How to construct random functions
Journal of the ACM (JACM)
Key distribution protocol for digital mobile communication systems
CRYPTO '89 Proceedings on Advances in cryptology
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On key distribution and authentication in mobile radio networks
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Ticket based service access for the mobile user
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Reinventing the Travois: Encryption/MAC in 30 ROM Bytes
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
IEEE Network: The Magazine of Global Internetworking
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Sensor: the atomic computing particle
ACM SIGMOD Record
A secure hierarchical model for sensor network
ACM SIGMOD Record
Robust key establishment in sensor networks
ACM SIGMOD Record
Security for fixed sensor networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Adaptive Security for Low Data Rate Networks
Wireless Personal Communications: An International Journal
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
Foundations of Security for Hash Chains in Ad Hoc Networks
Cluster Computing
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing
Optimized Broadcast Protocol for Sensor Networks
IEEE Transactions on Computers
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
An efficient and secure protocol for sensor network time synchronization
Journal of Systems and Software
Symmetric key based authenticated querying in wireless sensor networks
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Modelling adversaries and security objectives for routing protocols in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
ANSWER: AutoNomouS netWorked sEnsoR system
Journal of Parallel and Distributed Computing
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
Secure communications with an asymptotic secrecy model
Knowledge-Based Systems
Cryptography on a Speck of Dust
Computer
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Key management for long-lived sensor networks in hostile environments
Computer Communications
SecLEACH-On the security of clustered sensor networks
Signal Processing
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Defense against outside attacks in wireless sensor networks
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
An efficient integrity-preserving scheme for hierarchical sensor aggregation
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Hash chains with diminishing ranges for sensors
International Journal of High Performance Computing and Networking
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
A tamper-proof and lightweight authentication scheme
Pervasive and Mobile Computing
Securely computing an approximate median in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Multiphase intrusion detection and revocation system for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
Of malicious motes and suspicious sensors
Theoretical Computer Science
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
Journal of Automated Reasoning
A location-ID sensitive key establishment scheme in static wireless sensor networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks
Proceedings of the second ACM conference on Wireless network security
Proceedings of the second ACM conference on Wireless network security
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Proceedings of the second ACM conference on Wireless network security
Ayushman: a secure, usable pervasive health monitoring system
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
IEICE - Transactions on Information and Systems
Fuzzy Adaptive Partitioning Method for the Statistical Filtering
IEICE - Transactions on Information and Systems
Efficient public key authentication in MANET
Proceedings of the International Conference on Advances in Computing, Communication and Control
Information Systems Frontiers
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Privacy-aware routing in sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure median computation in wireless sensor networks
Ad Hoc Networks
An Enhanced Trust Center Based Authentication in ZigBee Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Authenticated Encryption in WSN Using eSTREAM Ciphers
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
On providing sink anonymity for sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Anti-jamming for embedded wireless networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Pushing the limits of one-time signatures
Proceedings of the 2nd international conference on Security of information and networks
On providing location privacy for mobile sinks in wireless sensor networks
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
A lightweight secure protocol for wireless sensor networks
Computer Communications
Secret instantiation in ad-hoc networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Energy-efficient secure pattern based data aggregation for wireless sensor networks
Computer Communications
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling, specification and verification of ad-hoc sensor networks using SPIN
Computer Standards & Interfaces
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
DoS detection in cluster-based sensor networks
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A power-preserving broadcast protocol for wireless sensor networks
International Journal of Sensor Networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Formally verified authenticated query dissemination in sensor networks
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
A fuzzy logic-based energy efficient packet loss preventive routing protocol
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
A policy based security management architecture for sensor networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Low-speed wireless networks research and simulation based on RC5
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Information Processing Letters
Journal of Systems and Software
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
Secure feedback service in wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Fuzzy adaptive threshold determining in the key inheritance based sensor networks
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Towards fine-grained and application-centric access control for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Fuzzy key dissemination limiting method for the dynamic filtering-based sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Network coding protocols for secret key distribution
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Using learned data patterns to detect malicious nodes in sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Real-time data aggregation in contention-based wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secured dynamic source routing protocol for mobile sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Resource-aware secure ECG healthcare monitoring through body sensor networks
IEEE Wireless Communications
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
Statistical anomaly detection with sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
