-
1
-
-
79957590723
-
ELMO: Energy aware local monitoring in sensor networks
-
Jul./Aug
-
I. Khalil, "ELMO: Energy aware local monitoring in sensor networks, " IEEE Trans. Dependable Secure Comput., vol. 8, no. 4, pp. 523-536, Jul./Aug. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput
, vol.8
, Issue.4
, pp. 523-536
-
-
Khalil, I.1
-
3
-
-
79959875952
-
LUSTER: Wireless sensor network for environmental research
-
L. Selavo, A. Wood, Q. Cao, T. Sookoor, H. Liu, A. Srinivasan, Y. Wu, W. Kang, J. Stankovic, D. Young, and J. Porter, "LUSTER: Wireless sensor network for environmental research, " in Proc. ACM 5th Int. Conf. Embedded Netw. Sens. Syst., 2007, pp. 103-116.
-
(2007)
Proc ACM 5th Int. Conf. Embedded Netw. Sens. Syst
, pp. 103-116
-
-
Selavo, L.1
Wood, A.2
Cao, Q.3
Sookoor, T.4
Liu, H.5
Srinivasan, A.6
Wu, Y.7
Kang, W.8
Stankovic, J.9
Young, D.10
Porter, J.11
-
4
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks, " in Proc. ACM 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2005, pp. 46-57.
-
(2005)
Proc ACM 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
5
-
-
84925349017
-
LearJam: An energy-efficient learning-based jamming attack against low-duty-cycle networks
-
Z. Yang, P. Cheng, and J. Chen, "LearJam: An energy-efficient learning-based jamming attack against low-duty-cycle networks, " in Proc. IEEE 11th Int. Conf. Mobile Ad Hoc Sens. Syst., 2014, pp. 354-362.
-
(2014)
Proc IEEE 11th Int. Conf. Mobile Ad Hoc Sens. Syst
, pp. 354-362
-
-
Yang, Z.1
Cheng, P.2
Chen, J.3
-
6
-
-
84866605768
-
Jammingresilient multipath routing
-
Nov./Dec
-
H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, "Jammingresilient multipath routing, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 852-864, Nov./Dec. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput
, vol.9
, Issue.6
, pp. 852-864
-
-
Mustafa, H.1
Zhang, X.2
Liu, Z.3
Xu, W.4
Perrig, A.5
-
7
-
-
81455142735
-
Packet-hiding methods for preventing selective jamming attacks
-
Jan./Feb
-
A. Proano and L. Loukas, "Packet-hiding methods for preventing selective jamming attacks, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 101-114, Jan./Feb. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput
, vol.9
, Issue.1
, pp. 101-114
-
-
Proano, A.1
Loukas, L.2
-
8
-
-
84921341664
-
Camouflage Traffic: Minimizing message delay for smart grid applications under jamming
-
Jan./Feb
-
L. Zhuo, W. Wang, and C. Wang, "Camouflage Traffic: Minimizing message delay for smart grid applications under jamming, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 31-44, Jan./Feb. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput
, vol.12
, Issue.1
, pp. 31-44
-
-
Zhuo, L.1
Wang, W.2
Wang, C.3
-
9
-
-
84940705050
-
Optimal DoS attack scheduling in wireless networked control systems
-
Aug
-
H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control systems, " IEEE Trans. Control Syst. Technol., DOI: 10.1109/TCST.2015.2462741, Aug. 2015.
-
(2015)
IEEE Trans. Control Syst. Technol
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.4
-
10
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks, " IEEE Comput., vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Comput
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
12
-
-
84924785601
-
Robust and cost-effective design of cyber-physical systems: An optimal middleware deployment approach
-
Mar
-
D. Shin, S. He and J. Zhang, "Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach, " IEEE/ACM Trans. Netw., DOI: 10.1109/TNET.2015.2403862, Mar. 2015.
