Wireless Sensor Networks Security
 
Security Lounge                                              updated 15/01/13
A list of recent publications can be found in this list. If you are aware of some recent publications, we would appreciate you filling the form here and send it to us.
 
Year

Authors

Title Where Available files
2012        
1

A. Blilat, A. Bouayad,N. El Houda Chaoui, M.E. Ghazi.

Wireless Sensor Network: Security challenges.

JNS2

2

Z.Yue-Feng, H. Jia-Yu, C. Zhuo-Ran, L. Zheng.

A novel based-node level Security strategy in wireless sensor network.

ICIII'12

 
3

M. Valero,S. Shin Jung ,A.S. Uluagac,Y.Li, R. Beyah

Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks.

INFOCOM'12

 
4

Zhang Yu.

The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security

ICSESS'12

 
5

M.V.Ramesh, A.B. Raj, T. Hemalatha

Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks .

CICN'12

 
6

L.B. Jivanadham, A.K.M.M. Islam, N. Mansoor, S. Baharun.

A Secured Dynamic Cluster-Based Wireless Sensor Network.

CICSyN

 
7

M. El-Saadawy, E. Shaaban.

Enhancing S-LEACH Security for Wireless Sensor Networks.

EIT'12

 
8

Q. Liu, L. Liu, X. Kuang, Y. Wen.

Secure Service and Management for Security-Critical Wireless Sensor Network.

IMIS'12

 
9

S.R. Afzal, C. Huygens, W. Joosen.

DiFiSec: An Adaptable Multi-level Security Framework for Event-driven Communication in Wireless Sensor Networks.

NCA'12

 
10

G. Wang.

A Wireless Sensor Network in Port Security .

ICSSE'12

 
11

M. Jeyalakshmi.

Location aware end-end data security using mac for secured wireless sensor networks .

ICAESM'12

 
12

L. Gheorghe, R. Rughinis, N. Tapus .

Adaptive Security Framework for Wireless Sensor Networks.

INCoS'12

 
13

A. Rasheed, R.N. Mahapatra.

The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks.

PDS 23(5):958-965

 
14

A. Jain, K. Kant, M.R. Tripathy.

Security Solutions for Wireless Sensor Networks.

ACCT'12

 
15

E. Garcia-Palacios, N. Mehallegue, G.A. Safdar.

Providing Security and Energy Efficiency in Wireless Ad-Hoc sensor Networks Through Secure Cluster-Head Election (SEC-CH-E).

TSP'12

 
16

D. He, C. Chen, S. Chan, J. Bu

SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

Industrial Electronics 59(11): 4155 - 4163

 
17

B. Lamichhane, S. Mudda,F. Regazzoni,A. Puiatti.

LEXCOMM: A Low Energy, Secure and Flexible Communication Protocol for A Heterogenous Body Sensor Network.

BHI'12

 
18

S. Stelle, M. Manulis, M. Hollick.

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.

ARES'12

 
19

H. Alwan, A. Agarwal .

A secure mechanism for QoS routing in wireless sensor networks.

CCECE'12

 
20

L. Gheorghe, D. Tudose, M. Wehner, S. Zeisberg.

Securing Virtual Networks for Multi-Owner Wireless Sensor Networks.

INCoS'12

 
21

A. Kimura, E. Kohno, Y. Kakuda.

Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint Nodes .

ICDCSW'12

 
22

B. Shanthini, S. Swamynathan.

Genetic-Based Biometric Security System for Wireless Sensor-based Health Care Systems .

RACSS'12

 
23

A.B. Raj, M.V. Ramesh, R.V. Kulkarni, T. Hemalatha.

Security Enhancement in Wireless Sensor Networks using Machine Learning.

HPCC-ICESS

 
24

K. Nagarathna, Y.B. Kiran, J.D. Mallapur, S. Hiremath.

Trust Based Secured Routing in Wireless Multimedia Sensor Networks.

CICSyN'12

 
25

Madhu, A. Dahiya, B. Dahiya.

Energy Efficient Data Tranfer in Secure Wireless Sensor Networks.

ACCT'12

 
26

R. Soosahabi, M. Naraghi-Pour.

Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks .

IFS 7(4): 1118 - 1126

 
27

M.B. Abdullahi, G. Wang.

