Random key pre-distribution with transitory master key for wireless sensor networks
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Intrusion detection in WSN-based intelligent transportation systems
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Personal and Ubiquitous Computing
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Flooding attack in energy harvesting wireless sensor networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Proceedings of the Tenth Workshop on Visualization for Cyber Security
International Journal of Sensor Networks
Protecting wireless sensor networks from energy exhausting attacks
ICCSA'13 Proceedings of the 13th international conference on Computational Science and Its Applications - Volume 1
Hi-index | 0.00 |
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.