|
[1] Crossbow Technology Inc., “Crossbow MICA2DOT datasheet,” 2008. [2] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Communications Magazine, IEEE, vol.40, no.8, pp. 102-114, Aug 2002. [3] Y. Li, M. T. Thai, and W. Wu, “Wireless Sensor Networks and Applications,” Springer, 2008. [4] G. P. Halkes, T. V. Dam, and K. Langendoen, “Comparing energy-saving mac protocols for wireless sensor networks,” ACM Mobile Networks and Applications, vol. 10, no. 5, pp. 783-791, Oct. 2005. [5] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung, “MAC essentials for wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol.12, no.2, pp. 222-248, Second Quarter 2010. [6] J. Kabara, and M. Calle, “MAC protocols used by wireless sensor networks and a general method of performance evaluation,” International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 834784, 11 pages, 2012. [7] M. Li, Z. Li, and A. V. Vasilakos, “A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues,” Proceedings of the IEEE, Vol. 101, No. 12, pp. 2538-2557, 2013. [8] R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” Communications Surveys & Tutorials, IEEE, Vol. PP, No. 99, pp. 1-14, 2013. [9] P. Huang, L. Xiao, S. Soltani, M. W. Mutka, and N. Xi, “The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey,” Communications Surveys & Tutorials, IEEE, Vol. 15, No. 1, pp. 101-120, 2013. [10] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient mac protocol for wireless sensor networks,” in Proc. INFOCOM, New York, 2002, pp. 1567- 1576. [11] T. van Dam and K. Langendoen, “An adaptive energy-efficient mac protocol for wireless sensor networks,” in ACM SenSys '03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, USA, 2003, pp. 171-180. [12] J. Polastre, J. Hill, and D. Culler, “Versatile low power media access for wireless sensor networks,” in Proc. ACM SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, USA, 2004, pp. 95-107. [13] A. El-Hoiydi and J. -D. Decotignie, “WiseMAC: an ultra low power MAC protocol for multi-hop wireless sensor networks,” In Proc. ALGOSENSORS '04: Proceedings of the First International Workshop on Algorithmic Aspects of Wireless Sensor Networks, Lecture Notes in Computer Science, LNCS 3121, 2004, pp. 18-31. [14] M. Buettner, G. V. Yee, E. Anderson and R. Han, “X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks,” in Proc. ACM SenSys '06: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, Boulder, USA, 2006, pp. 307-320. [15] Y. Sun, O. Gurewitz, and D. B. Johnson. “RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks.” In SenSys '08: Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, Raleigh, USA, Nov. 2008, pp. 1–14. [16] A. Wood, and J. A. Stankovic, “Denial of service in sensor networks,” Computer , vol.35, no.10, pp. 54-62, Oct 2002. [17] D. R. Raymond, and S. F. Midkiff, “Denial-of-service in wireless sensor networks: attacks and defenses,” Pervasive Computing, IEEE, vol.7, no.1, pp. 74-81, Jan.-March 2008. [18] F. Stajano, and R. Anderson, “The resurrecting duckling: security issues for adhoc wireless networks,” Proceedings of the 7th International Workshop on Security Protocols, London, UK, 1999, pp. 172-194. [19] M. Brownfield, Y. Gupta, and N. Davis, “Wireless sensor network denial of sleep attack,” in Proc. 6th Annual IEEE SMCIAW '05: Information Assurance Workshop, New York, USA, 2005, pp. 356-364. [20] D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, “Effects of denial of sleep attacks on wireless sensor network MAC protocols,” IEEE Transactions on Vehicular Technology, vol. 58, no. 1, Jan. 2009. [21] R. Falk, and H.J. Hof, “Fighting insomnia: a secure wake-up scheme for wireless sensor networks,” in Proc. SECURWARE '09: Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies, Glyfada, Athens, 2009, pp. 191-196. [22] C. T. Hsueh, C. Y. Wen, and Y. C. Ouyang, “A