Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Supervisory Control and Data Acquisition
Supervisory Control and Data Acquisition
Modelling Distributed Control Systems Using IEC 61499
Modelling Distributed Control Systems Using IEC 61499
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The cougar approach to in-network query processing in sensor networks
ACM SIGMOD Record
Data Gathering Algorithms in Sensor Networks Using Energy Metrics
IEEE Transactions on Parallel and Distributed Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Fjording the Stream: An Architecture for Queries Over Streaming Sensor Data
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Strategies and Challenges for Interconnecting Wireless Mesh and Wireless Sensor Networks
Wireless Personal Communications: An International Journal
SAMOS'07 Proceedings of the 7th international conference on Embedded computer systems: architectures, modeling, and simulation
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
A survivable distributed sensor networks through stochastic models
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Hi-index | 0.00 |
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure supported wireless networks are briefly compared and contrasted to the security concerns of Wireless Sensor Networks. A framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities is defined.