RFID: Security and Privacy
Mesh Networks
Underwater Sensor Networks
- Required Reading (Due on Nov. 22)
Underwater
Sensor Networking: Research Challenges and Potential Applications,
USC/Information Sciences Institute, 2005.
- I. F. Akyildiz, D. Pompili, and T. Melodia,
Underwater
acoustic sensor networks: research challenges,
Ad Hoc Networks, 2005.
- Raja Jurdak, Cristina Videira Lopes and Pierre Baldi, Batte
ry Lifetime Estimation and Optimization for Underwater Sensor Networks,
IEEE Sensor Network Operations, IEEE Press. Winter 2004.
- Vitaly Bokser, Carl Oberg, Gaurav S. Sukhatme, and Aristides Requicha
A SMALL SUBMARINE
ROBOT FOR EXPERIMENTS IN UNDERWATER SENSOR NETWORKS, 2004.
- Xiping Yang, Keat G. Ong, William R. Dreschel, Kefeng Zeng, Casey S. Mungle
and Craig A. Grimes,
Des
ign of a Wireless Sensor Network for Long-term, In-Situ
Monitoring of an Aqueous Environment,Sensors 2002, 2, 455-472.
- Joseph A. Rice,
Undersea Networked Ac
oustic Communication and Navigation for
Autonomous Mine-Countermeasure Systems, 5th International Symposium on Techn
ology and the Mine Problem, Monterey, CA, April 21-25, 2002.
-
J.G. Proakis and E.M.Sozer and J. A. Rice and M.Stojanovic,
Shallow
Water Acoustic Networks, pp. 114-119,
IEEE Communications Magazines, November,
2001.
-
G. G. Xie and J. Gibson,
A
Networking Protocol for Underwater Acoustic
Networks, Technical Report TR-CS-00-02, Department of Computer Science,
Naval Postgraduate School, December, 2000.
-
V. Capellano,
Performance Improvement of a 50km Acoustic Transmission
through Adaptive Equalization and Spatial Diversity, Oceans'97, Nova
Scotia, Canada, 1997.
Secure Ad Hoc Routing
-
Jiejun Kong, Xiaoyang Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, and
Mario Gerla,
A
secure ad-hoc routing approach using localized self-healing communities,
pp. MOBIHOC 2005.
-
Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly,
Denial
of service resilience in ad hoc networks, pp. 202-215, MOBICOM 2004.
Cross Layer Design/Optimization in
Ad Hoc and Sensor Networks
-
Marco Conti, Enrico Gregori, Giovanni Turi,
A Cross-Layer Optimization of Gnutella for Mobile Ad hoc Networks,
pp. 343-354, ACM MOBIHOC 2005.
-
Wolfgang Eberle, Bruno Bougard, Sofie Pollin, and Francky Catthoor,
From
Myth to Methodology: Cross-Layer Design for Energy-Efficient
Wireless Communication,
pp. 303-308, DAC 2005.
-
Xin Yu,
Improving
TCP Performance over Mobile ad hoc networks by exploiting cross-layer
information awareness, pp. 231-244, ACM MOBICOM 2004.
-
Ram Ramanathan,
Challenges:
A Radically New Architecture for Next Generation Mobile Ad Hoc Networks,
pp. 132-139, ACM MOBICOM 2005.
-
Yi Shi, Y. Thomas Hou, Hanif D. Sherali, and Scott F. Midkiff,
Cross-Layer Optimization for Routing Data Traffic in
UWB-based Sensor Networks, pp. 299-354, ACM MOBICOM 2005.
-
Kitae Nahm, Ahmed Helmy, and C.-C. Jay Kuo,
TCP Over Multihop 802.11 Networks: Issues and Performance Enhancement,
pp. 277-287, ACM MOBIHOC 2005.
Ad Hoc Routing
-
Jitendra Padhye, Richard Draves, and Brian Zill,
Routing in multi-radio, multi-hop wireless mesh networks, pp. 114-128,
MOBICOM 2004.
