-
1
-
-
84861198400
-
Energy-efficient mobile target detection in wireless sensor networks with random node deployment and partial coverage
-
P. Medagliani, J. Leguay, G. Ferrari, V. Gay, M. Lopez-Ramos, Energy-efficient mobile target detection in wireless sensor networks with random node deployment and partial coverage, Pervasive Mob. Comput. 8 (3) (2012) 429-447.
-
(2012)
Pervasive Mob. Comput.
, vol.8
, Issue.3
, pp. 429-447
-
-
Medagliani, P.1
Leguay, J.2
Ferrari, G.3
Gay, V.4
Lopez-Ramos, M.5
-
2
-
-
70349166475
-
-
Center for Embedded Networked Sensing
-
M. Lukac, V. Naik, I. Stubailo, A. Husker, D. Estrin, In vivo characterization of a wide area 802.11b wireless seismic array, in: Center for Embedded Networked Sensing, 2007.
-
(2007)
In Vivo Vharacterization of a Wide Area 802.11b Wireless Seismic Array
-
-
Lukac, M.1
Naik, V.2
Stubailo, I.3
Husker, A.4
Estrin, D.5
-
3
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, J. Anderson, Wireless sensor networks for habitat monitoring, in: Proc. of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, 2002.
-
Proc. of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, 2002
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
4
-
-
77953297684
-
Delay tolerant event collection in sensor networks with mobile sink
-
X. Xu, J. Luo, Q. Zhang, Delay tolerant event collection in sensor networks with mobile sink, in: Proc. of IEEE INFOCOM, 2010.
-
Proc. of IEEE INFOCOM, 2010
-
-
Xu, X.1
Luo, J.2
Zhang, Q.3
-
5
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wirel. Netw. 8 (5) (2002) 521-534.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
-
6
-
-
84988475879
-
A consistency-based secure localization scheme against wormhole attacks in WSNs
-
H. Chen, W. Lou, Z. Wang, A consistency-based secure localization scheme against wormhole attacks in WSNs, in: Proc. of IEEE International Conference on Wireless Algorithms, Systems and Applications, WASA, 2009.
-
Proc. of IEEE International Conference on Wireless Algorithms, Systems and Applications, WASA, 2009
-
-
Chen, H.1
Lou, W.2
Wang, Z.3
-
7
-
-
77749326916
-
Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
-
H. Chen, W. Lou, Z. Wang, Conflicting-set-based wormhole attack resistant localization in wireless sensor networks, in: Proc. of IEEE International Conference on Ubiquitous Intelligence and Computing, UIC, 2009.
-
Proc. of IEEE International Conference on Ubiquitous Intelligence and Computing, UIC, 2009
-
-
Chen, H.1
Lou, W.2
Wang, Z.3
-
8
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, C. Ozturk, Enhancing source-location privacy in sensor network routing, in: Proc. of IEEE ICDCS, 2005, pp. 599-608.
-
Proc. of IEEE ICDCS, 2005
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
9
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenaur, V. Gligor, A key-management scheme for distributed sensor networks, in: Proc. of the 9th ACM Conference on Computer and Communications Security, CCS, 2002, pp. 41-47.
-
Proc. of the 9th ACM Conference on Computer and Communications Security, CCS, 2002
, pp. 41-47
-
-
Eschenaur, L.1
Gligor, V.2
-
10
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Y. Xi, L. Schwiebert, W. Shi, Preserving source location privacy in monitoring-based wireless sensor networks, in: Proc. of 2nd International Workshop on Security in Systems and Networks, SSN, in Conjunction with IPDPS, 2006.
-
Proc. of 2nd International Workshop on Security in Systems and Networks, SSN, in Conjunction with IPDPS, 2006
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
11
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks, in: Proc. of IEEE International Conference on Dependable Systems and Networks, DSN, 2004, pp. 637-646.
-
Proc. of IEEE International Conference on Dependable Systems and Networks, DSN, 2004
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
12
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Y. Jian, S. Chen, Z. Zhang, L. Zhang, Protecting receiver-location privacy in wireless sensor networks, in: Proc. of IEEE INFOCOM, 2007, pp. 1955-1963.
-
Proc. of IEEE INFOCOM, 2007
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
13
-
-
14844303406
-
Source-location privay in energy constrained sensor network routing
-
C. Ozturk, Y. Zhang, W. Trappe, Source-location privay in energy constrained sensor network routing, in: Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, in Conjunction with ACM Conference on Computer and Communications Security, 2004, pp. 88-93.