Secure Publish-Subscribe-based In-Network Data Storage Service in Wireless Sensor Networks.

DCOSS'12

 
28

T. Petrovic, M. Zagar.

Security in distributed wireless sensor networks.

MIPRO'12

 
29

F. Liu, Z. Jia , Y. Li.

A Novel Partial Dynamic Reconfiguration Image Sensor Node for Wireless Multimedia Sensor Networks.

HPCC-ICESS

 
30

Q. Yu , C.N. Zhang.

A Secure Multicast Scheme for Wireless Sensor Networks.

MUSIC'12

 
31

L. Zhou, Z. Zhang.

A Secure Data Transmission Scheme for Wireless Sensor Networks Based on Digital Watermarking.

FSKD'12

32

V. Dadarlat.

WSeH: Proposal for an adaptive monitoring framework for WSNs, with enhanced security and QoS support.

DICTAP'12

 
33

V. Kumar, S. Madria.

Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis.

MDM'12

34

A.G. Menezes, C.B. Westphall, C.M. Westphall, E.M. de Lima Pinto.

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network.

NOMS'12

35

N. Aschenbruck, J. Bauer, J. Bieling, A. Bothe, M. Schwamborn.

A security architecture and modular intrusion detection system for WSNs.

INSS'12

 
36

K. Islam, W. Shen, X. Wang.

Security and privacy considerations for Wireless Sensor Networks in smart home environments.

CSCWD'12

 
37

R. Haji, A. Hasbi, M. Ghallali, B. El Ouahidi.

Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations.

ICMCS'12

 
38

Y. Zhan, C. Li, X. Wang, Y. Zhou, L. Liu, H. Al-Aqrabi.

A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks .

TrustCom'12

39

Huei-Wen Ferng, D. Rachmarini

A secure routing protocol for wireless sensor networks with consideration of energy efficiency .

NOMS'12

 
40

Y. Li, J. Ren, J. Wu

Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks.

PDS 23(7): 1302 - 1311

 
41

X. Yang, S. Zhang, F. Li, S. Xu

Security of power line monitoring system based on wireless sensor network .

WAC'12

 
42

Y. Song, J. Zhang,L. Li, Q. Wang.

Work-based Reputation Evaluation Secure Routing Algorithm in wireless sensor networks.

GSMM'12

 
43

V.C. Sekhar, M. Sarvabhatla.

Security in Wireless sensor networks with public key techniques.

ICCCI'12

 
44

M. Garcia-Otero, A. Poblacion, A. Fernandez-Herrero, A. Herrera-Guardado.

Performance of robust algorithms for secure localization in wireless sensor networks.

ICL-GNSS'12

 
45

V.T. Kesavan, S. Radhakrishnan.

Secret Key Cryptography based Security Approach for Wireless Sensor Networks .

RACSS'12

 
46

S.Shaikh, V. Gulhane.

User Authentication Techniques for Wireless Sensor Networks : A Survey.

IJSSAN

 
47

Andreas Larsson.

Security and Self-stabilization in Sensor Network Services

PhD

 
48

M. Usman, V. Muthukkumarasamy, X. Wu, S. Khanum.

Securing mobile agent based Wireless Sensor Network applications on middleware.

ISCIT'12

49

Y. Li, J. Li, J. Ren, J. Wu

Providing hop-by-hop authentication and source privacy in wireless sensor networks.

INFOCOM

 
50

C.O. Iwendi, A.R. Allen.

Enhanced security technique for wireless sensor network nodes.

WSS'12

 
51

V.P.V. Gottumukkala, V. Pandit, H. Li, D.P. Agrawal.

Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks.

ICC'12

 
52

A. Liu, Z. Zheng, C. Zhang, Z. Chen, X. Shen

Secure and Energy-Efficient Disjoint Multipath Routing for WSNs.

Vehicular Technology 61(7): 3255 - 3265

 
53

A. Diaz, P. Penil, P. Sanchez, J. Sancho, J. RicoD.

Modeling and simulation of secure wireless sensor network .

FDL'12

 
54

C. Gupta, K. Gupta, V. Gupta.

Security threats in sensor network and their possible solutions .

