Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
PGP: Pretty Good Privacy
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support
ACM SIGMOBILE Mobile Computing and Communications Review
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Wireless Personal Communications: An International Journal
Internet-Based Mobile Ad Hoc Networking
IEEE Internet Computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Wireless Communications & Mobile Computing - Special Issue: WLAN/3G Integration for Next-Generation Heterogeneous Mobile Data Networks
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Allowing multi-hops in cellular networks: an economic analysis
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Reducing Multicast Traffic Load for Cellular Networks using Ad Hoc Networks
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
ICAM: Integrated Cellular and Ad Hoc Multicast
IEEE Transactions on Mobile Computing
Host Mobility Using an Internet Indirection Infrastructure
Proceedings of the 1st international conference on Mobile systems, applications and services
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
IEEE Wireless Communications
Charging support for ad hoc stub networks
Computer Communications
Integrated cellular and ad hoc relaying systems: iCAR
IEEE Journal on Selected Areas in Communications
IEEE Transactions on Wireless Communications
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Periodic route selection for secure packet delivery
Proceedings of the CUBE International Information Technology Conference
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Hi-index | 0.00 |
The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques must begin with a thorough analysis of the requirements and a deeper understanding of the approaches that are practical within the system constraints. In this paper, we investigate the recent advances in wireless security from theoretical foundations to evaluation techniques, from network level management to end user trust inference and from individual protocol to hybrid systems. We identify the open security issues associated with trust, management, interoperation and measurement. These problems, whose solutions are different in nature and scale from their companions in wired networks, must be properly addressed to establish confidence in the security of wireless networking environments.