secure scheme for power exhausting attacks in wireless sensor networks,” in ICUFN 2011: Proceedings of the Third International Conference on Ubiquitous and Future Networks, Dalian, China, 2011, pp. 258-263. [23] C. T. Hsueh, C. Y. Wen, and Y. C. Ouyang, “Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks,” in ITST 2012: Proceedings of the 12th International Conference on ITS Telecommunications, Taipei, Taiwan, 2012, pp. 254-258. [24] V. Srivastava and M. Motani, “Cross-layer design: a survey and the road ahead,” IEEE Communications Magazine, vol. 43, No. 12, pp. 112-119, Dec. 2005. [25] J. L. Hill, and D. E. Culler, “Mica: a wireless platform for deeply embedded networks,” Micro, IEEE , vol.22, no.6, pp. 12-24, Nov/Dec 2002. [26] R. Musaloiu-E., C.-J. M. Liang, and A. Terzis, “Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks,” In Proc. IPSN '08: Proceedings of the 7th international conference on Information processing in sensor networks, IEEE Computer Society, Washington, DC, USA, April 2008, pp. 421-432. [27] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” Communications Surveys & Tutorials, IEEE , vol.8, no.2, pp. 2-23, Second Quarter 2006 [28] S. Ould Amara, R. Beghdad, and M. Oussalah, “Securing Wireless Sensor Networks: A Survey,” EDPACS, The EDP Audit, Control, and Security Newsletter, vol. 47, no. 2, pp. 6-29, February 2013. [29] D. W. Carman, P. S. Kruus, and B. J. Matt, “Constraints and approaches for distributed sensor network security,” NAI Labs, The Security Research Division, Glenwood, Tech. Rep. #00-010, Sept. 2000. [30] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption overhead for sensor network nodes,” in Proc. ACM WSNA '03: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, San Diego, USA, 2003, pp. 151-159. [31] W. Liu, R. Luo, and H. Yang, “Cryptography overhead evaluation and analysis for wireless sensor networks,” in Proc. WRI CMC '09: Proceedings of the International Conference on Communications and Mobile Computing, Kunming, China, 2009, pp. 496-501. [32] J. Lee, K. Kapitanova, and S. H. Son, “The price of security in wireless sensor networks,” Computer Networks, vol. 54, no. 17, pp 2967-2978, December 2010. [33] Y. C. Ouyang, R. L. Chang, and J. H. Chiu, “A new security key exchange channel for 802.11 WLANs,” in Proc. IEEE ICCST: Proceedings of the 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, 2003, pp. 216-221. [34] Y. C. Ouyang, C. B. Jang, and H. T. Chen, “A secure authentication policy for UMTS and WLAN interworking,” in Proc. IEEE ICC '07: Proceedings of the International Conference on Communications, Glasgow, 2007, pp. 1552-1557. [35] Y. C. Ouyang, C. T. Hsueh, and H. W. Chen, “Secure authentication policy with evidential signature scheme for WLAN,” Security and Communication Networks, vol. 2, no. 3, pp. 259-270, May/June 2009. [36] N. Haller, and C. Metz, “A one-time password system,” IETF RFC 2289, Feb. 1998. [37] C. T. Hsueh, Y. W. Li, C. Y. Wen, and Y. C. Ouyang, “Secure adaptive topology control for wireless ad-hoc sensor networks,” Sensors, vol. 10, no. 2, pp. 1251-1278, 2010. [38] K. T. Chu, C. Y. Wen, Y. C. Ouyang, and W. A. Sethares, “Adaptive distributed topology control for wireless ad-hoc sensor networks,” in Proc. SensorComm '07: Proceedings of the International Conference on Sensor Technologies and Applications, Valencia, Spain, 2007, pp. 378-386. [39] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002. [40] T. Dimitriou and I. Krontiris, “A localized, distributed protocol for secure information exchange in sensor networks,” in Proc. IPDPS '05: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, USA, 2005, pp. 240a. [41] Crossbow Technology Inc., “Crossbow MICAz datasheet,” 2006. [42] Atmel Corporation, “Atmel ATmega 128L datasheet,” 2009. [43] Texas Instruments, “Chipcon CC2420 datasheet,” 2007.
|