-
1
-
-
70349619163
-
Industrial wireless sensor networks: Challenges, design principles, and technical approaches
-
V. Gungor, and G. Hancke Industrial wireless sensor networks: challenges, design principles, and technical approaches IEEE Trans. Industr. Electron. 56 10 2009 4258 4265 10.1109/TIE.2009.2015754
-
(2009)
IEEE Trans. Industr. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.1
Hancke, G.2
-
2
-
-
34247379489
-
Transforming agriculture through pervasive wireless sensor networks
-
T. Wark, P. Corke, P. Sikka, L. Klingbeil, Y. Guo, C. Crossman, P. Valencia, D. Swain, and G. Bishop-Hurley Transforming agriculture through pervasive wireless sensor networks IEEE Pervasive Comput. 6 2 2007 50 57 10.1109/MPRV.2007.47
-
(2007)
IEEE Pervasive Comput.
, vol.6
, Issue.2
, pp. 50-57
-
-
Wark, T.1
Corke, P.2
Sikka, P.3
Klingbeil, L.4
Guo, Y.5
Crossman, C.6
Valencia, P.7
Swain, D.8
Bishop-Hurley, G.9
-
3
-
-
77950170315
-
Wireless sensor networks for logistics and retail
-
IEEE Computer Society Washington, DC, USA
-
Z. Zhang, Q. Chen, T. Bergarp, P. Norman, M. Wikstrom, X. Yan, and L.-R. Zheng Wireless sensor networks for logistics and retail INSS 2009 IEEE Computer Society Washington, DC, USA 1 4 10.1109/INSS.2009.5409943
-
(2009)
INSS
, pp. 1-4
-
-
Zhang, Z.1
Chen, Q.2
Bergarp, T.3
Norman, P.4
Wikstrom, M.5
Yan, X.6
Zheng, L.-R.7
-
4
-
-
77950956404
-
Wsn-hm: Energy-efficient wsn for home monitoring
-
IEEE Computer Society Washington, DC, USA
-
Y. Zatout, E. Campo, and J.-F. Llibre Wsn-hm: energy-efficient wsn for home monitoring ISSNIP 2009 IEEE Computer Society Washington, DC, USA 367 372 10.1109/ISSNIP.2009.5416757
-
(2009)
ISSNIP
, pp. 367-372
-
-
Zatout, Y.1
Campo, E.2
Llibre, J.-F.3
-
5
-
-
77951100712
-
Federated and shared use of sensor networks through security middleware
-
IEEE Computer Society Washington, DC, USA
-
C. Huygens, and W. Joosen Federated and shared use of sensor networks through security middleware ITNG '09 2009 IEEE Computer Society Washington, DC, USA 1005 1011 10.1109/ITNG.2009.181
-
(2009)
ITNG '09
, pp. 1005-1011
-
-
Huygens, C.1
Joosen, W.2
-
6
-
-
78650916738
-
A shared sensor network infrastructure
-
ACM New York, NY, USA
-
C. Efstratiou, I. Leontiadis, C. Mascolo, and J. Crowcroft A shared sensor network infrastructure SenSys '10 2010 ACM New York, NY, USA 367 368 10.1145/1869983.1870026
-
(2010)
SenSys '10
, pp. 367-368
-
-
Efstratiou, C.1
Leontiadis, I.2
Mascolo, C.3
Crowcroft, J.4
-
7
-
-
84868099324
-
Evaluating ubiquitous sensor information sharing on the internet-of-things
-
S. Forsstrom, P. Osterberg, T. Kanter, Evaluating ubiquitous sensor information sharing on the internet-of-things, in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 1454-1460. http://dx.doi.org/10.1109/TrustCom.2012.151.
-
(2012)
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 1454-1460
-
-
Forsstrom, S.1
Osterberg, P.2
Kanter, T.3
-
8
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
WSNA '02 ACM New York, NY, USA
-
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson Wireless sensor networks for habitat monitoring Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications WSNA '02 2002 ACM New York, NY, USA 88 97 10.1145/570738.570751
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 88-97
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
9
-
-
79959234034
-
Applying a multi-paradigm approach to implementing wireless sensor network based river monitoring
-
J. Ueyama, D. Hughes, K. Man, S. Guan, N. Matthys, W. Horre and, S. Michiels, C. Huygens, W. Joosen, Applying a multi-paradigm approach to implementing wireless sensor network based river monitoring, in: 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce Its Applications and Embedded Systems (CDEE), 2010, pp. 187-191. http://dx.doi.org/10.1109/CDEE.2010.44.
