[1]
|
T. Stathopoulos, J. Heidemann, and D. Estrin, “A remote code update mechanism for wireless sensor networks,” Technical Report, UCLA, Los Angeles, CA, USA, 2003.
|
[2]
|
J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in ACM International Conference on Embedded Networked Sensor Systems, pp. 81-94, November 2004.
|
[3]
|
S. S. Kulkarni and L. Wang, “MNP: Multihop network reprogramming service for sensor networks,” in International Conference on Distributed Computing Systems (ICDCS’05), June 2005.
|
[4]
|
S. S. Kulkarni and M. Arumugam, “INFUSE: A TDMA based data dissemination protocol for sensor networks,” Technical Report, Michigan State University, East Lansing, MI, USA, 2004.
|
[5]
|
V. Naik, et al., “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices,” 26th IEEE Real-Time System Symposium, December 2005.
|
[6]
|
L. A. Phillips, “Aqueduct: Robust and efficient code propagation in heterogeneous wireless sensor networks,” Master’s thesis, University of Colorado at Boulder, 2005.
|
[7]
|
M. D. Krasniewski, R. K. Panta, S. Bagchi, C. L. Yang, and W. J. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks,” ACM Trans- actions on Sensor Networks, 4(1): pp. 1-38, 2008.
|
[8]
|
P. E. Lanigan, R. Gandhi, and P. Narasimhan, “Sluice: Secure dissemination of code updates in sensor networks,” in IEEE International Conference on Distributed Computing Systems, Lisbon, Portugal, July 2006.
|
[9]
|
P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, “Securing the Deluge network programming system,” in the Fifth International Conference on Information Processing in Sensor Networks (IPSN’06), 2006.
|
[10]
|
J. Deng, R. Han, and S. Mishra, “Secure code distribution in dynamically programmable wireless sensor networks,” in Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN’06), April 2006.
|
[11]
|
Crossbow Tech Inc., Mote In-Network Programming User Reference, http://www.tinyos.net/tinyos-1.x/doc/Xnp.pdf, 2003.
|
[12]
|
TinyOS: An open-source OS for the networked sensor regime, http://www.tinyos.net/.
|
[13]
|
P. E. Lanigan, P. Narasimhan, R. Gandhi, “Tradeoffs in configuring secure data dissemination in sensor network: An empirical outlook: [CMU-CyLab-07-006],” CyLab, Carnegie Mellon University, PA, 2007.
|
[14]
|
A. Perring, R. Szewczyk, J. D. Tygar, V. Wem, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wirelss Networks, 8(5): pp. 521-534, 2002.
|
[15]
|
H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE Symposium on Research in Security and Privacy, 2003.
|
[16]
|
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Sensor Network Protocols and Applications (SNPA 03), May 2003.
|
[17]
|
A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, pp. 48-56, October 2002.
|
[18]
|
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy efficient communication protocol for wireless microsensor networks,” in the 33rd Hawaii International Conference on System Sciences, 2000.
|
[19]
|
P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks,” NSDI 2004, pp. 15-28, 2004.
|
[20]
|
J. Deng, R. Han, and S. Mishra, “Practical study of transitory master key establishment for wireless sensor networks,” in 1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks (SecureComm 2005), Athens, Greece, pp. 289-299, September 2005.
|
[21]
|
P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: Accurate and scalable simulation of entire tinyos applications,” in Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), ACM Press, November 2003.
|
[22]
|
D. R. Raymond and S. F. Midkiff, “Denial-of-service in wireless sensor networks: Attacks and defenses,” IEEE Pervasive Computing, 2008.
|
[23]
|
S. Hyun, P. Ning, A. Liu, and W. L. Du, “Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks,” In Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN’08), April 2008.
|
[24]
|
Y. Zhang, X. S. Zhou, Y. M. Ji, Z. Y. Fang, and L. F. Wang, “Secure and DoS-resistant network reprogramming in sensor networks based on CPK,” 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2008.
|