IMSNA 1: 11 - 13

 
55

S. Roy, M. Conti, S. Setia, S. Jajodia.

Secure Data Aggregation in Wireless Sensor Networks.

IFS 7 (3): 1040 - 1052

 
56

N. Aschenbruck, J. Bauer, J. Bieling, A. Bothe, M. Schwamborn .

Selective and Secure Over-The-Air Programming for Wireless Sensor Networks .

ICCCN'12

 
57

A. Jhumka, M. Bradbury, M. Leeke.

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources .

TrustCom'12

 
58

R. Garg, A.L. Varna, M. Wu .

An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks .

IFS 7(2): 717 - 730

 
59

Y. Liu, J. Li, M.Guizani.

Lightweight secure global time synchronization for Wireless Sensor Networks.

WCNC'12

 
60

G. Subramanian, R. Amutha

Efficient and secure routing protocol for wireless sensor networks using mine detection An extension of triple umpiring system for WSN.

ICCM'12

 
61

M.E. Mahmoud, X. Shen.

Secure and efficient source location privacy-preserving scheme for wireless sensor networks.

ICC'12

 
62

G. Sharma , S. Bala, A. K. Verma

Security Frameworks for Wireless Sensor Networks-Review

Procedia Technology 6: 978–987

 
63

Y. M.Yussoff, H. Hashim, R. Rosli, M. D. Baba

A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks.

Procedia Engineering 41: 580–587

 
64

R. A. Potyrailo, N. Nagraj, C. Surman

Wireless sensors and sensor networks for homeland security applications .

TrAC 40: 133–145

 
65

S. Qian.

A Novel Key Pre-distribution for Wireless Sensor Networks .

Physics Procedia 25: 2183–2189

 
66

E. Kohno , T. Okazakia, M. Takeuchia, T. Ohtaa, Y. Kakudaa, M. Aida.

Improvement of assurance including security for wireless sensor networks using dispersed data transmission .

JCSS 78 (6):1703–1715

 
67

F. Fessanta, A. Papadimitrioub, A. Viana, C. Sengul, E. Palomar.

A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis.

Computer Communications 35(2):234–248

 
68

W. Zhu, J. Zhou, R. H. Deng, F. Baob

Detecting node replication attacks in wireless sensor networks: A survey.

JNCA 35(3):1022–1034

 
2011            
1

N. Labraoui, M. Gueroui

Secure range-free localization scheme in Wireless sensor networks
ISPS'11
 
2
N. Labraoui, M. Gueroui, M. Aliouat
Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks
DICTAP 166 (1):603-618
 
3
J. Jiang, G. Han, L. Shu, H.-C. Chao, S. Nishio
A novel secure localization scheme against collaborative collusion in wireless sensor networks
IWCMC'11
 
4
P. Pandarinath
Secure localization with defense against selective forwarding attacks in wireless sensor networks
ICEC'11
 
5
J. Sen
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks
CORR abs/1101.3076
 
6
M. H. Megahed, D. Makrakis, B. Ying
SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN
PROCS 5: 141 - 148
 
7
B. Kumari, N. Vikram, M. M. Reddy
Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms

IJCST 2(4):50-55

 
8
G. V. Crosby, L. Hester, N. Pissinou
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
IJNS 12(2):107-117
 
9
X. Jiang, W. Hu, S. Zhu, G. Cao
Compromise-resilient anti-jamming communication in wireless sensor networks
Wireless Networks 17(6):1513-1527
 
10
J.-W. Ho,M. Wright,S. K. Das
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
ITMC 10(6):767-782
11
Z. Ruan, X. Sun
An Efficient Data Delivery Mechanism by Exploring Multipath Routes for Wireless Sensor Networks
ITJ 10(7):1359-1366
 
12
H. Alzaid, E. Foo, J. G. Nieto, E. Ahmed
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
SCN 5(2):125-144
 
13
L. B. Oliveira, D. F. Aranha, C. P. L. Gouvêa, M. Scott, D. F. Címara, J. López, R. Dahab
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
ComCom 34(3): 485-493
 
14
R. Roman, C. Alcaraz, Javier Lopez, Nicolas Sklavos
Key management systems for sensor networks in the context of the Internet of Things
CEE 37(2): 147-159
 
