[1]
Crossbow Tech Inc., Mote In-Network Programming User Reference, http: /www. tinyos. net/ tinyos-1. x/doc/Xnp. pdf, (2003).
Google Scholar
[2]
T. Stathopoulos, J. Heidemann, and D. Estrin, A remote code update mechanism for wireless sensor networks, Technical Report CENS Technical Report 30, no., (2003).
DOI: 10.21236/ada482630
Google Scholar
[3]
J. W. Hui and D. Culler, The dynamic behavior of a data dissemination protocol for network programming at scale, at the Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, pp.81-94, (2004).
DOI: 10.1145/1031495.1031506
Google Scholar
[4]
P. Levis, N. Patel, S. Shenker, and D. Culler, Trickle: A Self-Regulating Algorithm for Code Propogation and maintenance in Wireless Sensor Network, Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI 2004), no., (2004).
Google Scholar
[5]
S. S. Kulkarni and W. Limin, MNP: Multihop Network Reprogramming Service for Sensor Networks, at the 25th IEEE International Conference on Distributed Computing Systems, pp.7-16, (2005).
DOI: 10.1109/icdcs.2005.50
Google Scholar
[6]
M. D. Krasniewski, S. Bagchi, C-L. Yang, W. J. Chappell, Energyefficient, On-demand Reprogramming of Large-scale Sensor Networks, Submitted to IEEE Transactions on Mobile Computing (TMC). Available as Purdue ECE Technical Report TR-ECE-06-02, (2006).
Google Scholar
[7]
R. Panta , I. Khalil , and S. Bagchi, Stream: Low Overhead Wireless Reprogramming for Sensor Networks,. IEEE Infocom (2007), (2007).
DOI: 10.1109/infcom.2007.113
Google Scholar
[8]
K. P. Rajesh, S. Bagchi and S.P. Midkiff. Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation In the USENIX Annual Technical Conference (USENIX '09), June, 2009, San Diego, California, , pp.411-424.
Google Scholar
[9]
PANTA, R., AND BAGCHI, S. Hermes: Fast and Energy Effcient Incremental Code Updates for Wireless Sensor Networks. To appear in IEEE Infocom (2009).
DOI: 10.1109/infcom.2009.5061971
Google Scholar
[10]
P.E. Lanigan, R. Gandhi, P. Narasimhan. Sluice : Secure dissemination of code updates in sensor networks. IEEE International Conference on Distributed Computing Systems (ICDCS'06), , July 2006, Lisbon , Portu2gal.
DOI: 10.1109/icdcs.2006.77
Google Scholar
[11]
P.K. Dutta, J.W. Hui, D.C. Chu, D. E Culler. Securing the Deluge Network Programming System. In Proc. of the 5th International Conference on Information Processing in Sensor networks (IPSN'06), April 2006, Nashville, TN, United states, pp.326-333.
DOI: 10.1145/1127777.1127826
Google Scholar
[12]
J, Deng, R. Han, S. Mishra. Secure code distribution in dynamically programmable wireless sensor networks. ACM/ IEEE Conference on Information Processing in Sensor Networks, April 2006, Nashville, TN, pp.292-300.
DOI: 10.1145/1127777.1127822
Google Scholar
[13]
J. Deng, R. Han, S. Mishra. Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks, IEEE Third International Workshop on Pervasive Computing and Communication Security (PerSec'06), March 2006, Pisa, Italy, pp.272-276.
DOI: 10.1109/percomw.2006.48
Google Scholar
[14]
K. Park, J.H. Lee, T.Y. Kwon, J. Song. Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. Ubiquitous Intelligence and Computing-4th International Conference(UIC'07), pp.653-662, (2007).
DOI: 10.1007/978-3-540-73549-6_64
Google Scholar
[15]
Q. Dong, D. G Liu, and P. Ning. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. In WiSec'08: Proceedings of the first ACM conference on Wireless network security, March 2008, New York, NY, USA. pp.2-13.
DOI: 10.1145/1352533.1352536
Google Scholar
[16]
H.L. Tan , D. Ostry, J. Zic, and S. Jha. A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks, In Proceedings of the 2nd ACM Conference on Wireless Network Security(WiSec'09), March 2009, Zurich, Switzerland, pp.245-252.
DOI: 10.1145/1514274.1514308
Google Scholar
[17]
S.W. Hyun, P. Ning, A. Liu, and W.L. Du. Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. In Proc. of the 5th International Conference on Information Processing in Sensor networks(IPSN'08), April 2008, St. Louis, MO, United states, pp.445-456.
DOI: 10.1109/ipsn.2008.12
Google Scholar
[18]
P. Ning, A. Liu, and W. L Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1), January 2008, pp.1-35.
DOI: 10.1145/1325651.1325652
Google Scholar
[19]
Liu, P. Ning, C. Wang. Lightweight remote image management for secure code dissemination in wireless sensor networks, Proc IEEE INFOCOM2009, April 2009, pp.1242-1250.
DOI: 10.1109/infcom.2009.5062038
Google Scholar