1. Akyıldız, I.F., Su, W., Sankarasubramaniam, Y.,
Çayırcı, E., “A survey on sensor networks”, IEEE
Communications Magazine, 40(8), 102-114,
2002.
2. Chong, C.Y., Kumar, S.P., “Sensor Networks :
Evolution, opportunities, and challenges”, Proc
IEEE, 91(8), 1247-1256, 2003.
3. Khemapech, I., Duncan, I., Miller, A., “A survey
of wireless sensor networks technology”,
Proceedings of the 6th Annual PostGraduate
Symposium on the Convergence of
Telecommunications Networking and
Broadcasting, 2005.
4. Khemapech, I., Duncan, I., Miller, A., “A survey
of wireless sensor networks technology”,
Proceedings of the 6th Annual PostGraduate
Symposium on the Convergence of
Telecommunications Networking and
Broadcasting, 2005.
5. Szewczyk, R., Mainwaring, A., Polastre, J.,
Culler, D., "An analysis of a large scale habitat
monitoring application", In Proceedings of the
second ACM conference on embedded
networked sensor systems, Baltimore, 2004.
6. Akyildiz, I.F., Vuran, M.C., Wireless Sensor
Networks, 1st ed.: A John Wiley and Sons, Ltd,
Publication, 2010.
7. Tolle, G., Polastre, J., Szewczyk, R., Culler, D.,
Turner, N., Tu, K., Burgess, S., Dawson, T.,
Buon-adonna, P., Gay, D., Hong, W., "A
Macroscope in the Redwoods", In Proceedings of
the 3rd ACM international conference on
embedded networked sensor systems, San
Diego, 51-63, 2005.
8. Werner-Allen, G., Lorincz, K., Welsh, M.,
Marcillo, O., Johnson, J., Ruiz, M., Lees, J.,
(a)
(b) (c)
Şekil 13. (a) Geliştirilen güvenli izleme sistemine ait mobil tabanlı arayüz (b) 1. düğüme ait algılanan
değerler (c) Bütün düğümlere ait algılanan değerler (a) The mobile based interface for developed secure monitoring system
(b) Sensed values for Node 1 (c) Sensed values for all nodes
M. Dener Kablosuz Algılayıcı Ağlarda Güvenli İzleme Sistemi Tasarımı
754 Gazi Üniv. Müh. Mim. Fak. Der. Cilt 29, No 4, 2014
"Deploying a Wireless Sensor Network on an
Active Volcano", IEEE Internet Computing, 18-
25, 2006.
9. Lofar project, http://www.lofar.org/, 2014.
10. Hakala, I., Tikkakoski, M., Kivela, I., "Wireless
sensor network in environmental monitoring - case
foxhouse", In Proceedings of the second
international conference on sensor technologies
and applications, France, 2008.
11. Barrenetxea, G., Ingelrest, F., Schaefer, G.,
Vetterli, M., Couach, O., Parlange, M.,
"SensorScope: Out-of-the-Box environmental
monitoring", Proceedings of the 7th
international conference on information
processing in sensor networks, 332-343, 2008.
12. Buschmann, C., Pfisterer, D., Fischer, S., Fekete,
S.P., Kröller, A., “SpyGlass: A Wireless Sensor
Network Visualizer”, ACM SIGBED Review,
2(1), 1-6, 2005.
13. Tuton, M., “MOTEVIEW: A sensor network
monitoring and management tool,” In
Proceedings of Second IEEE Workshop on
Embedded Networked Sensors (EmNetSII), 11–
18, 2005.
14. Levis, P., Lee, N., Welsh, M., Culler, D.,
“TOSSIM: Accurate and Scalable Simulation of
Entire TinyOS Applications”, In Proceedings of
SenSys'03, First ACM Conference on
Embedded Networked Sensor Systems, 2003.
15. Surge Network Viewer, Crossbow Technology
Inc.:
http://www.xbow.com/Products/productsdetails.as
px?sid=, 2014.
16. Miyashita, M., Nesterenko, M., Shah, R.D., Vora,
A., "Visualizing Wireless Sensor Networks:
Experience Report," International Conference
on Wireless Networks, 2005.
