-
2
-
-
11144332044
-
The design space of wireless sensor networks
-
K. Romer, and F. Mattern The design space of wireless sensor networks Wireless Commun., IEEE 11 2004 54 61
-
(2004)
Wireless Commun., IEEE
, vol.11
, pp. 54-61
-
-
Romer, K.1
Mattern, F.2
-
4
-
-
84875736615
-
Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring
-
G. Owojaiye, and Y. Sun Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring Ad Hoc Netw. 11 2013 1237 1253
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 1237-1253
-
-
Owojaiye, G.1
Sun, Y.2
-
5
-
-
84888872009
-
Design, development, and deployment of a wireless sensor network for detection of landslides
-
M.V. Ramesh Design, development, and deployment of a wireless sensor network for detection of landslides Ad Hoc Netw. 13 2014 2 18
-
(2014)
Ad Hoc Netw.
, vol.13
, pp. 2-18
-
-
Ramesh, M.V.1
-
6
-
-
84887097229
-
Deployment and evaluation of a wireless sensor network for methane leak detection
-
A. Somov, A. Baranov, D. Spirjakin, A. Spirjakin, V. Sleptsov, and R. Passerone Deployment and evaluation of a wireless sensor network for methane leak detection Sens. Actuat. A: Phys. 202 2013 217 225
-
(2013)
Sens. Actuat. A: Phys.
, vol.202
, pp. 217-225
-
-
Somov, A.1
Baranov, A.2
Spirjakin, D.3
Spirjakin, A.4
Sleptsov, V.5
Passerone, R.6
-
7
-
-
78651354776
-
BorderSense: Border patrol through advanced wireless sensor networks
-
Z. Sun, P. Wang, M.C. Vuran, M.A. Al-Rodhaan, A.M. Al-Dhelaan, and I.F. Akyildiz BorderSense: border patrol through advanced wireless sensor networks Ad Hoc Netw. 9 2011 468 477
-
(2011)
Ad Hoc Netw.
, vol.9
, pp. 468-477
-
-
Sun, Z.1
Wang, P.2
Vuran, M.C.3
Al-Rodhaan, M.A.4
Al-Dhelaan, A.M.5
Akyildiz, I.F.6
-
8
-
-
84883452685
-
Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems
-
X. Dong, M.C. Vuran, and S. Irmak Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems Ad Hoc Netw. 11 2013 1975 1987
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 1975-1987
-
-
Dong, X.1
Vuran, M.C.2
Irmak, S.3
-
9
-
-
84870719671
-
Wireless sensor networks for rehabilitation applications: Challenges and opportunities
-
A. Hadjidj, M. Souil, A. Bouabdallah, Y. Challal, and H. Owen Wireless sensor networks for rehabilitation applications: challenges and opportunities J. Netw. Comput. Appl. 36 2013 1 15
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, pp. 1-15
-
-
Hadjidj, A.1
Souil, M.2
Bouabdallah, A.3
Challal, Y.4
Owen, H.5
-
10
-
-
84857124514
-
Ubiquitous tutoring in laboratories based on wireless sensor networks
-
M. Jou, and J. Wang Ubiquitous tutoring in laboratories based on wireless sensor networks Comput. Hum. Behav. 29 2013 439 444
-
(2013)
Comput. Hum. Behav.
, vol.29
, pp. 439-444
-
-
Jou, M.1
Wang, J.2
-
11
-
-
84877742201
-
Optimal planning of sensor networks for asset tracking in hospital environments
-
A. Pietrabissa, C. Poli, D.G. Ferriero, and M. Grigioni Optimal planning of sensor networks for asset tracking in hospital environments Decis. Support Syst. 55 2013 304 313
-
(2013)
Decis. Support Syst.
, vol.55
, pp. 304-313
-
-
Pietrabissa, A.1
Poli, C.2
Ferriero, D.G.3
Grigioni, M.4
-
12
-
-
84875703066
-
An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring
-
V. Sivaraman, A. Dhamdhere, H. Chen, A. Kurusingal, and S. Grover An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring Ad Hoc Netw. 11 2013 798 817
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 798-817
-
-
Sivaraman, V.1
Dhamdhere, A.2
Chen, H.3
Kurusingal, A.4
Grover, S.5
-
13
-
-
84890435965
-
HOCA: Healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks
-
A.A. Rezaee, M.H. Yaghmaee, A.M. Rahmani, and A.H. Mohajerzadeh HOCA: healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks J. Netw. Comput. Appl. 37 2014 216 228
-
(2014)
J. Netw. Comput. Appl.
, vol.37
, pp. 216-228
-
-
Rezaee, A.A.1
Yaghmaee, M.H.2
Rahmani, A.M.3
Mohajerzadeh, A.H.4
-
14
-
-
84879741736
-
Wireless sensor networks for temperature and humidity monitoring within concrete structures
-
N. Barroca, L.M. Borges, F.J. Velez, F. Monteiro, M. Górski, and J. Castro-Gomes Wireless sensor networks for temperature and humidity monitoring within concrete structures Constr. Build. Mater. 40 2013 1156 1166
-
(2013)
Constr. Build. Mater.
