A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Autonomous and distributed node recovery in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A secure alternate path routing in sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Defense against outside attacks in wireless sensor networks
Computer Communications
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks
Pervasive and Mobile Computing
Sensor network data fault types
ACM Transactions on Sensor Networks (TOSN)
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Distributed detection in the presence of Byzantine attacks
IEEE Transactions on Signal Processing
Neural network Based secure media access control protocol for wireless sensor networks
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
Finding abnormal events in home sensor network environment using correlation graph
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Malicious node detection system in wireless sensor networks: a decentralised approach
International Journal of Internet Technology and Secured Transactions
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Mobile Networks and Applications
A study on sensor nodes attestation protocol in a wireless sensor network
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Breaking the O(n2) bit barrier: scalable byzantine agreement with an adaptive adversary
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
Scalable byzantine computation
ACM SIGACT News
Distributed detection in the presence of Byzantine attack in large wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
I2CSec: A secure serial Chip-to-Chip communication protocol
Journal of Systems Architecture: the EUROMICRO Journal
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary
Journal of the ACM (JACM)
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
LSec: lightweight security protocol for distributed wireless sensor network
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Secure rejoining scheme for dynamic sensor networks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Compromised nodes in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Secure data management in reactive sensor networks
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Designing an efficient PCA based data model for wireless sensor networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Sensor network data fault detection with maximum a posteriori selection and bayesian modeling
ACM Transactions on Sensor Networks (TOSN)
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System
Journal of Medical Systems
International Journal of Communication Systems
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
Denial of service mitigation approach for IPv6-enabled smart object networks
Concurrency and Computation: Practice & Experience
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
A lightweight framework for secure life-logging in smart environments
Information Security Tech. Report
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
Journal of Parallel and Distributed Computing
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing
Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design
Ethics and Information Technology
Hi-index | 0.00 |
Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.