-
1
-
-
0036688074
-
Wireless sensor networks: A survey
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. IEEE Communications Magazine, 40(8): 102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, Aug.
-
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proc. 12th USENIX Security Symposium, Washington, DC, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct.
-
H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Computer, 36(10):103-105, Oct. 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
5
-
-
0003730335
-
-
Prentice Hall, Upper Saddle River, NJ
-
V. K. Garg, K. Smolik, and J. E. Wilkes. Applications of CDMA in Wirless/Personal Communications. Prentice Hall, Upper Saddle River, NJ, 1998.
-
(1998)
Applications of CDMA in Wirless/Personal Communications
-
-
Garg, V.K.1
Smolik, K.2
Wilkes, J.E.3
-
6
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
Anaheim, CA, Oct.
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. Military Communications Conference M1LCOM 2002, Anaheim, CA, Oct. 2002.
-
(2002)
Proc. Military Communications Conference M1LCOM 2002
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
7
-
-
0346290927
-
-
IEEE Press, New York, NY
-
J. A. Gutierrez, E. H. Callaway, Jr., and R. L. Barrett, Jr. Low-Rate Wireless Personal Area Networks. IEEE Press, New York, NY, 2004.
-
(2004)
Low-Rate Wireless Personal Area Networks
-
-
Gutierrez, J.A.1
Callaway Jr., E.H.2
Barrett Jr., R.L.3
-
8
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May-June
-
Y.-C. Hu and A. Perrig. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine, 2(3):28-39, May-June 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
10
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, Nov.
-
C. Karlof, N. Sastry, and D. Wagner. TinySec: A link layer security architecture for wireless sensor networks. In Proc. Second ACM Conference on Embedded Networked Sensor Systems SenSys 2004, pages 162-175, Baltimore, MD, Nov. 2004.
-
(2004)
Proc. Second ACM Conference on Embedded Networked Sensor Systems SenSys 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
11
-
-
33750292888
-
Access delay and throughput for uplink transmissions in ieee 802.15.4 pan
-
to appear
-
J. Mišić and V. B. Mišić. Access delay and throughput for uplink transmissions in ieee 802.15.4 pan. Elsevier Computer Communications, to appear, 2005.
-
(2005)
Elsevier Computer Communications
-
-
Mišić, J.1
Mišić, V.B.2
-
12
-
-
19544394976
-
Analysis of 802.15.4 beacon enabled PAN in saturation mode
-
San Jose, CA, July
-
J. Mišić, S. Shafi, and V. B. Mišić. Analysis of 802.15.4 beacon enabled PAN in saturation mode. In Proc. SPECTS 2004, San Jose, CA, July 2004.
-
(2004)
Proc. SPECTS 2004
-
-
Mišić, J.1
Shafi, S.2
Mišić, V.B.3
-
13
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Berkeley, CA, Apr.
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), pages 259-268, Berkeley, CA, Apr. 2004.
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
14
-
-
11244266362
-
Secure media access control (MAC) in wireless sensor networks: Intrusion detections and countermeasures
-
Barcelona, Spain, Sept.
-
Q. Ren and Q. Liang. Secure media access control (MAC) in wireless sensor networks: Intrusion detections and countermeasures. In Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004, volume 4, pages 3025-3029, Barcelona, Spain, Sept. 2004.
-
(2004)
Proc. 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004
, vol.4
, pp. 3025-3029
-
-
Ren, Q.1
Liang, Q.2
-
15
-
-
11144340927
-
Designing secure sensor network
-
Dec.
-
E. Shi and A. Perrig. Designing secure sensor network. IEEE Wireless Communications, 11(6):38-43, Dec. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
17
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
18
-
-
80054071642
-
Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems
-
San Jose, CA, Oct.
-
Y. Zhou, S. Wu, and S. M. Nettles. Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems. In Proc. BroadWISE 2004: Workshop on Broadband Wireless Services and Applications, pages 22-88, San Jose, CA, Oct. 2004.
-
(2004)
Proc. BroadWISE 2004: Workshop on Broadband Wireless Services and Applications
, pp. 22-88
-
-
Zhou, Y.1
Wu, S.2
Nettles, S.M.3
|