, vol.40
, pp. 1156-1166
-
-
Barroca, N.1
Borges, L.M.2
Velez, F.J.3
Monteiro, F.4
Górski, M.5
Castro-Gomes, J.6
-
15
-
-
84866059840
-
Novel wireless pervasive sensor network to improve the understanding of noise in street canyons
-
M.C. Bell, and F. Galatioto Novel wireless pervasive sensor network to improve the understanding of noise in street canyons Appl. Acoust. 74 2013 169 180
-
(2013)
Appl. Acoust.
, vol.74
, pp. 169-180
-
-
Bell, M.C.1
Galatioto, F.2
-
16
-
-
84872285772
-
EFurniture for home-based frailty detection using artificial neural networks and wireless sensors
-
Y.-C. Chang, C.-C. Lin, P.-H. Lin, C.-C. Chen, R.-G. Lee, J.-S. Huang, and T.-H. Tsai eFurniture for home-based frailty detection using artificial neural networks and wireless sensors Med. Eng. Phys. 35 2013 263 268
-
(2013)
Med. Eng. Phys.
, vol.35
, pp. 263-268
-
-
Chang, Y.-C.1
Lin, C.-C.2
Lin, P.-H.3
Chen, C.-C.4
Lee, R.-G.5
Huang, J.-S.6
Tsai, T.-H.7
-
17
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
H.-F. Huang, Y.-F. Chang, C.-H. Liu, Enhancement of two-factor user authentication in wireless sensor networks, in: Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing: IEEE Computer Society, 2010, pp. 27-30.
-
(2010)
Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing: IEEE Computer Society
, pp. 27-30
-
-
Huang, H.-F.1
Chang, Y.-F.2
Liu, C.-H.3
-
18
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sens. Wirel. Netw. 10 2010 361 371
-
(2010)
Ad Hoc Sens. Wirel. Netw.
, vol.10
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
19
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
B. Vaidya, D. Makrakis, H.T. Mouftah, Improved two-factor user authentication in wireless sensor networks, in: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, 2010, pp. 600-606.
-
(2010)
Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
20
-
-
78650387249
-
A secure and efficient user authentication protocol for two-tiered wireless sensor networks
-
R. Fan, L.-D. Ping, J.-Q. Fu, X.-Z. Pan, A secure and efficient user authentication protocol for two-tiered wireless sensor networks, in: Circuits, Communications and System (PACCS), 2010 Second Pacific-Asia Conference on, 2010, pp. 425-428.
-
(2010)
Circuits, Communications and System (PACCS), 2010 Second Pacific-Asia Conference on
, pp. 425-428
-
-
Fan, R.1
Ping, L.-D.2
Fu, J.-Q.3
Pan, X.-Z.4
-
21
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks' Sensors 10 2010 2450 2459
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
22
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks Etri J. 32 2010 704 712
-
(2010)
Etri J.
, vol.32
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
23
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
H.-L. Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim, and H.-W. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 2011 4767 4779
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.-L.1
Chen, T.-H.2
Liu, P.-C.3
Kim, T.-H.4
Wei, H.-W.5
-
24
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks Wirel. Commun. IEEE Trans. 8 2009 1086 1090
-
(2009)
Wirel. Commun. IEEE Trans.
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
25
-
-
66549123136
-
An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
-
A.K. Das, An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks, in: Proceedings of the First International Conference on COMmunication Systems and NETworks, IEEE Press, Bangalore, India, 2009, pp. 653-662.
-
(2009)
Proceedings of the First International Conference on COMmunication Systems and NETworks, IEEE Press, Bangalore, India
, pp. 653-662
-
-
Das, A.K.1
-
26
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
A. Das, Kumar, P. Sharma, S. Chatterjee, S.J. Sing, and Kanta A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Netw. Comput. Appl. 35 2012 1646 1656
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, pp. 1646-1656
-
-
Das, A.1
Kumar2
Sharma, P.3
Chatterjee, S.4
Sing, S.J.5
Kanta6
-
27
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Netw. Comput. Appl. 36 2012 316 323
-
(2012)
J. Netw. Comput. Appl.
, vol.36
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
29
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
S. Ozdemir, and Y. Xiao Secure data aggregation in wireless sensor networks: a comprehensive overview Comput. Netw. 53 2009 2022 2037
-
(2009)
Comput. Netw.
, vol.53
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
30
-
-
0035789246
-
Distributed assignment of encoded MAC addresses in sensor networks
-
C. Schurgers, G. Kulkarni, M.B. Srivastava. Distributed assignment of encoded MAC addresses in sensor networks, in: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM, Long Beach, CA, USA, 2001, pp. 295-298.
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM, Long Beach, CA, USA
, pp. 295-298
-
-
Schurgers, C.1
Kulkarni, G.2
Srivastava, M.B.3
-
32
-
-
84904633651
-
Security frameworks for wireless sensor networks-review
-
G. Sharma, S. Bala, A.K. Verma, Security frameworks for wireless sensor networks-review, in: 2nd International Conference on Communication, Computing & Security [ICCCS-2012], vol. 1, 2012, pp. 978-987.
