A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
An environmental energy harvesting framework for sensor networks
Proceedings of the 2003 international symposium on Low power electronics and design
Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations
Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations
Performance aware tasking for environmentally powered sensor networks
Proceedings of the joint international conference on Measurement and modeling of computer systems
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Co-operative Downloading in Vehicular Ad-Hoc Wireless Networks
WONS '05 Proceedings of the Second Annual Conference on Wireless On-demand Network Systems and Services
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
VITP: an information transfer protocol for vehicular computing
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Delay-Tolerant Network Technologies Coming Together
IEEE Distributed Systems Online
Code torrent: content distribution using network coding in VANET
MobiShare '06 Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Applicability of identity-based cryptography for disruption-tolerant networking
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Practical security for rural internet kiosks
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
Privacy-Preserving Querying in Sensor Networks
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Data Security in Unattended Wireless Sensor Networks
IEEE Transactions on Computers
Wireless passive sensor networks
IEEE Communications Magazine
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Intrusion-resilience in mobile unattended WSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
A wirelessly-powered platform for sensing and computation
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Mobeyes: smart mobs for urban monitoring with a vehicular sensor network
IEEE Wireless Communications
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
New adversary and new threats: security in unattended sensor networks
IEEE Network: The Magazine of Global Internetworking
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Resilience and security of opportunistic communications for emergency evacuation
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Hi-index | 0.00 |
Wireless communication is continuing to make inroads into many facets of society and is gradually becoming more and more ubiquitous. While in the past wireless communication (as well as mobility) was largely limited to the first and last transmission hops, today's wireless networks are starting to offer purely wireless, often mobile, and even opportunistically connected operation. The purpose of this article is to examine security and privacy issues in some new and emerging types of wireless networks, and attempt to identify directions for future research.