Implementation and performance analysis of AES-128 CBC algorithm in WSNs
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A study on secure protocol using the public key infrastructure approach in an e-passport
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A study on sensor nodes attestation protocol in a wireless sensor network
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
An approach for node identification and key management in sensor grids
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Performance of two one-time signature schemes in space/time constrained environments
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Efficient fine-grained data access control in wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Low cost multicast authentication via validity voting in time-triggered embedded control networks
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Enhancing broadcast authentication in sensor networks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Efficient key dissemination method using fuzzy logic based dynamic en-route filtering
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
sSCADA: securing SCADA infrastructure communications
International Journal of Communication Networks and Distributed Systems
Spatio-temporal techniques for anti-jamming in embedded wireless networks
EURASIP Journal on Wireless Communications and Networking
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Formal modeling and verification of sensor network encryption protocol in the OTS/CafeOBJ method
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I
I2CSec: A secure serial Chip-to-Chip communication protocol
Journal of Systems Architecture: the EUROMICRO Journal
Practical defenses against pollution attacks in wireless network coding
ACM Transactions on Information and System Security (TISSEC)
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
IEEE/ACM Transactions on Networking (TON)
Cross-layer jamming detection and mitigation in wireless broadcast networks
IEEE/ACM Transactions on Networking (TON)
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
A co-commitment based secure data collection scheme for tiered wireless sensor networks
Journal of Systems Architecture: the EUROMICRO Journal
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
A review on body area networks security for healthcare
ISRN Communications and Networking
Adapt-lite: privacy-aware, secure, and efficient mhealth sensing
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 14th Communications and Networking Symposium
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
ARCS: an energy-efficient clustering scheme for sensor network monitoring systems
ISRN Communications and Networking
A secure and anonymous cooperative sensing protocol for cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
Security Challenges in the IP-based Internet of Things
Wireless Personal Communications: An International Journal
Semi-fragile watermark for sensor data
International Journal of Internet Protocol Technology
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Achieving distributed user access control in sensor networks
Ad Hoc Networks
Authenticated in-network programming for wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Accusation resolution using security metrology
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
ITB: intrusion-tolerant broadcast protocol in wireless sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Reliable broadcast message authentication in wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Energy comparison of AES and SHA-1 for ubiquitous computing
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
SecDEACH: secure and resilient dynamic clustering protocol preserving data privacy in WSNs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Ensuring basic security and preventing replay attack in a query processing application domain in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
UGSP: secure key establishment protocol for ad-hoc networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Exploring message authentication in sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Ambient Intelligence in Everyday Life
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Two's company, three is a crowd: a group-admission protocol for WSNs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A semantic analysis of wireless network security protocols
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile Networks and Applications
International Journal of Internet Technology and Secured Transactions
HORSIC: An efficient one-time signature scheme for wireless sensor networks
Information Processing Letters
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Traffic measurement and analysis of building automation and control networks
AIMS'12 Proceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security and privacy issues for the network of the future
Security and Communication Networks
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
A secure data aggregation scheme for wireless sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
An effective secure routing for false data injection attack in wireless sensor network
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Towards secure time-triggered systems
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Mobile node authentication using key distribution scheme in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Modeling a Secure Sensor Network Using an Extended Elementary Object System
International Journal of Cognitive Informatics and Natural Intelligence
Lightweight user access control in energy-constrained wireless network services
UCAmI'12 Proceedings of the 6th international conference on Ubiquitous Computing and Ambient Intelligence
Secure routing protocol with anomaly detection in heterogeneous wireless sensor networks
International Journal of Mobile Network Design and Innovation
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Access control in multi-party wireless sensor networks
EWSN'13 Proceedings of the 10th European conference on Wireless Sensor Networks
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Securing the IP-based internet of things with HIP and DTLS
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
Improving security in data-centric storage for wireless sensor networks
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks
Journal of Network and Systems Management
A novel vulnerability detection method for ZigBee MAC layer
International Journal of Grid and Utility Computing
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
International Journal of Critical Computer-Based Systems
Wireless Personal Communications: An International Journal
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Towards Privacy Protection in Smart Grid
Wireless Personal Communications: An International Journal
Effective fault detection and routing scheme for wireless sensor networks
Computers and Electrical Engineering
Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors
Computers and Electrical Engineering
Hi-index | 0.01 |
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and μTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. μTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.