15
I. Hang, M. Ullmann, C. Wieschebrink
a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme
WiSec '11
 
16
R. Yasmin, E. Ritter, G. Wang
A Pairing-Free ID-based One-Pass Authenticated Key Establishment Protocol for Wireless Sensor Networks
SensorComm '11
 
17
A. K. Das, D. Giri
An Identity Based Key Management Scheme in Wireless Sensor Networks
CORR abs/ 1103.4676
 
18
M. Boujelben, H. Youssef, R. Mzid, M. Abid
IKM - An Identity based Key Management Scheme for Heterogeneous Sensor Networks
JCM 6(2):185-197
 
19
C. Zhe, L. Yuanning
Secure monitoring scheme for wireless sensor networks based on identity signcryption
CSAE'11
 
20
V. Kannan, S. Ahmed   
A Resource Perspective to Wireless Sensor Network Security
IMIS'11
 
21
A. Sahana, I.S. Misra
Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis
Wireless Vitae'11
 
22
T.M. Mubarak, S.A. Sattar, G.A. Rao, M. Sajitha
Intrusion detection: An energy efficient approach in heterogeneous WSN
ICETECT'11
 
23
R. Na, Y. Ren, Y. Hori, K. Sakurai
A generic evaluation method for key management schemes in wireless sensor network
ICUIMC '11
 
24
H. K. Kalita, A. Kar
Key management in secure self organized wireless sensor network: a new approach
ICWET '11
 
25
W. Z. Khan, Y. Xiang, M. Y. Aalsalem, Q. Arshad
Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks
IJCNIS 3(1): 1-10
 
26
L. K. Bysani, A.K. Turuk
A Survey on Selective Forwarding Attack in Wireless Sensor Networks
ICDECOM'11
 
27
J. W. Kim, S. Y. Moon, T. H. Cho, J. M. Kim, P. S. Min
Improved message communication scheme in selective forwarding attack detection method
IDCTA'11
 
28
A. K. Mishra, A. K. Turuk
Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks
ICDeCom'11
 
29
H. Renm ,X. Sun,Z. Ruan, B. Wang
An Efficient Scheme Against Node Capture Attacks using Secure Pairwise Key for Sensor Networks
ITJ 10(1):71-79
 
30
B. R. Ambedkar, P. Gautam, A. Gupta, SS. Bedi
An Efficient Method to Factorize the RSA Public Key Encryption
CSNT'11
 
31
S. J. Aboud
Attack knapsack public key encryption scheme
i-Society'11
 
32
J. Guo, Z.-Y. Lei
A kind of wormhole attack defense strategy of WSN based on neighbor nodes verification
ICCSN'11
 
33
Y. Guoqiang, D. Weijun,M. Chao, H. Liang
RSSI vector attack detection method for wireless sensor networks
ICCSN'11
 
34
C. Benzaid, A. Saiah, N. Badache, Nadjib
Secure pairwise broadcast time synchronization in wireless sensor networks
DCOSS'11
 
35
Y. M. Yussoff, H. Hashim
IBE-Trust: A security framework for Wireless Sensor Networks
WorldCIS'11
 
36
D. He, J. Bu, S. Zhu, M. Yin, Y. Gao, H. Wang, S. Chan, C. Chen
Distributed privacy-preserving access control in a single-owner multi-user sensor network
INFOCOM'11
 
37
S. Ramachandran, U. Sridhar, V. Srinivasan, J. J. Jothi
Encrypted data aggregation in wireless sensor networks using randomized routing
ICRTIT'11
 
38
N. Oualha, A. Olivereau
Sensor and Data Privacy in Industrial Wireless Sensor Networks
SAR-SSI'11
 
39
S. P. T. Srinivasan, C. Chellappan
Semi-randomised propagation for secure routing in Wireless Sensor Networks
ICRTIT'11
 
40
H. Cheng, C. Rong, G. Yang
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks
AINA'11
 
41
N. El-Bendary, O. S. Soliman, N. I. Ghali, A.E. Hassanien, V. Palade, H. Liu
A secure directed diffusion routing protocol for wireless sensor networks
ICNIT'11
 
