How to construct random functions
Journal of the ACM (JACM)
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The cougar approach to in-network query processing in sensor networks
ACM SIGMOD Record
Impala: a middleware system for managing autonomic, parallel sensor systems
Proceedings of the ninth ACM SIGPLAN symposium on Principles and practice of parallel programming
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinyDB: an acquisitional query processing system for sensor networks
ACM Transactions on Database Systems (TODS) - Special Issue: SIGMOD/PODS 2003
Mires: a publish/subscribe middleware for sensor networks
Personal and Ubiquitous Computing
A Survey of Middleware for Sensor Network and Challenges
ICPPW '06 Proceedings of the 2006 International Conference Workshops on Parallel Processing
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Middleware to support sensor network applications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) are exposed to numerous security threats that can affect the execution of applications. Securing WSNs is challenging due to their unique nature as an application and a network, and due to their limited capabilities. Therefore we introduce SM-Sens, a secure middleware that helps bridge the gap between high-level application requirements and WSN managing complexity. Our middleware uses defense mechanisms like asymmetric cryptography and authentication. The middleware defenses are efficient against a number of attacks either preventing from them or minimizing the damage they may cause to the network. We evaluate our middleware through extensive analysis, implementation, simulations and measurements. We argue that SM-Sens is viable and attractive to applications with security requirements.