol in WSN based on locational angle
-
Beijing, May 19-23. IEEE Communications Society
-
Wei-Ping, W., Liang, C. and Jian-Xin, W. (2008) A Source- Location Privacy Protocol in WSN Based on Locational Angle. IEEE Int. Conf. Communications, Beijing, May 19-23, pp. 1630-1634. IEEE Communications Society.
-
(2008)
IEEE Int. Conf. Communications
, pp. 1630-1634
-
-
Wei-Ping, W.1
Liang, C.2
Jian-Xin, W.3
-
4
-
-
33746086383
-
Distributed user access control in sensor networks
-
Gibbons, P., Abdelzaher, T., Aspnes, J. and Rao, R. (eds), San Francisco, CA, USA, June 18-20, Lecture Notes in Computer Science 4026 Springer, Berlin
-
Wang, H. and Li, Q. (2006) Distributed User Access Control in Sensor Networks. In Gibbons, P., Abdelzaher, T., Aspnes, J. and Rao, R. (eds) Distributed Computing in Sensor Systems, San Francisco, CA, USA, June 18-20, Lecture Notes in Computer Science 4026, pp. 305-320. Springer, Berlin.
-
(2006)
Distributed Computing in Sensor Systems
, pp. 305-320
-
-
Wang, H.1
Li, Q.2
-
5
-
-
77952326880
-
Improved robust user authentication scheme for wireless sensor networks
-
Allahabad, India, December 15-19. IEEE Press Piscataway, NJ, USA
-
Vaidya, B., Chen, M. and Rodrigues, J.J.P.C. (2009) Improved Robust User Authentication Scheme for Wireless Sensor Networks. IEEE Conf. Wireless Communication and Sensor Networks, Allahabad, India, December 15-19, pp. 33-38. IEEE Press Piscataway, NJ, USA.
-
(2009)
IEEE Conf. Wireless Communication and Sensor Networks
, pp. 33-38
-
-
Vaidya, B.1
Chen, M.2
Rodrigues, J.J.P.C.3
-
6
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
Washington, DC, USA, October 25-29 ACM New York, USA
-
Ozturk, C., Zhang, Y. and Trappe, W. (2004) Source-Location Privacy in Energy-Constrained Sensor Network Routing. Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, October 25-29, pp. 88-93. ACM New York, USA.
-
(2004)
Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
7
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Columbus, OH, USA, June 6-10. IEEE Computer Society, Washington, DC, USA
-
Kamat, P., Zhang,Y.,Trappe,W. and Ozturk, C. (2005) Enhancing Source-Location Privacy in Sensor Network Routing. 25th IEEE Int. Conf. Distributed Computing Systems, Columbus, OH, USA, June 6-10, pp. 599-608. IEEE Computer Society, Washington, DC, USA.
-
(2005)
25th IEEE Int. Conf. Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
8
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Rhodes Island, Greece, April 25-29 IEEE Computer Society,Washington, DC, USA
-
Xi, Y., Schwiebert, L. and Shi, W. (2006) Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. 20th Int. Parallel and Distributed Processing Symposium, Rhodes Island, Greece, April 25-29, pp. 355-355. IEEE Computer Society,Washington, DC, USA.
-
(2006)
20th Int. Parallel and Distributed Processing Symposium
, pp. 355-355
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
9
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
Wang, H., Sheng, B. and Li, Q. (2009) Privacy-aware routing in sensor networks. Comput. Netw., 53, 1512-1529.
-
(2009)
Comput. Netw.
, vol.53
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
10
-
-
33845942290
-
Entrapping adversaries for source protection in sensor networks
-
Niagara-Falls, Buffalo, NY, USA, June 26-29, IEEE Computer Society, Washington, DC, USA
-
Ouyang, Y., Le, Z., Chen, G., Ford, J. and Makedon, F. (2006) Entrapping Adversaries for Source Protection in Sensor Networks. Proc. 2006 Int. Symp. World of Wireless, Mobile and Multimedia Networks, Niagara-Falls, Buffalo, NY, USA, June 26-29, pp. 23-34. IEEE Computer Society, Washington, DC, USA.