-
(2010)
2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce Its Applications and Embedded Systems (CDEE)
, pp. 187-191
-
-
Ueyama, J.1
Hughes, D.2
Man, K.3
Guan, S.4
Matthys, N.5
Horre, W.6
Michiels, S.7
Huygens, C.8
Joosen, W.9
-
10
-
-
84857206147
-
Senshare: Transforming sensor networks into multi-application sensing infrastructures
-
Springer-Verlag Berlin, Heidelberg
-
I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft Senshare: transforming sensor networks into multi-application sensing infrastructures EWSN'12 2012 Springer-Verlag Berlin, Heidelberg 65 81 10.1007/978-3-642-28169-3-5
-
(2012)
EWSN'12
, pp. 65-81
-
-
Leontiadis, I.1
Efstratiou, C.2
Mascolo, C.3
Crowcroft, J.4
-
11
-
-
31544434117
-
Towards multi-purpose wireless sensor networks
-
J. Steffan, L. Fiege, M. Cilia, A. Buchmann, Towards multi-purpose wireless sensor networks, in: 2005 Proceedings Systems Communications, 2005, pp. 336-341. http://dx.doi.org/10.1109/ICW.2005.77.
-
(2005)
2005 Proceedings Systems Communications
, pp. 336-341
-
-
Steffan, J.1
Fiege, L.2
Cilia, M.3
Buchmann, A.4
-
12
-
-
77953848025
-
Multi-application deployment in shared sensor networks based on quality of monitoring
-
S. Bhattacharya, A. Saifullah, C. Lu, G.-C. Roman, Multi-application deployment in shared sensor networks based on quality of monitoring, in: 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2010, pp. 259-268. http://dx.doi.org/10.1109/RTAS.2010.20.
-
(2010)
2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)
, pp. 259-268
-
-
Bhattacharya, S.1
Saifullah, A.2
Lu, C.3
Roman, G.-C.4
-
13
-
-
78650921155
-
From today's intranet of things to a future internet of things: A wireless- and mobility-related view
-
M. Zorzi, A. Gluhak, S. Lange, and A. Bassi From today's intranet of things to a future internet of things: a wireless- and mobility-related view IEEE Wireless Commun. 17 6 2010 44 51 10.1109/MWC.2010.5675777
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.6
, pp. 44-51
-
-
Zorzi, M.1
Gluhak, A.2
Lange, S.3
Bassi, A.4
-
14
-
-
79952494101
-
Efficient incremental code update for sensor networks
-
R.K. Panta, S. Bagchi, and S.P. Midkiff Efficient incremental code update for sensor networks ACM Trans. Sen. Netw. 7 4 2011 30:1 30:32 10.1145/1921621.1921624
-
(2011)
ACM Trans. Sen. Netw.
, vol.7
, Issue.4
, pp. 301-3032
-
-
Panta, R.K.1
Bagchi, S.2
Midkiff, S.P.3
-
15
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
J. Deng, R. Han, S. Mishra, Secure code distribution in dynamically programmable wireless sensor networks, in: IPSN '06: Proceedings of the 5th International Conference on Information Processing in Sensor Networks, 2006, pp. 292-300. http://dx.doi.org/10.1109/IPSN.2006.243786.