-
Saumitra M. Das, Himabindu Pucha, and Y. Charlie Hu,
Performance comparison of scalable location services for geographic ad
hoc routing, Vol. 2, pp. 1228-1239, INFOCOM 2005.
-
Weizhao Wang, Xiang-Yang Li, and Yu Wang,
Truthful
Multicast Routing in Selfish Wireless Networks, pp. 245-259, Mobicom 2004.
-
A. Valera, W. K.G. Seah, and S.V. Rao,
Cooperative packet caching and shortest multipath routing
in mobile ad hoc networks, IEEE INFOCOM 2003.
-
J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva,
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing
Protocols,
MobiCom 98,
-
S.-J. Lee, W. Su, J. Hsu, M. Gerla, R. Bagrodia,
A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols
INFOCOM 2000.
-
E. Royer and C.-K. Toh,
A review of current routing protocols for ad hoc mobile wireless networks,
IEEE Personal Communications, 6(2), 1999, pp. 46-55.
-
M. Mauve, A. Widmer and H. Hartenstein,
A Survey on Position-based Routing in Mobile Ad Hoc Networks, IEEE Network,
15(6), 2001, pp. 30-39.
Wireless LAN Security
- Changhua He, John C Mitchell,
Analysis
of the 802.11i 4-Way Handshake,
pp. 43-50,
WiSe'04, October 1, 2004, Philadelphia, Pennsylvania, USA.
-
N. Borisov, I. Goldberg, and D. Wagner,
Intercepting mobile communications: the insecurity of 802.ll,
MOBICOM 2001, pp. 180-188.
-
M. Raya, J. P. Hubaux,, and I. Aad
DOMINO:
A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,
Proceedings of the Second International Conference on Mobile Systems,
Applications, and Services, Boston, June 2004
-
Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood,
The
feasibility of launching and detecting jamming attacks in wireless networks,
pp. 46-57, Mobihoc 2005, May 25-27, 2005, Urbana-Champaign, Illinois, USA.
-
Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker,
Secur
ity flaws in 802.11 data link protocols,
Communications of the ACM, Volume 46 Issue 5, May 2003.
-
Amit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth,
Elizabeth M. Belding-Royer,
Understanding Link-Layer Behavior
in Highly Congested IEEE 802.11b Wireless Networks,
pp. 11-16,
SIGCOMM'05 Workshops on
Experimental approaches to wireless network design and analysis E-WIND '05 ,
August 22-26, 2005, Philadelphia, PA, USA.
-
P. Kyasanur and N. Vaidya,
Detection
and handling of MAC layer misbehavior in wireless networks,
In Dependable Systems and Networks, June 2003.
Wireless LAN
-
Chapter 7 in Mobile Communications (2nd Ed.) by Jochen Schiller. ISBN:0321123816.
Other textbooks.
-
Maya Rodrig, Charles Reis, Ratul Mahajan, David Wetherall, and John Zahorjan,
Measure
ment-based Characterization of 802.11 in a Hotspot Setting,
pp. 5-10,
SIGCOMM'05 Workshops on
Experimental approaches to wireless network design and analysis E-WIND '05 ,
August 22-26, 2005, Philadelphia, PA, USA.
-
C.F. Chiasserini and R.R. Rao,
Coexistence mechanisms for interference mitigation
between IEEE 802.11 WLANs and bluetooth,
INFOCOM 2002, Vol. 2, pp. 590-598
-
D. F. Bantz and F. J. Bauchot,
Wireless LAN Design Alternatives, IEEE Network,
vol. 8(2), March-April 1994. p.43-53.
Introduction
-
G.H. Forman and J. Zahorjan,
The
Challenges of Mobile Computing, IEEE Computer, Vol 27(4),
April 1994, PP. 38 -47.
-
M. Satyanarayanan,
Pervasive computing: vision and challenges, IEEE Personal Communications,
8(4), 2001, pp. 10 -17.
-
M. Weiser,
The Computer for the 21st Century, Scientific American, September 1991.
- D. Cox,
Wireless Personal Communications: What Is It?,
IEEE Personal Communcations, 2 (2), April 1995.
|