Quantifying eavesdropping vulnerability in sensor networks
DMSN '05 Proceedings of the 2nd international workshop on Data management for sensor networks
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
IEEE Pervasive Computing
Data Management in the Worldwide Sensor Web
IEEE Pervasive Computing
Towards characterizing the effectiveness of random mobility against actuation attacks
Computer Communications
International Journal of Sensor Networks
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Discussing Redundancy Issues in Intelligent Agent-Based Non-traditional Grids
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
Pervasive and Mobile Computing
Information Systems Frontiers
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies
International Journal of Distributed Sensor Networks
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Catching packet droppers and modifiers in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Key establishment in heterogeneous self-organized networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Resource-aware secure ECG healthcare monitoring through body sensor networks
IEEE Wireless Communications
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A distributed architecture of Sensing Web for sharing open sensor nodes
Future Generation Computer Systems
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Emerging and future cyber threats to critical systems
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Compromised nodes in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
A key management scheme for commodity sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Coordination in wireless sensor-actuator networks: A survey
Journal of Parallel and Distributed Computing
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design
Ethics and Information Technology
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Detection and mitigation of sinkhole attacks in wireless sensor networks
Journal of Computer and System Sciences
Hi-index | 4.10 |
Sensor networks offer economically viable solutions for a variety of applications. For example, current implementations monitor factory instrumentation, pollution levels, free-way traffic, and the structural integrity of buildings. Other applications include climate sensing and control in office buildings and home environmental sensing systems for temperature, light, moisture, and motion.