-
1
-
-
0036688074
-
A Survey on Sensor Networks
-
Aug.
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
6444242510
-
-
technical report, Univ. of California, Los Angeles
-
T. Stathopoulos, J. Heidemann, and D. Estrin, "A Remote Code Update Mechanism for Wireless Sensor Networks," technical report, Univ. of California, Los Angeles, 2003.
-
(2003)
A Remote Code Update Mechanism for Wireless Sensor Networks
-
-
Stathopoulos, T.1
Heidemann, J.2
Estrin, D.3
-
8
-
-
0017018484
-
New Directions in Cryptography
-
Nov.
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
10
-
-
34247376029
-
Securing the Deluge Network Programming System
-
P.K. Dutta, J.W. Hui, D.C. Chu, and D.E. Culler, "Securing the Deluge Network Programming System," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '06), pp. 326-333, 2006.
-
(2006)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '06)
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
11
-
-
33947642085
-
Sluice: Secure Dissemination of Code Updates in Sensor Networks
-
P.E. Lanigan, R. Gandhi, and P. Narasimhan, "Sluice: Secure Dissemination of Code Updates in Sensor Networks," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06), pp. 53-63, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06)
, pp. 53-63
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
12
-
-
34247397108
-
Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '06), pp. 292-300, 2006.
-
(2006)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '06)
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
13
-
-
44349158878
-
Confidential and Secure Broadcast in Wireless Sensor Networks
-
J. Shaheen, D. Ostry, V. Sivaraman, and S. Jha, "Confidential and Secure Broadcast in Wireless Sensor Networks," Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '07), 2007.
-
(2007)
Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '07)
-
-
Shaheen, J.1
Ostry, D.2
Sivaraman, V.3
Jha, S.4
-
14
-
-
35948980830
-
Exploring Symmetric Cryptography for Secure Network Reprogramming
-
D.H. Kim, R. Gandhi, and P. Narasimhan, "Exploring Symmetric Cryptography for Secure Network Reprogramming," Proc. Int'l Conf. Distributed Computing Systems Workshops (ICDCSW '07), p. 17, 2007.
-
(2007)
Proc. Int'l Conf. Distributed Computing Systems Workshops (ICDCSW '07)
, pp. 17
-
-
Kim, D.H.1
Gandhi, R.2
Narasimhan, P.3
-
15
-
-
56749118494
-
-
Technical Report 006, Carnegie Mellon Univ., May
-
P.E. Lanigan, P. Narasimhan, and R. Gandhi, "Tradeoffs in Configuring Secure Data Dissemination in Sensor Networks: An Empirical Outlook," Technical Report 006, Carnegie Mellon Univ., May 2007.
-
(2007)
Tradeoffs in Configuring Secure Data Dissemination in Sensor Networks: An Empirical Outlook
-
-
Lanigan, P.E.1
Narasimhan, P.2
Gandhi, R.3
-
16
-
-
51249093755
-
Seluge: Secure and Dos-Resistant Code Dissemination in Wireless Sensor Networks
-
S. Hyun, P. Ning, A. Liu, and W. Du, "Seluge: Secure and Dos-Resistant Code Dissemination in Wireless Sensor Networks," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '08), pp. 445-456, 2008.
-
(2008)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '08)
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
17
-
-
0034771605
-
Spins: Security Protocols for Sensor Netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, and J.D. Tygar, "Spins: Security Protocols for Sensor Netowrks," Proc. Int'l Conf. Mobile Computing and Networking (Mobilecom '01), pp. 189-199, 2001.
-
(2001)
Proc. Int'l Conf. Mobile Computing and Networking (Mobilecom '01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
18
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
Y.C. Hu, A. Perrig, and D.B Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1976-1986, 2003.
-
(2003)
Proc. IEEE INFOCOM
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
19
-
-
26644435250
-
Simulating the Power Consumption of Large-Scale Sensor Network Applications
-
V. Shnayder, M. Hempstead, B.-R. Chen, G.W. Allen, and M. Welsh, "Simulating the Power Consumption of Large-Scale Sensor Network Applications," Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '04), pp. 188-200, 2004.