-
(2006)
Proc. 2006 Int. Symp. World of Wireless, Mobile and Multimedia Networks
, pp. 23-34
-
-
Ouyang Y. Le, Z.1
Chen, G.2
Ford, J.3
Makedon, F.4
-
11
-
-
70449584521
-
Cross-layer enhanced source location privacy in sensor networks
-
Rome, Italy, June 22-26. IEEE Press, Piscataway, NJ, USA
-
Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S. and La Porta, T. (2009) Cross-Layer Enhanced Source Location Privacy in Sensor Networks. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks, Rome, Italy, June 22-26, pp. 324-332. IEEE Press, Piscataway, NJ, USA.
-
(2009)
IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks
, pp. 324-332
-
-
Shao, M.1
Hu, W.2
Zhu, S.3
Cao, G.4
Krishnamurthy, S.5
La Porta, T.6
-
12
-
-
34547614424
-
An RF-Based system for tracking transceiver-free objects
-
White Plains, New York, USA, March 19-23. IEEE Computer Society,Washington, DC, USA
-
Zhang, D., Ma, J., Chen, Q. and Ni, L.M. (2007) An RF-Based System for Tracking Transceiver-free Objects. Fifth Annual IEEE Int. Conf. Pervasive Computing and Communications, White Plains, New York, USA, March 19-23, pp. 135-144. IEEE Computer Society,Washington, DC, USA.
-
(2007)
Fifth Annual IEEE Int. Conf. Pervasive Computing and Communications
, pp. 135-144
-
-
Zhang, D.1
Ma, J.2
Chen, Q.3
Ni, L.M.4
-
13
-
-
77949875012
-
Radio tomographic imaging with wireless networks
-
Wilson, J. and Patwari, N. (2010) Radio tomographic imaging with wireless networks. IEEE Trans. Mob. Comput., 9, 621-632.
-
(2010)
IEEE Trans. Mob. Comput.
, vol.9
, pp. 621-632
-
-
Wilson, J.1
Patwari, N.2
-
14
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
Misra, S. and Xue, G. (2006) Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw., 1, 50-63.
-
(2006)
Int. J. Sensor Netw.
, vol.1
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
15
-
-
52249090009
-
Providing anonymity in wireless sensor networks
-
Istanbul, Turkey, July 15-20. IEEE Computer Society, Washington, DC, USA
-
Ouyang,Y., Le, Z., Xu,Y., Triandopoulos, N., Zhang, S., Ford, J. and Makedon, F. (2007) ProvidingAnonymity inWireless Sensor Networks. IEEE Int. Conf. Pervasive Services, Istanbul, Turkey, July 15-20, pp. 145-148. IEEE Computer Society, Washington, DC, USA.
-
(2007)
IEEE Int. Conf. Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le, Z.2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
17
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M., Syverson, P. and Goldschlag, D. (1998) Anonymous connections and onion routing. IEEE J. Sel. Areas Commun., 16, 482-494.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
18
-
-
34247885928
-
Wireless sensor network localization techniques
-
Mao, G., Fidan, B. and Anderson, B.D. (2007) Wireless sensor network localization techniques. Comput. Netw., 51, 2529-2553.
-
(2007)
Comput. Netw.
, vol.51
, pp. 2529-2553
-
-
Mao, G.1
Fidan, B.2
Anderson, B.D.3
-
19
-
-
18844392239
-
Tracking a moving object with a binary sensor network
-
Los Angeles, CA, USA, November 4-7, ACM, NewYork, NY, USA
-
Aslam, J., Butler, Z., Constantin, F., Crespi, V., Cybenko, G. and Rus, D. (2003) Tracking a Moving Object with a Binary Sensor Network. Proc. 1st Int. Conf. Embedded Networked Sensor Systems, Los Angeles, CA, USA, November 4-7, pp. 150-161. ACM, NewYork, NY, USA.
-
(2003)
Proc. 1st Int. Conf. Embedded Networked Sensor Systems
, pp. 150-161
-
-
Aslam, J.1
Butler, Z.2
Constantin, F.3
Crespi, V.4
Cybenko, G.5
Rus, D.6
-
20
-
-
33748071148
-
Delay of intrusion detection in wireless sensor networks
-
Florence, Italy, May 22-25. ACM, NewYork, NY, USA
-
Dousse, O., Tavoularis, C. and Thiran, P. (2006) Delay of Intrusion Detection inWireless Sensor Networks. Proc. 7th ACM Int. Symp. Mobile ad hoc Networking and Computing, Florence, Italy, May 22-25, pp. 155-165. ACM, NewYork, NY, USA.
