Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A transmission control scheme for media access in sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks
RTAS '02 Proceedings of the Eighth IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
IEEE Network: The Magazine of Global Internetworking
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Sensor: the atomic computing particle
ACM SIGMOD Record
Scalable Cryptographic Key Management in Wireless Sensor Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Security in sensor networks: watermarking techniques
Wireless sensor networks
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Sensor-centric energy-constrained reliable query routing for wireless sensor networks
Journal of Parallel and Distributed Computing
Training a wireless sensor network
Mobile Networks and Applications
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Information Assurance In Wireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An entity maintenance and connection service for sensor networks
Proceedings of the 1st international conference on Mobile systems, applications and services
The holes problem in wireless sensor networks: a survey
ACM SIGMOBILE Mobile Computing and Communications Review
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Quantifying eavesdropping vulnerability in sensor networks
DMSN '05 Proceedings of the 2nd international workshop on Data management for sensor networks
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Research challenges for wireless sensor networks
ACM SIGBED Review - Special issue on embedded sensor networks and wireless computing
A rule-based adaptive routing protocol for continuous data dissemination in WSNs
Journal of Parallel and Distributed Computing - Special issue: Algorithms for wireless and ad-hoc networks
Symmetric key based authenticated querying in wireless sensor networks
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
ANSWER: AutoNomouS netWorked sEnsoR system
Journal of Parallel and Distributed Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Key management for long-lived sensor networks in hostile environments
Computer Communications
Hardware support for secure processing in embedded systems
Proceedings of the 44th annual Design Automation Conference
SecLEACH-On the security of clustered sensor networks
Signal Processing
A survey of key management schemes in wireless sensor networks
Computer Communications
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
Detecting Sybil attacks in image senor network using cognitive intelligence
Proceedings of the First ACM workshop on Sensor and actor networks
Towards characterizing the effectiveness of random mobility against actuation attacks
Computer Communications
Containing denial-of-service attacks in broadcast authentication in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Sensor network minimal energy routing with latency guarantees
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Analysis of range-free anchor-free localization in a wsn under wormhole attack
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
A multi-channel defense against jamming attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Catching elephants with mice: sparse sampling for monitoring sensor networks
Proceedings of the 5th international conference on Embedded networked sensor systems
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Managing the Mobility of a Mobile Sensor Network Using Network Dynamics
IEEE Transactions on Parallel and Distributed Systems
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Defense against outside attacks in wireless sensor networks
Computer Communications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Energy-efficient distributed authorisation server (DAS) placement for sensor networks
International Journal of High Performance Computing and Networking
Secure communication method in mobile wireless networks
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Public key based authentication for secure integration of sensor data and RFID
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
A*-based key tree structure generation for group key management in wireless sensor networks
Computer Communications
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Optimally balancing energy consumption versus latency in sensor network routing
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
A survey on jamming avoidance in ad-hoc sensory networks
Journal of Computing Sciences in Colleges
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Denial of Sleeping: Performance Analysis and Counteracting Strategy
APCHI '08 Proceedings of the 8th Asia-Pacific conference on Computer-Human Interaction
Jamming detection mechanisms for wireless sensor networks
Proceedings of the 3rd international conference on Scalable information systems
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Comprehensible security synthesis for wireless sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
Multiphase intrusion detection and revocation system for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Authenticated Directed Diffusion
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Journal of Network and Computer Applications
Aspect-oriented support for synchronization in parallel computing
Proceedings of the 1st workshop on Linking aspect technology and evolution
A coding-theoretic approach for efficient message verification over insecure channels
Proceedings of the second ACM conference on Wireless network security
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Pervasive and Mobile Computing
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Sensor network configuration under physical attacks
International Journal of Ad Hoc and Ubiquitous Computing
Resource optimization in distributed biometric recognition using wireless sensor network
Multidimensional Systems and Signal Processing
A generic construction of useful client puzzles
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN
Information Security and Cryptology
Proceedings of the 4th Annual International Conference on Wireless Internet
Tradeoffs between jamming resilience and communication efficiency in key establishment
ACM SIGMOBILE Mobile Computing and Communications Review
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Design and simulation on data-forwarding security in sensor networks
International Journal of Information and Computer Security
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
SCON: Secure management of continuity in sensor networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Catching elephants with mice: Sparse sampling for monitoring sensor networks
ACM Transactions on Sensor Networks (TOSN)
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
DoS detection in cluster-based sensor networks
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A power-preserving broadcast protocol for wireless sensor networks
International Journal of Sensor Networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Resilient cluster leader election for wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
XLSEC: a distributed cross-layer framework for security in wireless sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Enhanced group-based key management scheme for wireless sensor networks using deployment knowledge
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Survivability evaluation of cluster-based wireless sensor network under DoS attacks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A hybrid MAC protocol for wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Computers and Electrical Engineering
Lightweight anomaly intrusion detection in wireless sensor networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Collaborative location certification for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
An algorithm for reconnecting wireless sensor network partitions
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
N-dimensional grid-based key predistribution in wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detection of jamming attacks in wireless ad hoc networks using error distribution
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
An intrusion detection framework for sensor networks using ant colony
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Cognitive security protocol for sensor based VANET using Swarm intelligence
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Energy-efficient jamming attack in IEEE 802.11 MAC
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Distributed detection in the presence of Byzantine attack in large wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Securing the data path of next-generation router systems
Computer Communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
IEEE/ACM Transactions on Networking (TON)
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Conflict on a communication channel
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
Jamming-resistant communication in multi-channel multi-hop multi-path wireless networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
Investigation of signal and message manipulations on the wireless channel
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Proceedings of the 14th Communications and Networking Symposium
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Security requirements for a cyber physical community system: a case study
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Impact of high-mobility radio jamming in large-scale wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Ensuring basic security and preventing replay attack in a query processing application domain in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Sensor network configuration under physical attacks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
AEGIS: a lightweight firewall for wireless sensor networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
An anti-jamming strategy for channel access in cognitive radio networks
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Jamming-resilient multi-radio multi-channel multihop wireless network for smart grid
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Potential intrusions in wireless networks
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Toward a safe integrated clinical environment: a communication security perspective
Proceedings of the 2012 ACM workshop on Medical communication systems
To increase survivability with software rejuvenation by having dual base station in WSN environment
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Towards secure time-triggered systems
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Information Sciences: an International Journal
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks
Journal of Network and Systems Management
Duty-cycle optimization for IEEE 802.15.4 wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
A novel intrusion detection framework for wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 4.10 |
Sensor networks hold the promise off acilitating large-scale, real-time data processing in complex environments, environments, helping to protect and monitor military, environmental, safety-critical, or domestic infrastructures and resources. Denial-of-service attacks against such networks, however, may permit real world damage to public health and safety. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold. The limited ability ofindividual sensor nodes to thwart failure or attack makes ensuring network availability more difficult.To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security. These examples demonstrate that consideration of security at design time is the best way to ensure successful network deployment.