17. MSR Sense - MSR Networked Embedded Sensing
Toolkit
http://research.microsoft.com/nec/msrsense/,
2014.
18. Pinto, J., Sousa, A., Lebres, P., Gonçalves, G.M.,
Sousa, J., “MonSense - application for
deployment, monitoring and control of wireless
sensor networks”, Poster in ACM RealWSN'06,
2006.
19. Shu, L., Wu, C., Zhang, Y., Chen, J., Wang, L.,
Hauswirth, M., “NetTopo: beyond simulator and
visualizer for wireless sensor networks”, ACM
SIGBED, 5, 2008.
20. Jurdak, R., Ruzzelli, A.G., Barbirato, A.,
Boivineau, S., “Octopus: monitoring,
visualization, and control of sensor networks”,
Wireless Communications and Mobile
Computing, 2009.
21. Sentilla, “Tmote Invent User’s Manual”, Moteiv
Corporation, 2006.
22. Yang, Y., Xia, P., Huang, L., Zhou, Q., Xu, Y., Li,
X., “SNAMP: A Multi-sniffer and Multi view
Visualization Platform for Wireless Sensor
Networks,” IPN Progress Report, 2005.
23. Meshnetics: “Meshnetics Demonstrated
Integration of Wireless Sensor Data with SCADA
System”, available at:
http://www.meshnetics.com/press_releases/Mesh
Netics_SensiLink_Press_Release_25Jun06.pdf,
2014.
24. Wagenknecht, G., Anwander, M., Braun, T.,
Staub, T., Matheka, J., ve Morgenthaler, S.,
"MARWIS: A Management Architecture for
Heterogeneous Wireless Sensor Networks", In
Proceedings of the 6th International
Conference on Wired/Wireless Internet
Communications, Finland, 177-188, 2008.
25. Castillo, J.A., Ortiz, A.M., López, V., Olivares, T.,
Orozco-Barbosa, L., "WiseObserver: A Real
Experience with Wireless Sensor Networks", In
Proceedings of the 3nd ACM Workshop on
Performance Monitoring and Measurement of
Heterogeneous Wireless and Wired networks,
New York, USA, 23-26, 2008.
26. Luo, L., Aman, K., Nath S., ve Zhao F.,
“SenseWeb: Sharing and Browsing Environmental
Changes in Real Time”, Microsoft, 2008.
27. Rowe, A., Berges, M., Bhatia, G., Goldman, E.,
Rajkumar, R., Soibelman, L., Garrett, J., "Sensor
Andrew: Large-Scale Campus-Wide Sensing and
Actuation", CMU-ECE-TR-08-11 (A Technical
Report), Carnegie Mellon University, 2008.
28. İnternet: Willow Technologies “TelosB
Datasheet”,
http://www.willow.co.uk/TelosB_Datasheet.pdf,
2014.
29. İnternet: TinyOS, http://www.tinyos.net/, 2014.
30. İnternet: Wikipedia, “NesC”,
http://en.wikipedia.org/wiki/NesC, 2014.
31. Kumar, H., Sarma, D., Kar, A., “Security Threats
in Wireless Sensor Networks”, IEEE, 2006.
32. Mohit, S., “Security In Wireless Sensor Networks
- A Layer Based Classification”, Cerias Tech
Report, 2007.
33. Devesh, C.J., Dhiren, R., Kankar, S.D.,
“Optimizing the Block Cipher Resource Overhead
at the Link Layer Security Framework in the
Wireless Sensor Networks”, Proceedings of the
World Congress on Engineering 2008 Vol I
WCE 2008, 2008.
34. İnternet: Wikipedia, “XXTEA”,
http://en.wikipedia.org/wiki/XXTEA (2014).
35. Wheeler, D., Needham, R.M., “XXTEA:
Corrections to XTEA Technical report”,
Computer Laboratory University of
Cambridge, 1998.
36. Schneier, B., “Applied Cryptography”, Second
Edition, John Wiley & Sons, Inc., New York, Ny,
1996.
37. Liu, S., Gavrylyako, O.V., Bradford, P.G.,
“Implementing the TEA algorithm on sensors”
Proceedings of the 42nd annual Southeast
regional conference, 64–69, New York, NY,
USA, 2004.
Thank you for copying data from http://www.arastirmax.com