References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) ‘Wireless Sensor Networks: A Survey’, Computer Networks, 38, 393–422.
Akyildiz, I. F., Wang, X. and Wang, W. (2005) ‘Wireless mesh networks: a survey,’ Computer Networks, 47, 445–487.
Anderson, R. and Kuhn, M. (1997) ‘Low Cost Attacks on Tamper Resistant Devices’, proceedings of the 1997 Security Protocols Workshop, Paris, Springer LNCS, 1361, 125–136.
Anderson, R., Chan, H. and Perrig, A. (2004) ‘Key infection: Smart trust for smart dust,’ Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP'04, pp. 206–215.
ANSI/IEEE (1999) Standard 802.11/ Standard 802.11a/ Standard 802.11b/ Standard 802.11i.
Arisha, K., Youssef, M. and Younis, M. (2002) ‘Energy-Aware TDMA-Based MAC for Sensor Networks,’ in Proceedings of the IEEE Workshop on Integrated Management of Power Aware Communications, Computing and Networking (IMPACCT 2002), New York City, New York, May 2002.
Asokan, N. and Ginzboorg, P. (2000) ‘Key agreement in ad-hoc networks,’ Computer Communications, 23 (17), 1627–1637.
Atallah, M., Bryant, E. and Stytz, M. (2004) ‘A Survey of Anti-Tamper Technologies’, CrossTalk: The Journal of Defense Software Engineering, November.
Aune, F. (2004) ‘Cross Layer Design Tutorial’, Norwegian University of Science and Technology, Trondheim, November.
Balenson, D., McGrew, D. and Sherman, A. (2000) ‘Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization,’ ...
Get Security in Wireless Ad Hoc and Sensor Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.