-
2
-
-
84875545499
-
-
IEEE. [Accessed Sep. 6, 2012]
-
IEEE, IEEE 802.15.4-2003 Specification. [Online]. Available http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf. [Accessed Sep. 6, 2012].
-
IEEE 802.15.4-2003 Specification
-
-
-
3
-
-
84875545499
-
-
IEEE. [Accessed Sep. 6, 2012]
-
IEEE, IEEE 802.15.4-2006 Specification. [Online]. Available http://standards.ieee.org/getieee802/download/802.15.4-2006.pdf. [Accessed Sep. 6, 2012].
-
IEEE 802.15.4-2006 Specification
-
-
-
4
-
-
84875519681
-
My bandwidth is wider than yours: Ultra-wideband
-
Accessed Sep. 6, 2012
-
I. Pérez-González, My Bandwidth Is Wider Than Yours: Ultra-Wideband, Wireless USB and WiNET in Linux. [Online]. Available: http://ols.fedoraproject.org/OLS/Reprints-2007/perez-gonzalez-Reprint.pdf. [Accessed Sep. 6, 2012].
-
Wireless USB and WiNET in Linux
-
-
Pérez-González, I.1
-
5
-
-
85013891762
-
-
Newnes, Elsevier, Burlington, USA
-
S. Farahani, ZigBee Wireless Networks and Transceivers, Newnes, Elsevier, Burlington, USA, 2008.
-
(2008)
ZigBee Wireless Networks and Transceivers
-
-
Farahani, S.1
-
6
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
July
-
C. Alcaraz and J. Lopez, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems," IEEE Transactions on Systems, Man, and Cybernetics, Part C - Applications and Reviews, Vol. 40, No. 4, July 2010.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part C - Applications and Reviews
, vol.40
, Issue.4
-
-
Alcaraz, C.1
Lopez, J.2
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier Ad Hoc Networks, Vol. 1, pp. 293-315, 2003.
-
(2003)
Elsevier Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
11
-
-
11244354854
-
Security considerations for IEEE 802.15.4 networks
-
Philadelphia, USA
-
N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks," in Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, USA, 2004, pp. 32-42.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
13
-
-
84875481889
-
Extracting keys from second generation zigbee chips
-
Las Vegas, USA, [Accessed Sep. 6, 2012]
-
T. Goodspeed, "Extracting Keys from Second Generation Zigbee Chips," Black Hat USA 2009, Las Vegas, USA, 2009. [Online]. Available http://www.blackhat.com/presentations/bh-usa-09/GOODSPEED/BHUSA09-Goodspeed- ZigbeeChips-PAPER.pdf. [Accessed Sep. 6, 2012].
-
Black Hat USA 2009
, pp. 2009
-
-
Goodspeed, T.1
-
14
-
-
85027486004
-
-
Accessed Sep. 6, 2012
-
GoodFET Project. [Online]. Available: http://goodfet.sourceforge. net. [Accessed Sep. 6, 2012].
-
GoodFET Project
-
-
-
15
-
-
79951804214
-
-
Master Thesis, University of North Carolina, Charlotte, North Carolina, USA
-
C. Misal, Analysis of Power Consuption of an End Device in a Zigbee Mesh Network, Master Thesis, University of North Carolina, Charlotte, North Carolina, USA, 2007.
-
(2007)
Analysis of Power Consuption of An End Device in A Zigbee Mesh Network
-
-
Misal, C.1
-
18
-
-
84875554198
-
-
Accessed Sep. 6, 2012
-
T. Buley, My Man, ZigBee. [Online]. Available: http://www.forbes.com/ 2009/01/11/zigbee-mirage-ces-tech-personal-cz-tb0112zigbee.html. [Accessed Sep. 6, 2012].
-
My Man, ZigBee
-
-
Buley, T.1
-
19
-
-
84875550770
-
-
ZigBee Case Study. Accessed Sep. 6, 2012
-
Telegesis Ltd., ZigBee Case Study, Hotech Edge Ltd Safely Networks Safes with ZigBee!. [Online]. Available: http://www.telegesis.com/downloads/general/ Hotech%20Edge%20success%20story.pdf. [Accessed Sep. 6, 2012].
-
Hotech Edge Ltd Safely Networks Safes with ZigBee!
-
-
-
20
-
-
84875516183
-
-
Ember Corporation [Accessed Sep. 6, 2012]
-
Ember Corporation, ZigBee Slashes Hotel Energy Costs by up to 40 Percent. [Online]. Available: http://www.thefreelibrary.com/ ZigBee+slashes+hotel+energy+costs+by+up+to+40+percent.-a0154056797. [Accessed Sep. 6, 2012].
-
ZigBee Slashes Hotel Energy Costs by Up to 40 Percent
-
-
-
21
-
-
77951757681
-
New efficient rf fingerprint-based security solution for bluetooth secure simple pairing
-
Koloa, Kauai, Hawaii, Jan. 5-8
-
S. Pasanen, K. Haataja, N. Päivinen, and P. Toivanen, "New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing," in Proceedings of the IEEE 43rd Hawaii International Conference on System Sciences (HICSS), Koloa, Kauai, Hawaii, Jan. 5-8, 2010.
-
(2010)
Proceedings of the IEEE 43rd Hawaii International Conference on System Sciences (HICSS)
-
-
Pasanen, S.1
Haataja, K.2
Päivinen, N.3
Toivanen, P.4
-
22
-
-
74549171599
-
-
Ph.D. Diss., University of Kuopio, Department of Computer Science, Feb. 6
-
K. Haataja, Security Threats and Countermeasures in Bluetooth-Enabled Systems, Ph.D. Diss., University of Kuopio, Department of Computer Science, Feb. 6, 2009.
-
(2009)
Security Threats and Countermeasures in Bluetooth-Enabled Systems
-
-
Haataja, K.1
-
23
-
-
33748995703
-
Detecting impersonation attacks in future wireless and mobile networks
-
Springer-Verlag
-
M. Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks," Lecture Notes in Computer Science, vol. 4074, pp. 80-95, Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4074
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
24
-
-
34249822230
-
Wireless security through rf fingerprinting
-
O. Ureten and N. Serinken, "Wireless Security Through RF Fingerprinting," Canadian Journal of Electrical and Computer Engineering, vol. 32, no. 1, pp. 27-33, 2007.
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
|