Proceedings DARPA Information Survivability Conference and Exposition McSa-03 2003
DOI: 10.1109/mcsa.2003.1240764
|View full text |Cite
|
Sign up to set email alerts
|

Rapid prototyping of mobile input devices using wireless sensor nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Early empirical experience with MOS suggests that application developers can rapidly prototype new applications in this environment. Applications such as a sensor-enabled conductor's wand [11] were prototyped in hours, while applications such as a frequency-hopping protocol and a port of the RC5 security standard were completed in less than two nights.…”
Section: Applications and Apismentioning
confidence: 99%
“…Early empirical experience with MOS suggests that application developers can rapidly prototype new applications in this environment. Applications such as a sensor-enabled conductor's wand [11] were prototyped in hours, while applications such as a frequency-hopping protocol and a port of the RC5 security standard were completed in less than two nights.…”
Section: Applications and Apismentioning
confidence: 99%
“…Wireless sensor networks (WSNs) consist of many low‐power and low‐cost sensor devices that can be installed over a given region. Owing to their popular and emergent technologies, they are used efficiently in many areas such as military [1 ], medical [2 ], domestic [3 ], safety [4, 5 ], scientific research [6 ] etc. The main challenging issue in WSNs is to provide secure communication as the channel used is wireless.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless sensor networks (WSNs) are being applied in different fields such as habitat monitoring [1], indoor sensor networks [2], military applications [3], and health monitoring [4]. Many of these applications manage confidential information, making the issue of security one of the most important points to consider.…”
Section: Introductionmentioning
confidence: 99%