42
D. P. S. E. Christina, R. J. Chitra
Energy efficient secure routing in wireless sensor networks
ICETECT'11
 
43
S. I. Eludiora, O. O. Abiona, A. O. Oluwatope, S. A. Bello, M.L. Sanni, D. O. Ayanda, C.E. Onime E. R. Adagunodo, L. O. Kehinde
A distributed intrusion detection scheme for wireless sensor networks
EIT'11
 
44
S. Shen
A game-theoretic approach for optimizing intrusion detection strategy in WSNs
AIMSEC'11
 
45
M. A. Livani, M. Abadi
A PCA-based distributed approach for intrusion detection in wireless sensor networks
CNDS'11
 
46
C.-M. Rong, S. Eggen, H.-B. Cheng
A novel intrusion detection algorithm for wireless sensor networks
Wireless VITAE'11
 
47
T. M. Mubarak, S. Abdul Sattar, A. Rao, M. Sajitha
A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN
CCIS 192(2):102-110
 
48
T. Bhattasali, R. Chaki
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network
CCIS 196(1):268-280
 
49
C.-M. Rong, S. Eggen, H.-B. Cheng
An Efficient Intrusion Detection Scheme for Wireless Sensor Networks
CCIS 187:116-129
 
50
S.-S. Wang, K.-Q. Yan, S.-C. Wang, C.-W. Liu
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
ESWA 38(12):15234-15243
 
51
H. A. Arolkar, S. P. Sheth, V. P. Tamhane
Ant colony based approach for intrusion detection on cluster heads in WSN
ICCCS '11
 
52
Y. S. Chen, Y. S. Qin, Y. G. Xiang, J. X. Zhong, X. L. Jiao
Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network
CCIS 86: 372 - 376
 
53
J.-Y. Huang, I.-E. Liao, Y.-F. Chung, K.-T. Chen
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining
IS 2011 (Article in Press)
 
54
S. Shen, Y. Li, H. Xu, Q. Cao
Signaling game based strategy of intrusion detection in wireless sensor networks
CAMWA 62(6):2404-2416
 
55
C. Kolias, G. Kambourakis, M. Maragoudakis
Swarm intelligence in intrusion detection: A survey
COSE 30(8):625-642
 
56
Z. Bankovic
Unsupervised intrusion detection for wireless sensor networks based on artificial intelligence techniques
PhD. Thesis
 
57
J. Guo, J. Fang, X. Chen
Survey on secure data aggregation for wireless sensor networks
SOLI'11
 
58
Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-Dhelaan, I. F. Akyildiz
BorderSense: Border patrol through advanced wireless sensor networks
ADHOC 9(3):468-477
 
59
I. Butun, R. Sankar
A brief survey of access control in Wireless Sensor Networks
CCNC'11
 
60
B. Alomair, A. Clark, J. Cuellar, R. Poovendran
Towards a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE TMC PP
 
61
O. Cheikhrouhou, A. Koubaa, G. Dini, H. Alzaid, M. Abid
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Procedia CS 5:198-207
 
62
O. Cheikhrouhou, A. Koubâa, G. Dini, M. Abid
RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.
PUC 15(8):783-797
 
2010            
1

A. Modirkhazeni, N. Ithnin, O. Ibrahim

Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis.

NETAPPS'10

2

S. Hong, S. Lim

Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study.

WCNIS'10

3

Y. Wang, W. Lin, T. Zhang

Study on security of Wireless Sensor Networks in smart grid.

POWERCON'10

4

P. W Q Lee, W. K G Seah, H.-P. Tan, Z. Yao

Wireless sensing without sensors an experimental study of motion/intrusion detection using RF irregularity.

MST 21(12)

5

Y. Keung, B. Li, Q. Zhang

The intrusion detection in mobile sensor network.

MobiHoc'10

6

Y. Zhang, N. Meratnia, P. Havinga

Outlier Detection Techniques for Wireless Sensor Networks: A Survey.

IEEE CST 12(2):159-170

7

Y. Ponomarchuk, D.-W. Seo

Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks.

UBICOMM'10

8

M. Mubarak.T, S. A. Sattar, A. Rao, S. M

Intrusion Detection: A Probability Model for 3D Heterogeneous WSN.

IJCA 6(12):15-20

9

L. Li, Y.-H. Li, D.-Y. Fu, W. Ming

Intrusion Detection Model Based on Hierarchical Structure in Wireless Sensor Networks.

