The landmark hierarchy: a new hierarchy for routing in very large networks
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Proceedings of the 32nd annual international symposium on Computer Architecture
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Medium access control issues in sensor networks
ACM SIGCOMM Computer Communication Review
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
SATIRE: a software architecture for smart AtTIRE
Proceedings of the 4th international conference on Mobile systems, applications and services
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
An efficient and secure protocol for sensor network time synchronization
Journal of Systems and Software
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Medium access control in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
Offline compression for on-chip ram
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
SecLEACH-On the security of clustered sensor networks
Signal Processing
A survey of key management schemes in wireless sensor networks
Computer Communications
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
Mobile Networks and Applications
The BikeNet mobile sensing system for cyclist experience mapping
Proceedings of the 5th international conference on Embedded networked sensor systems
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
An elliptical cryptographic algorithm for RF wireless devices
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Towards a realistic testbed for wireless network reliability and security performance studies
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
A recurrent decentralized key management architecture for wireless sensor network
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Malicious node detection in wireless sensor networks using weighted trust evaluation
Proceedings of the 2008 Spring simulation multiconference
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Delay aware, reconfigurable security for embedded systems
Proceedings of the ICST 2nd international conference on Body area networks
Relaxed authenticity for data aggregation in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Comprehensible security synthesis for wireless sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Of malicious motes and suspicious sensors
Theoretical Computer Science
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks
Proceedings of the second ACM conference on Wireless network security
Self-healing control flow protection in sensor applications
Proceedings of the second ACM conference on Wireless network security
Securing network access in wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Pervasive and Mobile Computing
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
IEICE - Transactions on Information and Systems
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Privacy-aware routing in sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Agilla: A mobile agent middleware for self-adaptive wireless sensor networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
EAP-Sens: a security architecture for wireless sensor networks
Proceedings of the 4th Annual International Conference on Wireless Internet
A hybrid security protocol for sensor networks
International Journal of Communication Networks and Distributed Systems
Authenticated Encryption in WSN Using eSTREAM Ciphers
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A protocol for secure and energy-aware reprogramming in WSN
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Design and evaluation of lightweight middleware for personal wireless body area network
Personal and Ubiquitous Computing
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
A secure ubiquitous sensor network with Dragon
Proceedings of the 2009 International Conference on Hybrid Information Technology
A lightweight secure protocol for wireless sensor networks
Computer Communications
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
BikeNet: A mobile sensing system for cyclist experience mapping
ACM Transactions on Sensor Networks (TOSN)
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
A policy based security management architecture for sensor networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Towards Secure and Practical MACs for Body Sensor Networks
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Accurate modeling for predicting cryptography overheads on wireless sensor nodes
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
An energy-aware routing protocol considering link-layer security in wireless sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
SM-Sens: security middleware for wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Low-speed wireless networks research and simulation based on RC5
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Information Processing Letters
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
A key management based on multiple regression in hierarchical sensor network
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
SAPC: a secure aggregation protocol for cluster-based wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Integrated Computer-Aided Engineering
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Software-based remote code attestation in wireless sensor network
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
IPFIX for wireless sensors in home networks
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Hierarchies of keys in secure multicast communications
Journal of Computer Security
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
ICCOM'10 Proceedings of the 14th WSEAS international conference on Communications
RC5-based security in wireless sensor networks: utilization and performance
WSEAS Transactions on Computers
A TRNG exploiting multi-source physical data
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Low cost multicast authentication via validity voting in time-triggered embedded control networks
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
I2CSec: A secure serial Chip-to-Chip communication protocol
Journal of Systems Architecture: the EUROMICRO Journal
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
IEEE/ACM Transactions on Networking (TON)
Exploiting half-wits: smarter storage for low-power devices
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Security and performance trade-off in KILAVI wireless sensor network
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Towards standardization of in-car sensors
Nets4Cars/Nets4Trains'11 Proceedings of the Third international conference on Communication technologies for vehicles
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
Journal of Network and Computer Applications
Security fusion: a new security architecture for resource-constrained environments
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
A timed calculus for wireless systems
Theoretical Computer Science
A review on body area networks security for healthcare
ISRN Communications and Networking
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
International Journal of Sensor Networks
Semi-fragile watermark for sensor data
International Journal of Internet Protocol Technology
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
A survivable distributed sensor networks through stochastic models
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Applying key infrastructures for sensor networks in CIP/CIIP scenarios
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
LSec: lightweight security protocol for distributed wireless sensor network
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Public key cryptography-based security scheme for wireless sensor networks in healthcare
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Energy comparison of AES and SHA-1 for ubiquitous computing
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
PATMOS'09 Proceedings of the 19th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Gathering sensor data in home networks with IPFIX
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Authentication – based medium access control to prevent protocol jamming: A-MAC
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
AEGIS: a lightweight firewall for wireless sensor networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Journal of Computer and System Sciences
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
People-centric sensing in assistive healthcare: Privacy challenges and directions
Security and Communication Networks
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Science of Computer Programming
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Information Systems and e-Business Management
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
Inspired Social Spider Behavior for Secure Wireless Sensor Networks
International Journal of Mobile Computing and Multimedia Communications
Access control in multi-party wireless sensor networks
EWSN'13 Proceedings of the 10th European conference on Wireless Sensor Networks
A prediction model for anomalies in smart grid with sensor network
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
ACM Transactions on Embedded Computing Systems (TECS) - Special Section on Probabilistic Embedded Computing
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
A reversible watermarking authentication scheme for wireless sensor networks
Information Sciences: an International Journal
Sustainable performance in energy harvesting: wireless sensor networks
Proceedings of the fourth international conference on Future energy systems
Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks
ACM Transactions on Sensor Networks (TOSN)
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
Improving security in data-centric storage for wireless sensor networks
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks
Journal of Network and Systems Management
Safe system-level concurrency on resource-constrained nodes
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer
Proceedings of the International Workshop on Adaptive Security
Analysis of the applicability of wireless sensor networks attacks to body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
An ID-based online/offline signature scheme without random oracles for wireless sensor networks
Personal and Ubiquitous Computing
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
International Journal of Critical Computer-Based Systems
Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors
Computers and Electrical Engineering
Hi-index | 0.02 |
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols tend to be conservative in their security guarantees, typically adding 16--32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.