-
(2006)
Proc. 7th ACM Int. Symp. Mobile ad hoc Networking and Computing
, pp. 155-165
-
-
Dousse, O.1
Tavoularis, C.2
Thiran, P.3
-
21
-
-
57349155555
-
Strong barrier coverage of wireless sensor networks
-
Hong Kong, China, May 27-30. ACM New York, NY, USA
-
Liu, B., Dousse, O., Wang, J. and Saipulla, A. (2008) Strong Barrier Coverage of Wireless Sensor Networks. Proc. 9th ACM Int. Symp. Mobile ad hoc Networking and Computing, Hong Kong, China, May 27-30, pp. 411-420. ACM New York, NY, USA.
-
(2008)
Proc. 9th ACM Int. Symp. Mobile ad hoc Networking and Computing
, pp. 411-420
-
-
Liu, B.1
Dousse, O.2
Wang, J.3
Saipulla, A.4
-
22
-
-
65849370732
-
Analytic evaluation of target detection in heterogeneous wireless sensor networks
-
Lazos, L., Poovendran, R. and Ritcey, J.A. (2009) Analytic evaluation of target detection in heterogeneous wireless sensor networks. ACM Trans. Sensor Netw., 5, 1-38.
-
(2009)
ACM Trans. Sensor Netw.
, vol.5
, pp. 1-38
-
-
Lazos, L.1
Poovendran, R.2
Ritcey, J.A.3
-
23
-
-
35248853846
-
An efficient scheme for user authentication inwireless sensor networks
-
Niagara Falls, Canada, May 21-23. IEEE Computer Society,Washington, DC, USA
-
Jiang, C., Li, B. and Xu, H. (2007) An Efficient Scheme for User Authentication inWireless Sensor Networks. Proc. 21st Int. Conf. Advanced Information Networking and ApplicationsWorkshops, Niagara Falls, Canada, May 21-23, pp. 438-442. IEEE Computer Society,Washington, DC, USA.
-
(2007)
Proc. 21st Int. Conf. Advanced Information Networking and Applications Workshops
, pp. 438-442
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
24
-
-
78049456501
-
A lightweight user authentication scheme forwireless sensor networks
-
Hammamet, Tunisia, May 16-19. IEEE Computer Society,Washington, DC, USA
-
Cheikhrouhou, O., Koubaa, A., Boujelben, M. and Abid, M. (2010) A Lightweight User Authentication Scheme forWireless Sensor Networks. Proc. ACS/IEEE Int. Conf. Computer Systems and Applications, Hammamet, Tunisia, May 16-19, pp. 1-7. IEEE Computer Society,Washington, DC, USA.
-
(2010)
Proc. ACS/IEEE Int. Conf. Computer Systems and Applications
, pp. 1-7
-
-
Cheikhrouhou, O.1
Koubaa, A.2
Boujelben, M.3
Abid, M.4
-
25
-
-
70449419951
-
Data security in unattended wireless sensor networks
-
Di Pietro, R., Mancini, L., Soriente, C., Spognardi,A. and Tsudik, G. (2009) Data security in unattended wireless sensor networks. IEEE Trans. Comput., 58, 1500-1511.
-
(2009)
IEEE Trans. Comput.
, vol.58
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
26
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J. and Silva, F. (2003) Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Netw., 11, 2-16.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
27
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Boston, MA, USA, August 6-11. ACM, NewYork, NY, USA
-
Karp, B. and Kung, H.T. (2000) GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. Proc. 6th Annual Int. Conf. Mobile Computing and Networking, Boston, MA, USA, August 6-11, pp. 243-254. ACM, NewYork, NY, USA.
-
(2000)
Proc. 6th Annual Int. Conf. Mobile Computing and Networking
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
28
-
-
1542358974
-
Trajectory based forwarding and its applications
-
San Diego, CA, USA, September 14-19. ACM, NewYork, NY, USA
-
Niculescu, D. and Nath, B. (2003) Trajectory Based Forwarding and its Applications. Proc. 9th Annual Int. Conf. Mobile Computing and Networking, San Diego, CA, USA, September 14-19, pp. 260-272. ACM, NewYork, NY, USA.
-
(2003)
Proc. 9th Annual Int. Conf. Mobile Computing and Networking
, pp. 260-272
-
-
Niculescu, D.1
Nath, B.2
|