SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Scoping in wireless sensor networks: a position paper
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Research challenges for wireless sensor networks
ACM SIGBED Review - Special issue on embedded sensor networks and wireless computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
Cryptography on a Speck of Dust
Computer
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Towards characterizing the effectiveness of random mobility against actuation attacks
Computer Communications
Defense against outside attacks in wireless sensor networks
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
An elliptical cryptographic algorithm for RF wireless devices
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Modelling and analysis of bandwidth competition in 802.11 wireless networks
International Journal of Mobile Network Design and Innovation
Exploring semantic interference in heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
Macroscopic sensor networks: Application issues in healthcare
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Power aware simulation framework for wireless sensor networks and nodes
EURASIP Journal on Embedded Systems - C-Based Design of Heterogeneous Embedded Systems
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Sensor network configuration under physical attacks
International Journal of Ad Hoc and Ubiquitous Computing
Information Systems Frontiers
Agilla: A mobile agent middleware for self-adaptive wireless sensor networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
iScope: personalized multi-modality image search for mobile devices
Proceedings of the 7th international conference on Mobile systems, applications, and services
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Message authentication for wireless sensor networks
CIS'09 Proceedings of the international conference on Computational and information science 2009
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Authenticated Encryption in WSN Using eSTREAM Ciphers
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
LoBa128, a Lorenz-based PRNG for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Effective pair-wise key establishment scheme for wireless sensor networks
Proceedings of the 2nd international conference on Security of information and networks
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Elliptical anomalies in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Accurate modeling for predicting cryptography overheads on wireless sensor nodes
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Location-based pairwise key predistribution for wireless sensor networks
IEEE Transactions on Wireless Communications
MSS: a multi-level data placement scheme for data survival in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
Secure data aggregation with multiple encryption
EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
A distributed monitoring system for enhancing security and dependability at architectural level
Architecting dependable systems IV
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
A detection method for routing attacks of wireless sensor network based on fuzzy C-means clustering
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 3
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Integrated Computer-Aided Engineering
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Malicious node detection system in wireless sensor networks: a decentralised approach
International Journal of Internet Technology and Secured Transactions
Statistical anomaly detection with sensor networks
ACM Transactions on Sensor Networks (TOSN)
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
Efficient and accurate localization in multihop networks
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
The smallville effect: social ties make mobile networks more secure against node capture attack
Proceedings of the 8th ACM international workshop on Mobility management and wireless access
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
Optimizing query processing in cache-aware wireless sensor networks
SSDBM'10 Proceedings of the 22nd international conference on Scientific and statistical database management
Assessing the vulnerability of replicated network services
Proceedings of the 6th International COnference
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Repelling Sybil-type attacks in wireless ad hoc systems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Proceedings of the 2011 International Conference on Communication, Computing & Security
System accuracy estimation of SRAM-based device authentication
Proceedings of the 16th Asia and South Pacific Design Automation Conference
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Emerging and future cyber threats to critical systems
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Cost and benefit analysis of authentication systems
Decision Support Systems
A fast and tolerant voting mechanism in wireless sensor networks
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Achieving distributed user access control in sensor networks
Ad Hoc Networks
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Discovering network topology in the presence of byzantine faults
SIROCCO'06 Proceedings of the 13th international conference on Structural Information and Communication Complexity
Storage-Optimal key sharing with authentication in sensor networks
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
PATMOS'09 Proceedings of the 19th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A new embedded wireless microcensor network based on bluetooth scatternet and PMCN
ICESS'04 Proceedings of the First international conference on Embedded Software and Systems
Multi-Dimensional resilient statistical en-route filtering in wireless sensor networks
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
International Journal of Ad Hoc and Ubiquitous Computing
Fine grained load balancing in multi-hop wireless networks
Journal of Parallel and Distributed Computing
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
AEGIS: a lightweight firewall for wireless sensor networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Secure data management in reactive sensor networks
ICISS'06 Proceedings of the Second international conference on Information Systems Security
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Coordination in wireless sensor-actuator networks: A survey
Journal of Parallel and Distributed Computing
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice & Experience
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Science of Computer Programming
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Sensor Networks in Pervasive Healthcare Computing
International Journal of Advanced Pervasive and Ubiquitous Computing
Security challenges in embedded systems
ACM Transactions on Embedded Computing Systems (TECS) - Special section on ESTIMedia'12, LCTES'11, rigorous embedded systems design, and multiprocessor system-on-chip for cyber-physical systems
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Countermeasures against sybil attacks in WSN based on proofs-of-work
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Spy-Sense: spyware tool for executing stealthy exploits against sensor networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
Proceedings of the first ACM workshop on Asia public-key cryptography
Compression in wireless sensor networks: A survey and comparative evaluation
ACM Transactions on Sensor Networks (TOSN)
An ID-based online/offline signature scheme without random oracles for wireless sensor networks
Personal and Ubiquitous Computing
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
Journal of Parallel and Distributed Computing
Detection and mitigation of sinkhole attacks in wireless sensor networks
Journal of Computer and System Sciences
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
Hi-index | 0.01 |
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.