-
(2006)
IPSN '06: Proceedings of the 5th International Conference on Information Processing in Sensor Networks
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
16
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
ACM New York, NY, USA
-
J.W. Hui, and D. Culler The dynamic behavior of a data dissemination protocol for network programming at scale SenSys '04 2004 ACM New York, NY, USA 81 94 10.1145/1031495.1031506
-
(2004)
SenSys '04
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
18
-
-
84867921460
-
Looci: The loosely-coupled component infrastructure
-
IEEE
-
D. Hughes, K. Thoelen, J. Maerien, N. Matthys, W. Horre, J. Del Cid, C. Huygens, S. Michiels, and W. Joosen Looci: the loosely-coupled component infrastructure 2012 Network Computing and Applications (NCA) 2012 IEEE 236 243
-
(2012)
2012 Network Computing and Applications (NCA)
, pp. 236-243
-
-
Hughes, D.1
Thoelen, K.2
Maerien, J.3
Matthys, N.4
Horre, W.5
Del Cid, J.6
Huygens, C.7
Michiels, S.8
Joosen, W.9
-
19
-
-
77955386951
-
Programming sensor networks using remora component model
-
Springer Berlin, Heidelberg
-
A. Taherkordi, F. Loiret, A. Abdolrazaghi, R. Rouvoy, Q. Le-Trung, and F. Eliassen Programming sensor networks using remora component model Distributed Computing in Sensor Systems vol. 6131 2010 Springer Berlin, Heidelberg 45 62 10.1007/978-3-642-13651-1-4
-
(2010)
Distributed Computing in Sensor Systems
, vol.6131
, pp. 45-62
-
-
Taherkordi, A.1
Loiret, F.2
Abdolrazaghi, A.3
Rouvoy, R.4
Le-Trung, Q.5
Eliassen, F.6
-
20
-
-
78650911380
-
-
Z. Shelby, K. Hartke, C. Bormann, Constrained Application Protocol (CoAP), Tech. rep., Internet Engineering Task Force, 2013. < http://tools.ietf.org/html/draft-ietf-core-coap-14 >.
-
(2013)
Constrained Application Protocol (CoAP), Tech. Rep., Internet Engineering Task Force
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
22
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM New York, NY, USA
-
S. Zhu, S. Setia, and S. Jajodia Leap: efficient security mechanisms for large-scale distributed sensor networks CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security 2003 ACM New York, NY, USA 62 72 10.1145/948109.948120
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
23
-
-
26444574670
-
Tinysec: A link layer security architecture for wsns
-
ACM New York, NY, USA
-
C. Karlof, N. Sastry, and D. Wagner Tinysec: a link layer security architecture for wsns SenSys '04 2004 ACM New York, NY, USA 162 175 10.1145/1031495.1031515
-
(2004)
SenSys '04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
24
-
-
78650730501
-
Masy: Management of secret keys for federated mobile wireless sensor networks
-
WIMOB 2010 IEEE Computer Society Washington, DC, USA
-
J. Maerien, S. Michiels, C. Huygens, and W. Joosen Masy: management of secret keys for federated mobile wireless sensor networks 2010 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications WIMOB 2010 2010 IEEE Computer Society Washington, DC, USA
-
(2010)
2010 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
-
-
Maerien, J.1
Michiels, S.2
Huygens, C.3
Joosen, W.4
-
25
-
-
83355164797
-
Sasha: A distributed protocol for secure application deployment in shared ad-hoc wireless sensor networks
-
J. Maerien, S. Michiels, C. Huygens, W. Joosen, Sasha: A distributed protocol for secure application deployment in shared ad-hoc wireless sensor networks, in: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, pp. 43-48. http://dx.doi.org/10.1109/MASS.2011.16.
-
(2011)
2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS)
, pp. 43-48
-
-
Maerien, J.1
Michiels, S.2
Huygens, C.3
Joosen, W.4
-
26
-
-
84893369959
-
Access control in multi-party wireless sensor networks
-
Springer Berlin, Heidelberg
-
J. Maerien, S. Michiels, C. Huygens, D. Hughes, and W. Joosen Access control in multi-party wireless sensor networks Wireless Sensor Networks vol. 7772 2013 Springer Berlin, Heidelberg 34 49 10.1007/978-3-642-36672-7-3
-
(2013)
Wireless Sensor Networks
, vol.7772
, pp. 34-49
-
-
Maerien, J.1
Michiels, S.2
Huygens, C.3
Hughes, D.4
Joosen, W.5
-
30
-
-
84892571799
-
-
OASIS
-
M. Chapman, M. Edwards, M. Beisiegel, A. Karmarkar, S. Patil, M. Rowley, Service Component Architecture Assembly Model Specification Version 1.1, Tech. rep., OASIS, 2011.
-
(2011)
Service Component Architecture Assembly Model Specification Version 1.1, Tech. Rep.