-
(2012)
2nd International Conference on Communication, Computing & Security [ICCCS-2012], Vol. 1
, pp. 978-987
-
-
Sharma, G.1
Bala, S.2
Verma, A.K.3
-
33
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S.-F. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: securing sensor networks with public key technology, in: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM, Washington DC, USA, 2004, pp. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM, Washington DC, USA
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
34
-
-
0017018484
-
New directions in cryptography (invited paper)
-
W. Diffie, and M.E. Hellman New directions in cryptography (invited paper) IEEE Trans. Inf. Theory IT-22 1976 10
-
(1976)
IEEE Trans. Inf. Theory
, vol.22 IT
, pp. 10
-
-
Diffie, W.1
Hellman, M.E.2
-
35
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.-T. Zhu, and D.-G. Feng An improved smart card based password authentication scheme with provable security Comput. Stand. Interf. 31 2009 723 728
-
(2009)
Comput. Stand. Interf.
, vol.31
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
36
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
R. Song Advanced smart card based password authentication protocol Comput. Stand. Interf. 32 2010 321 325
-
(2010)
Comput. Stand. Interf.
, vol.32
, pp. 321-325
-
-
Song, R.1
-
37
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K.H.M. Wong, Y. Zheng, J. Cao, S. Wang. A dynamic user authentication scheme for wireless sensor networks, in: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, (SUTC'06) - vol. 01, IEEE Computer Society, 2006, pp. 244-251.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 1, (SUTC'06) - Vol. 01, IEEE Computer Society
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
38
-
-
84862773089
-
Improvement of Das's two-factor authentication protocol in wireless sensor networks
-
D. Nyang, M.-K. Lee, Improvement of Das's two-factor authentication protocol in wireless sensor networks, in: CORD Conference Proceedings, 2009 (2009).
-
(2009)
CORD Conference Proceedings, 2009
-
-
Nyang, D.1
Lee, M.-K.2
-
39
-
-
84875664097
-
A new user authentication scheme for hierarchical wireless sensor networks
-
S. Xu, and X. Wang A new user authentication scheme for hierarchical wireless sensor networks Int. Rev. Comput. Softw. 8 2013 197 203
-
(2013)
Int. Rev. Comput. Softw.
, vol.8
, pp. 197-203
-
-
Xu, S.1
Wang, X.2
-
40
-
-
84879297926
-
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
M. Turkanović, and M. Hölbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electric. Eng. 19 2013 109 116
-
(2013)
Electron. Electric. Eng.
, vol.19
, pp. 109-116
-
-
Turkanović, M.1
Hölbl, M.2
-
41
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
-
C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks Sensors 13 2013 9589 9603
-
(2013)
Sensors
, vol.13
, pp. 9589-9603
-
-
Li, C.-T.1
Weng, C.-Y.2
Lee, C.-C.3
-
42
-
-
85034663846
-
Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks"
-
M. Turkanović, and M. Hölbl Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks" Wireless Pers. Commun. 2013 1 16
-
(2013)
Wireless Pers. Commun.
, pp. 1-16
-
-
Turkanović, M.1
Hölbl, M.2
-
43
-
-
84939573910
-
Differential power analysis
-
P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
44
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood, and J.A. Stankovic Denial of service in sensor networks Computer 35 2002 54 62
-
(2002)
Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
45
-
-
50249146919
-
Assessment of energy consumption in wireless sensor networks: A case study for security algorithms
-
C. Chih-Chun, D.J. Nagel, S. Muftic, Assessment of energy consumption in wireless sensor networks: a case study for security algorithms, in: Mobile Adhoc and Sensor Systems, 2007 MASS 2007 IEEE International Conference on, 2007, pp. 1-6.
-
(2007)
Mobile Adhoc and Sensor Systems, 2007 MASS 2007 IEEE International Conference on
, pp. 1-6
-
-
Chih-Chun, C.1
Nagel, D.J.2
Muftic, S.3
-
46
-
-
84901221399
-
I. Crossbow technology. MICA 2, Wireless Measurement System
-
I. Crossbow technology. MICA 2, Wireless Measurement System, in, EOL: Crossbow.
-
EOL: Crossbow
-
-
-
47
-
-
84875723974
-
Survey and comparison of message authentication solutions on wireless sensor networks
-
M.A. Simplicio Jr., B.T. de Oliveira, C.B. Margi, P.S.L.M. Barreto, T.C.M.B. Carvalho, and M. Näslund Survey and comparison of message authentication solutions on wireless sensor networks Ad Hoc Netw. 11 2013 1221 1236
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 1221-1236
-
-
Simplicio, Jr.M.A.1
De Oliveira, B.T.2
Margi, C.B.3
Barreto, P.S.L.M.4
Carvalho, T.C.M.B.5
Näslund, M.6
|