Denial of Service in Sensor Networks
Computer
Guest Editor's Introduction: Wired on Wireless
IEEE Security and Privacy
The Evolution of RFID Security
IEEE Pervasive Computing
Research challenges for wireless sensor networks
ACM SIGBED Review - Special issue on embedded sensor networks and wireless computing
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Practical Attacks on Proximity Identification Systems (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Studying Bluetooth Malware Propagation: The BlueBag Project
IEEE Security and Privacy
An Interview with RFID Security Expert Ari Juels
IEEE Pervasive Computing
An RFID Attacker Behavior Taxonomy
IEEE Pervasive Computing
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Taming the Blue Beast: A Survey of Bluetooth Based Threats
IEEE Security and Privacy
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Bluetooth and Wi-Fi wireless protocols: a survey and a comparison
IEEE Wireless Communications
Security in wireless sensor networks
IEEE Wireless Communications
IEEE Spectrum
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Recently, new families of wireless ad hoc networks have emerged for specialized applications--- personal area networks. Wireless personal area networks (WPAN) is rapidly gaining popularity. A wide variety of traditional computing devices and embedded Internet appliances are networked around us. However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise, because the different types of devices have different capabilities and security requirements. In this paper, an overview of security issues like attacks and its countermeasures for wireless personal area networks such as Bluetooth, RFID and wireless sensor networks has been provided.