-
(2015)
IEEE/ACM Trans. Netw
-
-
Shin, D.1
He, S.2
Zhang, J.3
-
13
-
-
78650681547
-
Designing an industrial real-Time measurement and monitoring system based on embedded system and zigbee
-
W. T. Sung and Y. C. Hsu, "Designing an industrial real-Time measurement and monitoring system based on embedded system and zigbee, " Expert Syst. Appl, vol. 38, no. 4, pp. 4522-4529, 2011.
-
(2011)
Expert Syst. Appl
, vol.38
, Issue.4
, pp. 4522-4529
-
-
Sung, W.T.1
Hsu, Y.C.2
-
14
-
-
33744944530
-
Towards optimal sleep scheduling in sensor networks for rare event detection
-
Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection, " in Proc. ACM 4th Int. Symp. Inf. Process. Sens. Netw., 2005, pp. 20-27.
-
(2005)
Proc ACM 4th Int. Symp. Inf. Process. Sens. Netw
, pp. 20-27
-
-
Cao, Q.1
Abdelzaher, T.2
He, T.3
Stankovic, J.4
-
15
-
-
84883083273
-
PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks
-
H. Huang, J. Yun, Z. Zhong, S. Kim, and Tian He, "PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks, " in Proc. IEEE INFOCOM, 2013, pp. 2661-2669.
-
(2013)
Proc IEEE INFOCOM
, pp. 2661-2669
-
-
Huang, H.1
Yun, J.2
Zhong, Z.3
Kim, S.4
He, T.5
-
16
-
-
84941918744
-
Data gathering optimization by dynmaic sensing and routing in rechargeable sensor networks
-
Jun
-
Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynmaic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., DOI: 10.1109/TNET.2015.2425146, Jun. 2015.
-
(2015)
IEEE/ ACM Trans. Netw
-
-
Zhang, Y.1
He, S.2
Chen, J.3
-
17
-
-
70450231628
-
Opportunistic flooding in lowduty-cycle wireless sensor networks with unreliable links
-
S. Guo, Y. Gu, B. Jiang, and T. He, "Opportunistic flooding in lowduty-cycle wireless sensor networks with unreliable links, " in Proc. ACM 15th Annu. Int. Conf. Mobile Comput. Netw., 2009, pp. 133-144.
-
(2009)
Proc ACM 15th Annu. Int. Conf. Mobile Comput. Netw
, pp. 133-144
-
-
Guo, S.1
Gu, Y.2
Jiang, B.3
He, T.4
-
18
-
-
17744369960
-
CSMA-MPS: A Minimum preamble sampling MAC protocol for low power wireless sensor networks
-
S. Mahlknecht and M. Boeck, "CSMA-MPS: A Minimum preamble sampling MAC protocol for low power wireless sensor networks, " in Proc. IEEE Int. WorkshopFactory Commun. Syst., 2004, pp. 73-80.
-
(2004)
Proc. IEEE Int. WorkshopFactory Commun. Syst
, pp. 73-80
-
-
Mahlknecht, S.1
Boeck, M.2
-
19
-
-
27644533289
-
The flooding time synchronization protocol
-
M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, "The flooding time synchronization protocol, " in Proc. ACM 2nd Int. Conf. Embedded Netw. Sens. Syst., pp. 39-49, 2004.
-
(2004)
Proc ACM 2nd Int. Conf. Embedded Netw. Sens. Syst
, pp. 39-49
-
-
Maroti, M.1
Kusy, B.2
Simon, G.3
Ledeczi, A.4
-
20
-
-
11244284030
-
Clock drift reduction for relative time slot TDMA-based sensor networks
-
R. Tjoa, K. Chee, P. Sivaprasad, S. Rao, and J. Lim, "Clock drift reduction for relative time slot TDMA-based sensor networks, " in Proc. IEEE 15th Int. Symp. Pers. Indoor Mobile Radio Commun., 2004, vol. 2, pp. 1042-1047.