-
Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, in Conjunction with ACM Conference on Computer and Communications Security, 2004
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
14
-
-
51249113844
-
A source-location privacy protocol in WSN based on locational angle
-
W. Wang, L. Chen, J. Wang, A source-location privacy protocol in WSN based on locational angle, in: Proc. of IEEE ICC, 2008, pp. 1630-1634.
-
Proc. of IEEE ICC, 2008
, pp. 1630-1634
-
-
Wang, W.1
Chen, L.2
Wang, J.3
-
15
-
-
33845942290
-
Entrapping adversaries for source protection in sensor networks
-
Y. Ouyang, Z. Le, G. Chen, J. Ford, F. Makedon, Entrapping adversaries for source protection in sensor networks, in: Proc. of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, 2006, pp. 25-34.
-
Proc. of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, 2006
, pp. 25-34
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
-
16
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
H. Wang, B. Sheng, Q. Li, Privacy-aware routing in sensor networks, Comput. Netw. 53 (9) (2009) 1512-1529.
-
(2009)
Comput. Netw.
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
17
-
-
70449602456
-
Preserving source-location privacy in wireless sensor networks
-
Y. Li, J. Ren, Preserving source-location privacy in wireless sensor networks, in: Proc. of IEEE SECON, 2009.
-
Proc. of IEEE SECON, 2009
-
-
Li, Y.1
Ren, J.2
-
18
-
-
77953302309
-
Source-location privacy through dynamic routing in wireless sensor networks
-
Y. Li, J. Ren, Source-location privacy through dynamic routing in wireless sensor networks, in: Proc. of IEEE INFOCOM, 2010.
-
Proc. of IEEE INFOCOM, 2010
-
-
Li, Y.1
Ren, J.2
-
19
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, M. Wright, Location privacy in sensor networks against a global eavesdropper, in: Proc. of the IEEE International Conference on Network Protocols, ICNP, 2007, pp. 314-323.
-
Proc. of the IEEE International Conference on Network Protocols, ICNP, 2007
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
20
-
-
70249120775
-
Source location privacy against laptop-class attacks in sensor networks
-
Y. Ouyang, Z. Le, D. Liu, J. Ford, F. Makedon, Source location privacy against laptop-class attacks in sensor networks, in: Proc. of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, 2008.
-
Proc. of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, 2008
-
-
Ouyang, Y.1
Le, Z.2
Liu, D.3
Ford, J.4
Makedon, F.5
-
21
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, G. Cao, Towards event source unobservability with minimum network traffic in sensor networks, in: Proc. of the First ACM Conference on Wireless Network Security, WiSec, 2008, pp. 77-88.
-
Proc. of the First ACM Conference on Wireless Network Security, WiSec, 2008
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
22
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, G. Cao, Towards statistically strong source anonymity for sensor networks, in: Proc. of IEEE INFOCOM, 2008, pp. 1298-1306.
-
Proc. of IEEE INFOCOM, 2008
, pp. 1298-1306
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
23
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
J. Deng, R. Han, S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, in: Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm, 2005, pp. 113-126.
-
Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm, 2005
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
24
-
-
84861017329
-
Enhancing sink-location privacy in wireless sensor networks through k-anonymity
-
G. Chai, M. Xu, W. Xu, Z. Lin, Enhancing sink-location privacy in wireless sensor networks through k-anonymity, Int. J. Distrib. Sens. Netw. (2012).
-
(2012)
Int. J. Distrib. Sens. Netw.
-
-
Chai, G.1
Xu, M.2
Xu, W.3
Lin, Z.4
-
28
-
-
84863471916
-
Shortest path computation with no information leakage
-
K. Mouratidis, M.L. Yiu, Shortest path computation with no information leakage, Proc. VLDB Endow. 5 (8) (2012) 692-703.
-
(2012)
Proc. VLDB Endow.
, vol.5
, Issue.8
, pp. 692-703
-
-
Mouratidis, K.1
Yiu, M.L.2
-
29
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Special Issue on Sensor Network Applications and Protocols
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier Ad Hoc Netw. J 1 (2-3) (2003) 293-315. Special Issue on Sensor Network Applications and Protocols.
-
(2003)
Elsevier Ad Hoc Netw. J
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
31
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire tinyos applications, in: Proc. of the First ACM Conference on Embedded Networked Sensor System, SenSys, 2003.
-
Proc. of the First ACM Conference on Embedded Networked Sensor System, SenSys, 2003
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
|