-
(2004)
Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '04)
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.-R.3
Allen, G.W.4
Welsh, M.5
-
20
-
-
34547466172
-
Seven Cardinal Properties of Sensor Network Broadcast Authentication
-
M. Luk, A. Perrig, and B. Whillock, "Seven Cardinal Properties of Sensor Network Broadcast Authentication," Proc. Workshop Security of Ad Hoc and Sensor Networks (SASN '06), pp. 147-156, 2006.
-
(2006)
Proc. Workshop Security of Ad Hoc and Sensor Networks (SASN '06)
, pp. 147-156
-
-
Luk, M.1
Perrig, A.2
Whillock, B.3
-
21
-
-
0348195762
-
Jam: A Jammed-Area Mapping Service for Sensor Networks
-
A.D. Wood, J.A. Stankovic, and S.H. Son, "Jam: A Jammed-Area Mapping Service for Sensor Networks," Proc. IEEE Int'l Real-Time Systems Symp. (RTSS '03), pp. 286-297, 2003.
-
(2003)
Proc. IEEE Int'l Real-Time Systems Symp. (RTSS '03)
, pp. 286-297
-
-
Wood, A.D.1
Stankovic, J.A.2
Son, S.H.3
-
22
-
-
35348897340
-
Channel Surfing: Defending Wireless Sensor Networks from Interference
-
W. Xu, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '07), pp. 499-508, 2007.
-
(2007)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN '07)
, pp. 499-508
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
23
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Nov.
-
L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
24
-
-
79959884874
-
Message-in-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes," Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '07), 2007.
-
Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '07), 2007
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
26
-
-
33747445938
-
Deploying Long-Lived and Cost-Effective Hybrid Sensor Networks
-
Nov.
-
W. Hu, C.T. Chou, S. Jha, and N. Bulusu, "Deploying Long-Lived and Cost-Effective Hybrid Sensor Networks," Ad Hoc Networks, vol. 4, no. 6, pp. 749-767, Nov. 2006.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.6
, pp. 749-767
-
-
Hu, W.1
Chou, C.T.2
Jha, S.3
Bulusu, N.4
-
28
-
-
84891003758
-
-
Sept.
-
"Telosb-Telosb Mote Platform," http://www.willow.co.uk/TelosB- Datasheet.pdf, Sept. 2010.
-
(2010)
Telosb-Telosb Mote Platform
-
-
-
32
-
-
0037702249
-
The nesC Language: A Holistic Approach to Networked Embedded Systems
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler, "The nesC Language: A Holistic Approach to Networked Embedded Systems," Proc. ACM SIGPLAN, 2003.
-
Proc. ACM SIGPLAN, 2003
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
33
-
-
84890977143
-
-
Bouncy Castle Crypto Apis
-
Bouncy Castle Crypto Apis, http://www.bouncycastle.org, 2010.
-
(2010)
-
-
-
35
-
-
26444574670
-
Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. Int'l SourceConf. Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, 2004.
-
(2004)
Proc. Int'l SourceConf. Embedded Networked Sensor Systems (SenSys '04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
36
-
-
84891020320
-
-
Java Source Code for Deluge
-
Java Source Code for Deluge, http://tinyos.cvs.sourceforge.net/tinyos/ tinyos-1.x/tools/java/net/tinyos/deluge, 2010.
-
(2010)
-
-
-
37
-
-
84891023328
-
-
Nesc Source Code for Deluge
-
Nesc Source Code for Deluge, http://tinyos.cvs.sourceforge.net/tinyos/ tinyos-1.x/tos/lib/Deluge, 2010.
-
(2010)
-
-
-
38
-
-
18844399081
-
Tossim: Accurate and Scalable Simulation of Entire Tinyos Applications
-
P. Levis, N. Lee, M. Welsh, and D. Culler, "Tossim: Accurate and Scalable Simulation of Entire Tinyos Applications," Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '03), pp. 126-137, 2003.
-
(2003)
Proc. Int'l Source Conf. Embedded Networked Sensor Systems (SenSys '03)
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
|