-
(2004)
Proc IEEE 15th Int. Symp. Pers. Indoor Mobile Radio Commun
, vol.2
, pp. 1042-1047
-
-
Tjoa, R.1
Chee, K.2
Sivaprasad, P.3
Rao, S.4
Lim, J.5
-
21
-
-
84855736529
-
DCS: Distributed asynchronous clock synchronization in delay tolerant networks
-
Mar
-
B. Choi, H. Liang, X. Shen, and W. Zhuang, "DCS: Distributed asynchronous clock synchronization in delay tolerant networks, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 3, pp. 491-504, Mar. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.3
, pp. 491-504
-
-
Choi, B.1
Liang, H.2
Shen, X.3
Zhuang, W.4
-
23
-
-
33745949686
-
Energyefficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Y. Law, L. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energyefficient link-layer jamming attacks against wireless sensor network MAC protocols, " in Proc. ACM 3rd Workshop Security Ad Hoc Sens. Netw., 2005, pp. 76-88.
-
(2005)
Proc ACM 3rd Workshop Security Ad Hoc Sens. Netw
, pp. 76-88
-
-
Law, Y.1
Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
24
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks, " in Proc. IEEE INFOCOM, 2007, pp. 1307-1315.
-
(2007)
Proc IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
25
-
-
47749152959
-
Adaptive distance estimation and localization in WSN using RSSI measures
-
A. Awad, T. Frunzke, and F. Dressler, "Adaptive distance estimation and localization in WSN using RSSI measures, " in Proc. IEEE Eur. Conf. Digital System Des. Architectures, Methods. Tool, 2007, pp. 471-478.
-
(2007)
Proc IEEE Eur. Conf. Digital System Des. Architectures, Methods. Tool
, pp. 471-478
-
-
Awad, A.1
Frunzke, T.2
Dressler, F.3
-
27
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Reactive jamming in wireless networks: How realistic is the threat?" in Proc. ACM 4th ACM Conf. Wireless Netw. Security, 2011, pp. 47-52.
-
(2011)
Proc ACM 4th ACM Conf. Wireless Netw. Security
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
28
-
-
80052164345
-
EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks
-
G. Liu, J. Luo, Q. Xiao, and B. Xiao, "EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks, " in Proc. IEEE Int. Conf. Commun., 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun
, pp. 1-5
-
-
Liu, G.1
Luo, J.2
Xiao, Q.3
Xiao, B.4
-
30
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4 based wireless networks
-
A. D. Wood, J. A. Stankovic, and G. Zhou, "DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4 based wireless networks, " in Proc. IEEE 4th Annu. Commun. Soc. Conf. Sens. Mesh Ad Hoc Commun. Netw., 2007, pp. 60-69.
-
(2007)
Proc. IEEE 4th Annu. Commun. Soc. Conf. Sens. Mesh Ad Hoc Commun. Netw
, pp. 60-69
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
31
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks, " Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
32
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications, " in Proc. 21st ACM Symp. Theory Comput., 1989, pp. 33-43.
-
(1989)
Proc. 21st ACM Symp. Theory Comput
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
34
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Oct-Dec
-
O. Younis and S. Fahmy, "HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, " IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366-379, Oct.-Dec. 2004.
-
(2004)
IEEE Trans. Mobile Comput
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
35
-
-
84893289329
-
Droplet: A New denial-of-service attack on low power wireless sensor networks
-
Z. He and T. Voigt, "Droplet: A New denial-of-service attack on low power wireless sensor networks, " in Proc. IEEE 10th Int. Conf. Mobile Ad-Hoc Sens. Syst., 2013, pp. 542-550.
-
(2013)
Proc IEEE 10th Int. Conf. Mobile Ad-Hoc Sens. Syst
, pp. 542-550
-
-
He, Z.1
Voigt, T.2
-
36
-
-
79960872905
-
PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks
-
L. Tang, Y. Sun, O. Gurewitz, and D. B. Johnson, "PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks, " in Proc. IEEE INFOCOM, 2011, pp. 1305-1313.
-
(2011)
Proc IEEE INFOCOM
, pp. 1305-1313
-
-
Tang, L.1
Sun, Y.2
Gurewitz, O.3
Johnson, D.B.4
|