CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Ticket based service access for the mobile user
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Generating RSA Keys on a Handheld Using an Untrusted Server
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Reinventing the Travois: Encryption/MAC in 30 ROM Bytes
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
IEEE Network: The Magazine of Global Internetworking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Efficient tracing of failed nodes in sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Maté: a tiny virtual machine for sensor networks
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
IEEE Pervasive Computing
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Denial of Service in Sensor Networks
Computer
Pushpin Computing System Overview: A Platform for Distributed, Embedded, Ubiquitous Sensor Networks
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Poster abstract: LEAP—efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Proceedings of the 1st international conference on Embedded networked sensor systems
Poster abstract: statistical en-route filtering in large scale sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Minimizing communication costs in hierarchically-clustered networks of wireless sensors
Computer Networks: The International Journal of Computer and Telecommunications Networking
Implementing the TEA algorithm on sensors
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Security for fixed sensor networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Code protection for resource-constrained embedded devices
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
Reducing radio energy consumption of key management protocols for wireless sensor networks
Proceedings of the 2004 international symposium on Low power electronics and design
Sensor networks: a bridge to the physical world
Wireless sensor networks
Communication protocols for sensor networks
Wireless sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
Journal of Systems and Software - Special issue: Performance modeling and analysis of computer systems and networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Outdoor experimental comparison of four ad hoc routing algorithms
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The Implications of Pervasive Computing on Network Design
BT Technology Journal
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Training a wireless sensor network
Mobile Networks and Applications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Information Assurance In Wireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a framework for efficient and programmable sensor networks
Proceedings of the 1st international conference on Mobile systems, applications and services
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 4th ACM workshop on Wireless security
Quantifying eavesdropping vulnerability in sensor networks
DMSN '05 Proceedings of the 2nd international workshop on Data management for sensor networks
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Global Clock Synchronization in Sensor Networks
IEEE Transactions on Computers
Spatio-temporal sampling rates and energy efficiency in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
IEEE Security and Privacy
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Distributed fault detection of wireless sensor networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Level-of-detail based modeling of object movement in tracking and surveillance system
WSC '05 Proceedings of the 37th conference on Winter simulation
A distributed data gathering algorithm for wireless sensor networks with uniform architecture
Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Low power light-weight embedded systems
Proceedings of the 2006 international symposium on Low power electronics and design
Relying on time synchronization for security in ad hoc networks
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Attack-resilient hierarchical data aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Run-time dynamic linking for reprogramming wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
SLEDE: event-based specification of sensor network security protocols
ACM SIGSOFT Software Engineering Notes
Journal of Systems Architecture: the EUROMICRO Journal
A secure alternate path routing in sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
The energy cost of cryptographic key establishment in wireless sensor networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Addressing security in medical sensor networks
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A survey of key management schemes in wireless sensor networks
Computer Communications
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
Computer Communications
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
Toward secure and scalable time synchronization in ad hoc networks
Computer Communications
Performance evaluation and comparison of different ad hoc routing protocols
Computer Communications
SLEDE: lightweight verification of sensor network security protocol implementations
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Containing denial-of-service attacks in broadcast authentication in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
SLEDE: lightweight verification of sensor network security protocol implementations
The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers
Secure, accurate and precise time synchronization for wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
International Journal of Sensor Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
FPGA based communication security for wireless sensor networks
ESPOCO'05 Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
The LiteOS Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
A recurrent decentralized key management architecture for wireless sensor network
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks
International Journal of Distributed Sensor Networks - Sensor Networks, Ubiquitous and Trustworthy Computing
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Design and implementation of a secure wireless mote-based medical sensor network
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec
Computational Intelligence and Security
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Quantum Wireless Sensor Networks
UC '08 Proceedings of the 7th international conference on Unconventional Computing
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Modelling secure wireless sensor networks routing protocols with timed automata
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Secure and Efficient Data Collection in Sensor Networks
Wireless Systems and Mobility in Next Generation Internet
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
Authenticated Directed Diffusion
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
A novel key management algorithm in sensor networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
Self-healing control flow protection in sensor applications
Proceedings of the second ACM conference on Wireless network security
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Pervasive and Mobile Computing
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Proceedings of the 4th Annual International Conference on Wireless Internet
EAP-Sens: a security architecture for wireless sensor networks
Proceedings of the 4th Annual International Conference on Wireless Internet
A hybrid security protocol for sensor networks
International Journal of Communication Networks and Distributed Systems
Redundancy and its applications in wireless sensor networks: a survey
WSEAS Transactions on Computers
A view upon redundancy in wireless sensor networks
ISPRA'09 Proceedings of the 8th WSEAS international conference on Signal processing, robotics and automation
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Effective pair-wise key establishment scheme for wireless sensor networks
Proceedings of the 2nd international conference on Security of information and networks
