Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Denial of Service in Sensor Networks
Computer
Connected sensor cover: self-organization of sensor networks for efficient query execution
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Differentiated surveillance for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Co-Grid: an efficient coverage maintenance protocol for distributed sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
On deriving the upper bound of α-lifetime for large sensor networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
On the Fundamental Capacity and Lifetime Limits of Energy-Constrained Wireless Sensor Networks
RTAS '04 Proceedings of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium
Localized techniques for broadcasting in wireless sensor networks
Proceedings of the 2004 joint workshop on Foundations of mobile computing
Modeling wireless shadow networks
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Methods for Scalable Self-Assembly of Ad Hoc Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Training a wireless sensor network
Mobile Networks and Applications
A unifying look at clustering in mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing - Special Issue: Mobility Management in Wireless and Mobile Networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A simple and robust virtual infrastructure for massively deployed wireless sensor networks
Computer Communications
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Middleware to support sensor network applications
IEEE Network: The Magazine of Global Internetworking
Wireless sensor networks: leveraging the virtual infrastructure
IEEE Network: The Magazine of Global Internetworking
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
A fast and tolerant voting mechanism in wireless sensor networks
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Hi-index | 0.00 |
Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and non-military applications. The main goal of wireless sensor networks is to obtain globally meaningful information from strictly local gleaned by individual sensor nodes. The network is deployed such that the sensors are embedded, possibly at random, in a target environment. Utilizing the basic capabilities of sensor nodes in the network different types of monitoring and control applications that address the target environment can be developed. Depending on the application at hand, the interface between a sensor network and the outside world is provided by aircraft, helicopters, ground-based vehicles, satellites, co-located sink-nodes, etc. However, a wireless sensor network is only as good as the information it produces. In this respect, the most important concern is information assurance. Indeed, in most application domains sensor networks will constitute a mission critical component requiring commensurate security protection. Sensor network communications must prevent disclosure and undetected modification of exchanged messages. Due to the fact that individual sensor nodes are anonymous and that communication among sensors is via wireless links, sensor networks are highly vulnerable to security attacks. If an adversary can thwart the work of the network by perturbing the information produced, stopping production, or pilfering information, then the perceived usefulness of sensor networks will be drastically curtailed. Thus, security is a major issue that must be resolved in order for the potential of wireless sensor networks to be fully exploited.