SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Hi-index | 0.00 |
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging problem to choose and design valid security protocols for such networks. This problem has recently given rise to new research addressing the security issues. This paper presents an overview of the important works, specifically the new mechanisms and protocols, which have been introduced or are still under development in this area.