Secure many to many routing for wireless sensor and actuator networks
Proceedings of the 2nd international conference on Security of information and networks
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A secure ubiquitous sensor network with Dragon
Proceedings of the 2009 International Conference on Hybrid Information Technology
Secret instantiation in ad-hoc networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Mobility, sensing, and security management in wireless ad hoc sensor systems
Computers and Electrical Engineering
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
An enhanced security architecture for wireless sensor network
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A constrained function based message authentication scheme for sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Towards Secure and Practical MACs for Body Sensor Networks
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Accurate modeling for predicting cryptography overheads on wireless sensor nodes
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
An energy-aware routing protocol considering link-layer security in wireless sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
SM-Sens: security middleware for wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
MKPS: a multi-level key pre-distribution scheme for secure wireless sensor networks
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
WODEM: wormhole attack defense mechanism in wireless sensor networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A new resilient key management protocol for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A key management based on multiple regression in hierarchical sensor network
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Verifying security protocols for sensor networks using algebraic specification techniques
CAI'07 Proceedings of the 2nd international conference on Algebraic informatics
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Model for survivability of wireless sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
SAPC: a secure aggregation protocol for cluster-based wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Provably secure framework for information aggregation in sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Secure self organization of wireless sensor network: a new approach
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Securing data aggregation against false data injection in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Journal of Intelligent Manufacturing
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
RC5-based security in wireless sensor networks: utilization and performance
WSEAS Transactions on Computers
Efficient and distributed access control for sensor networks
Wireless Networks
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
Security analysis of open building automation systems
SAFECOMP'10 Proceedings of the 29th international conference on Computer safety, reliability, and security
Quantum security in wireless sensor networks
Natural Computing: an international journal
Fault reconnaissance agent for sensor networks
Mobile Information Systems
Defending against physical destruction attacks on wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
EURASIP Journal on Wireless Communications and Networking
Tree based protocol for key management in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the 2011 International Conference on Communication, Computing & Security
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Video streaming security: reliable hash chain mechanism using redundancy codes
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
On the development of adaptive and self-dependent secure routing for wireless sensor networks
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Security and performance trade-off in KILAVI wireless sensor network
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Security fusion: a new security architecture for resource-constrained environments
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Efficient defence against misbehaving TCP receiver DoS attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A secure key management framework for heterogeneous wireless sensor networks
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Launching denial-of-service jamming attacks in underwater sensor networks
Proceedings of the Sixth ACM International Workshop on Underwater Networks
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
A survivable distributed sensor networks through stochastic models
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
LSec: lightweight security protocol for distributed wireless sensor network
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
A key management scheme for large scale distributed sensor networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Hybrid authentication and key management scheme for WSANs
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
An efficient message broadcast authentication scheme for sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
A markov-based model to analyze the temporal evolution and lifetime of a sensor network
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
μTESLA-based secure routing protocol for wireless sensor networks
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Information Sciences: an International Journal
A study on efficient key management in real time wireless sensor network
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Hierarchical hypercube-based pairwise key establishment schemes for sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key establishment and authentication mechanism for secure sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Low energy consumption security method for protecting information of wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
An efficient key-update scheme for wireless sensor networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Message and its origin authentication protocol for data aggregation in sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Information-theoretic modeling of false data filtering schemes in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Protecting anonymity in wireless medical monitoring environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Data-Centric trust framework for high integrity wireless sensor networks
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
A key management scheme for commodity sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Ensuring data storage security against frequency-based attacks in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Key management for mobile sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Securing communication trees in sensor networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
Secure data management in reactive sensor networks
ICISS'06 Proceedings of the Second international conference on Information Systems Security
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
A framework of deployment strategy for hierarchical WSN security management
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Information Systems and e-Business Management
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Information Sciences: an International Journal
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
A reversible watermarking authentication scheme for wireless sensor networks
Information Sciences: an International Journal
Secure Broadcast with One-Time Signatures in Controller Area Networks
International Journal of Mobile Computing and Multimedia Communications
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and useful, and has not concentrated on security.We present a suite of security building blocks optimized for resource-constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and &mgr;TESLA SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide efficient broadcast authentication, which is an important mechanism for sensor networks. &mgr;TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.