Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
A Minimum Cost Heterogeneous Sensor Network with a Lifetime Constraint
IEEE Transactions on Mobile Computing
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Cross-layer activity management in an 802-15.4 sensor network
IEEE Communications Magazine
Hi-index | 0.00 |
The introduction of IEEE 802.15.4 low rate wireless personal area network (LR-WPAN) standard [1] was implemented for three reasons: the need for low-cost, low-power and short-range communication. While the 802.15.4 standard goes into great detail when describing the functionality of the physical (PHY) and medium access control (MAC) layer, security related issues received much less attention.