ICECE'10

10

Y. Wang, Z. Lun

Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks.

MASCS 0:421-423

11

S. Khanum, M. Usman, K. Hussain, R. Zafar, M. Sher

Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.

HPCA:212-217

12

S. Misra, P. V. Krishna, K. I. Abraham

Energy efficient learning solution for intrusion detection in Wireless Sensor Networks.

COMSNETS'10

13

Z. Bankovi, J. M. Moya, Araujo, D. Fraga, J. C. Vallejo, J. M. de Goyeneche

Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps.

ICAE 17(2):87-102

14

R. Graaf, I. Hegazy, J. Horton, R. Safavi-Naini

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks.

Ad Hoc Networks 28:208-223

15

R.-C. Chen, C.-F. Hsieh, Y.-F. Huang

An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks.

JNW 5(3)

16

Z. Nan, Z. Jian-hua, C. Jian-ying

An Intrusion Detection Mechanism Based on Immune Multi-Agents in WSN.

Chinese Journal of Computer Engineering

17

S. Shin, T. Kwon, G.-Y. Jo, Y. Park, H. Rhy

An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks.

IEEE TII 6(4):744 -757

18

M. V. de S. Lemos, L. B. Leal, R. H. Filho

A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks.

NATTN 239-244

19

M. S. Islam, R. H. Khan, D. M. Bappy

A Hierarchical Intrusion Detection System in Wireless Sensor Networks.

IJCSNS 10(8):21

20

L. Ju, H. Li, Y. Liu, W. Xue, K. Li, Z. Chi

An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks.

CUTE'10

21

L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo

An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies.

CRIS'10

22

M. Estiri, A. Khademzadeh

A theoretical signaling game model for intrusion detection in wireless sensor networks.

NETWORKS'10

23

K. Q. Yan, S. C. Wang, S. S. Wang, C. W. Liu

Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network.

ICCSIT'10

24

Y. Ponomarchuk, D.-W. Seo

Intrusion detection based on traffic analysis in wireless sensor networks.

WOCC'10

25

J. Wu, S. Shimamoto

Integrated UCON-Based Access Control and Adaptive Intrusion Detection for Wireless Sensor Networks.

GLOBECOM'10

26

Y. Mao

A semantic-based intrusion detection framework for wireless sensor network.

INC'10

27

Z. Su, Y. Jiang, F. Ren, C. Lin, X. Chu

Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks.

EURASIP Journal WCN 2010(14)

28

E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis

A Survey on Cluster-Based Group Key Agreement Protocols for WSNs.

IEEE CST PP(99):1-14

29

J.-H. Son, J.-S. Lee, S.-W. Seo

Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks.

IJWPC 52(24):359-382

30

Y. Zhang, Y. Shen, S.-K. Lee

A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks.

APWEB'10

31

M. Rahman, S. Sampalli, S. Hussain

A robust pair-wise and group key management protocol for wireless sensor network.

GLOBECOM'10

32

X. Zhang, J. He, Q. Wei

Secure routing based on the neighbor table in wireless sensor networks.

ICBNMT'10

33

S. K. Dhurandher, M. S. Obaidat, D. Gupta, N. Gupta, A. Asthana

Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments.

WINSYS'10

34

L. Teng, Y. Zhang

SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks.

ICCMS'10

35

H. Lu, J. Li, H. Kameda

A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature.

GLOBECOM'10

36

S. K. Dhurandher, M. S. Obaidat, G. Jain, I. M. Ganesh, V. Shashidhar

An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting.

GreenCom-CPSCom'10

37

J. Zhou

Efficient and secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks.

ICAIE'10

38

P. Kumar, M. I. Salam, S.-G. Lee, H.-J. Lee

Addressing secure data routing scheme for heterogeneous sensor networks.

NCM'10

39

R. Bista, M.-S. Song, J.-W. Chang

Preserving Privacy and Assuring Integrity in data aggregation for Wireless Sensor Networks.

NESEA'10

40

R. Bista, Y.-S. Shin, J.-W. Chang

Scalability in Privacy-Preserving Data Aggregation for Wireless Sensor Networks.

