-
2
-
-
84885886207
-
Jamming attack detection and countermeasures
-
Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse
-
Muraleedharan, R., Osadciw, L.A.: Jamming Attack Detection and Countermeasures. In: Wireless Sensor Network Using Ant System. Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, pp. 13244-11240
-
Wireless Sensor Network Using Ant System
, pp. 13244-11240
-
-
Muraleedharan, R.1
Osadciw, L.A.2
-
3
-
-
0036688074
-
A survey on sensor networks
-
AKylidiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE communication Magazine 40(8), 102-114 (2002)
-
(2002)
IEEE Communication Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akylidiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
35348945419
-
The self-protection problem in wireless sensor networks
-
Article 20 October
-
Wang, D., Zhang, Q., Liu, J.: The self-protection Problem in Wireless Sensor Networks. ACM Transactions on Sensor Netwoks 3(4), Article 20 (October 2007)
-
(2007)
ACM Transactions on Sensor Netwoks
, vol.3
, Issue.4
-
-
Wang, D.1
Zhang, Q.2
Liu, J.3
-
5
-
-
10844275662
-
Uncertainty-aware and coverage-oriented deployment for sensor networks
-
DOI 10.1016/j.jpdc.2004.03.019
-
Zou, Y., Chakrabarty, K.: Uncertainty-aware and coverage-oriented deployment for sensor networks. Journal of Parallel and Distributed Computing 64(7), 788-798 (2004) (Pubitemid 40000770)
-
(2004)
Journal of Parallel and Distributed Computing
, vol.64
, Issue.7
, pp. 788-798
-
-
Zou, Y.1
Chakrabarty, K.2
-
6
-
-
84885891582
-
-
LLC 2005, Boca Raton Library of Congress Card Number 2004043852, ISBN 0-8493-1968-4
-
Ilyas, M., Mahgoub, I.: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems. In: LLC 2005. CRC Press, Boca Raton (2005), Library of Congress Card Number 2004043852, ISBN 0-8493-1968-4, http://www.crcpress.com
-
(2005)
Handbook of sensor networks: Compact wireless and wired sensing systems
-
-
Ilyas, M.1
Mahgoub, I.2
-
7
-
-
51849141059
-
Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks
-
May 4-7
-
Ashraf, A., Hashmani, M., Mussadiq, M., Chowdhry, B.S.: Design and Analysis of the Security Assessment Framework for Achieving Discrete Security Values in Wireless Sensor Networks. In: Canadian Conference on Electrical and Computer Engineering CCECE 2008, May 4-7, pp. 855-860 (2008)
-
(2008)
Canadian Conference on Electrical and Computer Engineering CCECE 2008
, pp. 855-860
-
-
Ashraf, A.1
Hashmani, M.2
Mussadiq, M.3
Chowdhry, B.S.4
-
8
-
-
78649815022
-
A pretty safe strategy for analyzing discrete security assessment framework in wireless sensor networks
-
November 14, 2008. CCIS Springer, Heidelberg
-
Arain, A.A., Hashmani, M., Mussadiq, M., et al.: A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks. In: Book of Wireless Networks, Information Processing and Systems, November 14, 2008. CCIS, vol. 20, pp. 445-448. Springer, Heidelberg (2008)
-
(2008)
Book of Wireless Networks, Information Processing and Systems
, vol.20
, pp. 445-448
-
-
Arain, A.A.1
Hashmani, M.2
Mussadiq, M.3
-
9
-
-
33751044459
-
A security framework for wireless sensor networks
-
Houston, Texas, USA, February 7-9
-
Zia, T., Zomaya, A.: A security Framework for Wireless Sensor Networks. In: SAS 2006 - IEEE Sensors Application Symposium, Houston, Texas, USA, February 7-9 (2006)
-
(2006)
SAS 2006 - IEEE Sensors Application Symposium
-
-
Zia, T.1
Zomaya, A.2
-
10
-
-
0036986248
-
Rumor routing algorithm for sensor networks
-
September 28, Atlanta, Georgia, USA Copyright 2002 ACM 1-58113-589-0/02/0009
-
Braginsky, D., Estrin, D.: Rumor Routing Algorithm For Sensor Networks. In: WSNA 2002, September 28, Atlanta, Georgia, USA Copyright 2002 ACM 1-58113-589-0/02/0009 (2002)
-
(2002)
WSNA 2002
-
-
Braginsky, D.1
Estrin, D.2
-
11
-
-
84885890739
-
Routing security in sensor network: Hello FLOOD attack and defence
-
Abdul Hamid, M., Mamun-Or-Rashid, M., Hong, C.S.: Routing Security in Sensor Network:HELLO FLOOD Attack and Defence. In: ICNEWS (2006)
-
(2006)
ICNEWS
-
-
Abdul Hamid, M.1
Mamun-Or-Rashid, M.2
Hong, C.S.3
-
12
-
-
65449129287
-
Minimizing transmit power for coherent communications in wireless sensor networks with finite-rate feedback
-
September
-
Marqus, A.G., Wang, X., Giannakis, G.B.: Minimizing Transmit Power for coherent Communications in Wireless Sensor Networks with Finite-Rate Feedback. IEEE Transactions on Signal Processing 56(9) (September 2008)
-
(2008)
IEEE Transactions on Signal Processing
, vol.56
, Issue.9
-
-
Marqus, A.G.1
Wang, X.2
Giannakis, G.B.3
-
14
-
-
84885891847
-
Cross layer security protocol using swarm intelligence
-
Farmingdale, New York May
-
Muralee dharan, R., Ann, L.: Cross Layer security protocol Using Swarm Intelligence. In: IEEE long Island System, Application and Technology conference(LISAT 2007), Farmingdale, New York (May 2007)
-
(2007)
IEEE Long Island System, Application and Technology Conference(LISAT 2007)
-
-
Muralee Dharan, R.1
Ann, L.2
-
15
-
-
2942686425
-
Sensor networks: Evolution opportunities, and challenges
-
Chong, C.-Y., Kumar, S.P.: Sensor Networks: Evolution Opportunities, and Challenges. Proceedings of the IEEE 91(8), 1247-1256
-
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.-Y.1
Kumar, S.P.2
-
16
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521-534 (2002)
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
19
-
-
24944540791
-
On the security of Wireless Sensor Networks
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
-
Roman, R., Zhou, J., López, J.: On the security of wireless sensor networks. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3482, pp. 681-690. Springer, Heidelberg (2005) (Pubitemid 41313610)
-
(2005)
Lecture Notes in Computer Science
, vol.3482
, Issue.III
, pp. 681-690
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
21
-
-
0034593011
-
A simulation framework for sensor networks
-
Boston, Massachusetts, USA
-
rd ACM international workshop on modeling, analysis and simulation of wireless and mobile systems, Boston, Massachusetts, USA (2000)
-
(2000)
rd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
-
-
Park, S.1
Savvides, A.2
Srivastava, M.B.3
-
22
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attack and Counter Measures. Ad Hoc Networks 1(2-3), 293-315 (2003) (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
25
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
DOI 10.1109/ICC.2006.255595, 4024996, 2006 IEEE International Conference on Communications, ICC 2006
-
Ngai, E.C.H., Jiangchuan Liu Lyu, M.R.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks Communications. In: IEEE International conference on ICC 2006, Istanbul, June 2006, vol. 8, pp. 3383-3389 (2006) ISSN:8164-9547, ISBN: 1-4244-0355-3 (Pubitemid 351575997)
-
(2006)
IEEE International Conference on Communications
, vol.8
, pp. 3383-3389
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
|