-
-
Chapman, M.1
Edwards, M.2
Beisiegel, M.3
Karmarkar, A.4
Patil, S.5
Rowley, M.6
-
32
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inf. Theory 29 2 1983 198 208
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
34
-
-
2442512413
-
-
S. Godik, T. Moses, Extensible Access Control Markup Language (xacml), v2.0, Tech. rep., OASIS, 2005.
-
(2005)
Extensible Access Control Markup Language (Xacml), v2.0, Tech. Rep., OASIS
-
-
Godik, S.1
Moses, T.2
-
36
-
-
84911875895
-
A survey of key distribution in wireless sensor networks
-
C.-Y. Chen, and H.-C. Chao A survey of key distribution in wireless sensor networks Secur. Commun. Networks 2011 http://dx.doi.org/10.1002/sec.354
-
(2011)
Secur. Commun. Networks
-
-
Chen, C.-Y.1
Chao, H.-C.2
-
37
-
-
79957570513
-
Sensekey - Simplifying the selection of key management schemes for sensor networks
-
R. Roman, J. Lopez, C. Alcaraz, H.-H. Chen, Sensekey - simplifying the selection of key management schemes for sensor networks, in: 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp. 789-794. http://dx.doi.org/10.1109/WAINA.2011.78.
-
(2011)
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
, pp. 789-794
-
-
Roman, R.1
Lopez, J.2
Alcaraz, C.3
Chen, H.-H.4
-
40
-
-
84857044446
-
Towards enhanced key management in multi-phase ZigBee network architecture
-
B. Tian, S. Han, L. Liu, S. Khadem, and S. Parvin Towards enhanced key management in multi-phase ZigBee network architecture Comput. Commun. 35 5 2012 579 588 10.1016/j.comcom.2011.12.004 < http://www.sciencedirect.com/science/article/pii/S0140366411003884 >
-
(2012)
Comput. Commun.
, vol.35
, Issue.5
, pp. 579-588
-
-
Tian, B.1
Han, S.2
Liu, L.3
Khadem, S.4
Parvin, S.5
-
41
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler Spins: security protocols for sensor networks Wireless Network. 8 5 2002 521 534 10.1023/A:1016598314198
-
(2002)
Wireless Network.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
42
-
-
77956128351
-
Toward trusted wireless sensor networks
-
W. Hu, H. Tan, P. Corke, W.C. Shih, and S. Jha Toward trusted wireless sensor networks ACM Trans. Sensor Networks 7 1 2010 1 25 10.1145/1806895.1806900
-
(2010)
ACM Trans. Sensor Networks
, vol.7
, Issue.1
, pp. 1-25
-
-
Hu, W.1
Tan, H.2
Corke, P.3
Shih, W.C.4
Jha, S.5
-
43
-
-
71249112411
-
Sm- sens: Security middleware for wireless sensor networks
-
L. Freitas, K. Bispo, N. Rosa, P. Cunha, Sm- sens: Security middleware for wireless sensor networks, in: 2009. GIIS '09. Global Information Infrastructure Symposium, 2009, pp. 1-7. http://dx.doi.org/10.1109/GIIS.2009.5307039.
-
(2009)
2009. GIIS '09. Global Information Infrastructure Symposium
, pp. 1-7
-
-
Freitas, L.1
Bispo, K.2
Rosa, N.3
Cunha, P.4
-
44
-
-
70349154616
-
On the application of pairing based cryptography to wireless sensor networks
-
ACM Press New York, NY, USA
-
P. Szczechowiak, A. Kargl, M. Scott, and M. Collier On the application of pairing based cryptography to wireless sensor networks WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security 2009 ACM Press New York, NY, USA 1 12 10.1145/1514274.1514276
-
(2009)
WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
-
45
-
-
0034445661
-
System architecture directions for networked sensors
-
ACM Press New York, NY, USA
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister System architecture directions for networked sensors ASPLOS-IX: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems 2000 ACM Press New York, NY, USA 93 104 10.1145/378993.379006
-
(2000)
ASPLOS-IX: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
46
-
-
33947642085
-
Sluice: Secure dissemination of code updates in sensor networks
-
IEEE Computer Society Washington, DC, USA
-
P.E. Lanigan, R. Gandhi, and P. Narasimhan Sluice: secure dissemination of code updates in sensor networks ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems 2006 IEEE Computer Society Washington, DC, USA 53 10.1109/ICDCS.2006.77
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 53
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
47
-
-
51249093755
-
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
-
S. Hyun, P. Ning, A. Liu, W. Du, Seluge: Secure and dos-resistant code dissemination in wireless sensor networks, in: 2008. IPSN '08. International Conference on Information Processing in Sensor Networks, 2008, pp. 445-456. http://dx.doi.org/10.1109/IPSN.2008.12.
