CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
A Formal Analysis of Syverson's Rational Exchange Protocol
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Pi: A Path Identification Mechanism to Defend against DDoS Attacks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Graphical Techniques in Intrusion Detection Systems
ICOIN '01 Proceedings of the The 15th International Conference on Information Networking
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
PICO: A Middleware Framework for Pervasive Computing
IEEE Pervasive Computing
Review: TCP/IP security threats and attack methods
Computer Communications
Intrusion detection through learning behavior model
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Hi-index | 0.00 |
Security plays a significant role in the current and future wireless mobile networks. The goal of secured communication must ensure that the data we receive is authentic, confidential and have not been altered. Because of the characteristics of wireless medium, limited protection of mobile nodes, nature of connectivity and lack of centralized managing point, wireless mobile networks are too vulnerable and often subject to attacks. In this chapter we discuss security issues and challenges in wireless mobile ad hoc and sensor networks as well as in pervasive computing infrastructures. We also describe security protocols for such environments.