Réseaux de Capteurs Sans Fils
CoursOutils transverses
  • Bibliographie

Bibliographie

akyildiz

Akyildiz I. F. Su W., Sankarasubramaniam Y. et Cayirci E. "Wireless sensor networks: a survey", Computer Networks. Vol. 38(4). - pp. 393-422, 2002

boukerche1

Boukerche A. Werner Nelem Pazzia R., Borges Araujo R. "Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments"; Journal of Parallel and Distributed Computing, Avr 2006. - 4 : Vol. 66. - pp. 586-599.

boukerche2

Boukerche A., Chatzigiannakisb I., Nikoletseas S. "A new energy efficient and fault-tolerant protocol for data propagation in smart dust networks using varying transmission range, 2006. - Vol. 29. - pp. 477-489.

castellucia

Claude Castelluccia, Einar Mykletun, and Gene Tsudik. "Efficient aggregation of encrypted data in wireless sensor networks". In MobiQuitous, pages 109-117. 2005.

cougar

Yong Yao and J. E. Gehrke. The Cougar Approach to In-Network Query Processing in Sensor Networks. Sigmod Record, Volume 31, Number 3, September 2002.

crossbow

http://www.xbow.com/

DD

C. Intanagonwiwat and R. Govindan and D. Estrin, "Directed Diffusion : a Scalable and Robust Communication Paradigm for Sensor Networks", ACM MobiCom 2000, Boston, MA (2000).

EEC-WSN

D. J. Malan, M. Welsh, and M. D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography", Proc. 1st IEEE Int'l.Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004.

eschenauer

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks", In Proceedings of the 9th ACM conference on Computer and communications security, November 2002.

insens

J. Deng, R. Han, and S. Mishra, "Insens : intrusion-Tolerant Routing for Wireless Sensor Networks", Computer Communications 29 (2006), no. 2, 216–230.

kCDS

Daia F., Wub J. "On constructing k-connected k-dominating set in wireless ad hoc and sensor networks"; J. Parallel Distrib. Comput., 2006. - Vol. 66. - pp. 947 – 958.

leap

S. Zhu, S. Setia, and S. Jajodia, "Leap : efficient security mechanisms for large-scale distributed sensor networks", CCS 03 : Proceedings of the 10th ACM conference on Computer and communications security (New York, NY, USA), ACM Press, 2003, pp. 62–72.

mcfa

F. Ye et al., "A Scalable Solution to Minimum Cost Forwarding in Large Sensor Networks", 10th Int. Conf. Comp. Commun. and Networks (2001), 304–309.

nesc

David Gay, Philip Levis, david Culler, Eric Brewer ; "nesC 1.1 Language Reference Manual".

pegasis

S. Lindsey and C. Raghavendra, "PEGASIS : Power-efficient gathering in sensor information systems," in Proceedings of IEEE Aerospace Conference, vol. 3, March 2002, pp. 1125-1130.

ph

Josep Domingo-Ferrer. "A provably secure additive and multiplicative privacy homomorphism". In ISC '02 : Proceedings of the 5th International Conference on Information Security, 2002.

q-composite

H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks", In IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197{213.

route

Kemal Akkaya , Mohamed Younis "A survey on routing protocols for wireless sensor networks" Ad Hoc Networks 3,2005.

RR

D. Braginsky and D. Estrin, "Rumor Routing Algorithm for Sensor Networks", 1st Workshop. Sensor Networks and Apps., Atlanta, GA (2002).

sawn

L.Hu and D. Evans, "Secure aggregation for wireless networks",Workshop on Security and Assurance in Ad Hoc Networks, January 2003.

secrout

J. Yin and S. Madria, "Secrout : A secure routing protocol for sensor networks", AINA 06 : Proceedings of the 20th International Conference on Advanced Information Networking and Applications (Washington, DC, USA), vol. 1, 2006, pp. 393–398.

secroute

Chris Karlof, David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures"; Ad Hoc Networks Vol.1 (2003) pp. 293–315.

secureDAV

Mahimkar A et Rappaport, T.S, SecureDAV : A Secure Data Aggregation and Verication Protocol for Sensor Networks, 2004.

sedan

M.Bagaa, N. Lasla, A. Ouadjaout and Y.Challal ; "SEDAN : Secure and Efficient protocol for Data Aggregation in wireless sensor Networks", 32nd IEEE Conference on Local Computer Networks (LCN 2007) pp. 1053-1060, Worksohop on Netwok Security.

spin

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins : Security Protocols for Sensor Networks", Wirel. Netw. 8 (2002), no. 5, 521–534.

surveyCST

Y.wang, G.Attebury and B.Ramamurty, "A survey of security issues in wireless sensor networks", in IEEE Communication Survey Tutorials, 2006.

teen

A. Manjeshwar and D. P. Agrawal, "Teen : Arouting protocol for enhanced efficiency in wireless sensor networks", the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001, p. 189.

tinyos

http://www.tinyos.net

tinysec

C. Karlof, N. Sastry, and D. Wagner, "Tinysec : A link layer security architecture for wireless sensor networks," in Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004.

tossim

Philip Levis and Nelson Lee, "TOSSIM: A Simulator for TinyOS Networks"

zigbee

http://www.zigbee.org

Webographie

AccueilRéalisé avec SCENARI