-
(2008)
IPSN '08. International Conference on Information Processing in Sensor Networks, 2008
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
48
-
-
70349103341
-
A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks
-
ACM New York, NY, USA
-
H. Tan, D. Ostry, J. Zic, and S. Jha A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security 2009 ACM New York, NY, USA 245 252 10.1145/1514274.1514308
-
(2009)
WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 245-252
-
-
Tan, H.1
Ostry, D.2
Zic, J.3
Jha, S.4
-
49
-
-
70449134841
-
Formally verified authenticated query dissemination in sensor networks
-
IEEE Press < >
-
F. Werner, and Z. Benenson Formally verified authenticated query dissemination in sensor networks SPECTS'09 2009 IEEE Press 154 161 < http://dl.acm.org/citation.cfm?id=1688291.1688315 >
-
(2009)
SPECTS'09
, pp. 154-161
-
-
Werner, F.1
Benenson, Z.2
-
50
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou, Y. Zhang, Multi-user broadcast authentication in wireless sensor networks, in: SECON '07, 2007, pp. 223-232. http://dx.doi.org/10.1109/SAHCN.2007.4292834.
-
(2007)
SECON '07
, pp. 223-232
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
52
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
D. He, J. Bu, S. Zhu, S. Chan, and C. Chen Distributed access control with privacy support in wireless sensor networks IEEE Trans. Wireless Commun. 10 10 2011 3472 3481 10.1109/TWC.2011.072511.102283
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.1
Bu, J.2
Zhu, S.3
Chan, S.4
Chen, C.5
-
53
-
-
0003497486
-
Introduction to Version 3 of the Internet-standard Network Management Framework
-
J. Case, R. Mundy, D. Partain, B. Stewart, Introduction to Version 3 of the Internet-standard Network Management Framework, IETF, 1999.
-
(1999)
IETF
-
-
Case, J.1
Mundy, R.2
Partain, D.3
Stewart, B.4
-
54
-
-
84905870693
-
Sympathy for the sensor network debugger
-
SenSys '05 ACM New York, NY, USA
-
N. Ramanathan, K. Chang, R. Kapur, L. Girod, E. Kohler, and D. Estrin Sympathy for the sensor network debugger Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems SenSys '05 2005 ACM New York, NY, USA 255 267 10.1145/1098918.1098946
-
(2005)
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems
, pp. 255-267
-
-
Ramanathan, N.1
Chang, K.2
Kapur, R.3
Girod, L.4
Kohler, E.5
Estrin, D.6
-
55
-
-
77954416841
-
Snds: A distributed monitoring and protocol analysis system for wireless sensor network
-
X. Kuang, J. Shen, Snds: a distributed monitoring and protocol analysis system for wireless sensor network, in: International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, 2010, pp. 422-425. http://dx.doi.org/10.1109/NSWCTC.2010.233.
-
(2010)
International Conference on Networks Security, Wireless Communications and Trusted Computing
, vol.2
, pp. 422-425
-
-
Kuang, X.1
Shen, J.2
-
56
-
-
57649227663
-
On the need for passive monitoring in sensor networks
-
A. Awad, R. Nebel, R. German, F. Dressler, On the need for passive monitoring in sensor networks, in: Euromicro Symposium on Digital Systems Design, 2008, pp. 693-699. http://dx.doi.org/10.1109/DSD.2008.12.
-
(2008)
Euromicro Symposium on Digital Systems Design
, pp. 693-699
-
-
Awad, A.1
Nebel, R.2
German, R.3
Dressler, F.4
-
57
-
-
84863451487
-
Moving application logic from the firmware to the cloud: Towards the thin server architecture for the internet of things
-
M. Kovatsch, S. Mayer, B. Ostermaier, Moving application logic from the firmware to the cloud: Towards the thin server architecture for the internet of things, in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012, pp. 751-756. http://dx.doi.org/10.1109/IMIS.2012.104.
-
(2012)
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
, pp. 751-756
-
-
Kovatsch, M.1
Mayer, S.2
Ostermaier, B.3
-
58
-
-
20544456753
-
Contiki - A lightweight and flexible operating system for tiny networked sensors
-
IEEE Computer Society Washington, DC, USA
-
A. Dunkels, B. Gronvall, and T. Voigt Contiki - a lightweight and flexible operating system for tiny networked sensors LCN '04 2004 IEEE Computer Society Washington, DC, USA 455 462 10.1109/LCN.2004.38
-
(2004)
LCN '04
, pp. 455-462
-
-
Dunkels, A.1
Gronvall, B.2
Voigt, T.3
-
59
-
-
84930700079
-
-
Atmel, Avr raven, 2008. < http://www.atmel.com/tools/AVRRAVEN.aspx >.
-
(2008)
Atmel, Avr Raven
-
-
-
60
-
-
28444456160
-
Cross-layer energy analysis of multihop wireless sensor networks
-
J. Haapola, Z. Shelby, C. Pomalaza-Raez, P. Mahonen, Cross-layer energy analysis of multihop wireless sensor networks, in: 2005 Proceedings of the Second European Workshop on Wireless Sensor Networks. 2005, pp. 33-44. http://dx.doi.org/10.1109/EWSN.2005.1461997.
-
(2005)
2005 Proceedings of the Second European Workshop on Wireless Sensor Networks
, pp. 33-44
-
-
Haapola, J.1
Shelby, Z.2
Pomalaza-Raez, C.3
Mahonen, P.4
-
61
-
-
84857561279
-
Comparing the energy efficiency of single-hop, multi-hop and incremental decode-and-forward in multi-relay wireless sensor networks
-
M. Kakitani, G. Brante, R. Demo Souza, A. Munaretto, Comparing the energy efficiency of single-hop, multi-hop and incremental decode-and-forward in multi-relay wireless sensor networks, in: 2011 IEEE 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2011, pp. 970-974. http://dx.doi.org/10.1109/PIMRC.2011.6140114.
-
(2011)
2011 IEEE 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC)
, pp. 970-974
-
-
Kakitani, M.1
Brante, G.2
Demo Souza, R.3
Munaretto, A.4
-
62
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
ACM Press New York, NY, USA
-
C. Kuo, M. Luk, R. Negi, and A. Perrig Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes SenSys '07: Proceedings of the 5th International Conference on Embedded Networked Sensor Systems 2007 ACM Press New York, NY, USA 233 246 10.1145/1322263.1322286
-
(2007)
SenSys '07: Proceedings of the 5th International Conference on Embedded Networked Sensor Systems
, pp. 233-246
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
64
-
-
35348873847
-
Harbor: Software-based memory protection for sensor nodes
-
IPSN '07 ACM New York, NY, USA
-
R. Kumar, E. Kohler, and M. Srivastava Harbor: software-based memory protection for sensor nodes Proceedings of the 6th International Conference on Information Processing in Sensor Networks IPSN '07 2007 ACM New York, NY, USA 340 349 10.1145/1236360.1236404
-
(2007)
Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 340-349
-
-
Kumar, R.1
Kohler, E.2
Srivastava, M.3
-
65
-
-
79955033384
-
Verifast: A powerful, sound, predictable, fast verifier for C and Java
-
M. Bobaru, K. Havelund, G. Holzmann, R. Joshi, Lect. Notes Comput. Sci. Springer Berlin, Heidelberg
-
B. Jacobs, J. Smans, P. Philippaerts, F. Vogels, W. Penninckx, and F. Piessens Verifast: a powerful, sound, predictable, fast verifier for C and Java M. Bobaru, K. Havelund, G. Holzmann, R. Joshi, NASA Formal Methods Lect. Notes Comput. Sci. vol. 6617 2011 Springer Berlin, Heidelberg 41 55 10.1007/978-3-642-20398-5-4
-
(2011)
NASA Formal Methods
, vol.6617
, pp. 41-55
-
-
Jacobs, B.1
Smans, J.2
Philippaerts, P.3
Vogels, F.4
Penninckx, W.5
Piessens, F.6
-
66
-
-
84930723184
-
-
March
-
Avr-crypto-lib, March 2011. < http://avrcryptolib.das-labor.org >.
-
(2011)
Avr-crypto-lib
-
-
-
67
-
-
27644580707
-
Demystifying the threat modeling process
-
P. Torr Demystifying the threat modeling process IEEE Secur. Privacy 3 5 2005 66 70 10.1109/MSP.2005.119
-
(2005)
IEEE Secur. Privacy
, vol.3
, Issue.5
, pp. 66-70
-
-
Torr, P.1
-
69
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. de Meulenaer, F. Gosset, O.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: WIMOB '08. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. 2008, pp. 580-585. http://dx.doi.org/10.1109/WiMob.2008.16.
-
(2008)
WIMOB '08. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, O.-X.3
Pereira, O.4
|