ISPA'10

41

A. Ukil

Privacy Preserving Data Aggregation in Wireless Sensor Networks.

ICWMC'10

42

A. S. Poornima, B. B. Amberker

SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks.

WOCN'10

43

M. B. Zanjani, R. Monsefi, A. Boustani

Energy efficient/highly secure data aggregation method using tree-structured orthogonal codes for Wireless Sensor Networks.

ICSTE'10

44

J. Lopez, R. Roman, I. Agudo, C. Fernandez-Gago

Trust Management Systems for Wireless Sensor Networks: Best Practices.

ComCom 33(9):1086-1093

45

Y. Mohd Yussoff, H. Hashim

Trusted Wireless Sensor Node Platform.

WCE'10

46

A. Kapadia, S. Myers, X.-F. Wang, G. Fox

Secure cloud computing with brokered trusted sensor networks.

CTS'10

47

K. Daabaj, M. Dixon, T. Koziniec, K. Lee

Trusted Routing for Resource-Constrained Wireless Sensor Networks.

EUC'10

48

Z. Quan, F. Gui, D. Xiao, J. Li

Trusted transport mode based cluster-merkle-tree for wireless sensor networks.

ICCASM'10

49

J. Peng, Y. Fan, F. Jiang, X. Zhang, K.-C. Lin

Communication Scheme in Trusted Sensor Network.

NSWCTC'10

50

J. Harbin, P. Mitchell, D. Pearce

Wireless sensor network wormhole avoidance using reputation-based routing.

ISWCS'10

51

M. B. Uddin, C. Castelluccia

Toward clock skew based wireless sensor node services.

WICON'10

52

X. Zhenghong, C. Zhigang

A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks.

IFITA'10

53

A. Satsiou, L. Tassiulas

Reputation-Based Internet Sharing in Wireless Neighborhood Community Networks.

ICC'10

54

C. R. Perez-Toro, R. K. Panta, S. Bagchi

RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network.

SECON'10

55

L. Hong, W. Chen, L. Gao, G. Zhang, C. Fu

Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks.

ICFCC'10

56

A. Sterbini, M. Temperini

Social exchange and collaboration in a reputation-based educational system.

ITHET'10

57

X. H. Le, R. Sankar, M. Khalid, S. Lee

Public Key Cryptography-based Security Scheme for Wireless Sensor Networks in Healthcare.

ICUIMC'10

58

J. Ayuso, L. Marin, A. J. Jara, A. F. G. Skarmeta

Optimization of Public Key Cryptography (RSA and ECC) for 16-bits Devices based on 6LoWPAN.

SecIoT'10

59

R. Lu, X. Lin, X. Liang. X. (Sherman) Shen

An efficient and provably secure public key encryption scheme based on coding theory.

SCN 4(12):1440-1447

60

A. M. Jaafar, A. Samsudin

A New Public-Key Encryption Scheme Based on Non-Expansion Visual Cryptography and Boolean Operation.

IJCSI 7(2):1-10

61

Md. I. Salam, P. Kumar, H.-J. Lee

An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.

NCM'10

62

G. Duntao, H. Dawei, C. Haibin, Y. Xiaoyuan

A new public key encryption with temporary keyword search.

CMCE'10

63

E.Munivel, Dr G M Ajit

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks.

ICWCSC'10

64

T. Bonaci, L. Bushnell, R. Poovendran

Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach.

CDC'10

65

E. Kohno, T. Okazaki, M. Takeuchi, T. Ohta, Y. Kakuda, M. Aida

Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks.

UIC/ATC'10

66

W. Ding, Y. Yu, S. Yenduri

Distributed First Stage Detection for Node Capture.

GLOBECOM'10

67

P. Szczechowiak

Cryptographic Key Distribution In Wireless Sensor Networks Using Bilinear Pairings.

PhD Thesis

68

Y. Qiu, J. Zhou, J. Baek, J. Lopez

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.

Sensors 10(4):3718--3731

69

K. Yang, K. Zheng, Y. Yang, S. Guo

Pairing-Based Key Management Scheme for Heterogeneous Sensor Networks.

WiCOM'10

70

S. Md. M. Rahman, K. El-Khatib

Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions.

TPDS PP(99):1

71

G. Li, X. Liu, C. Wang

A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks.

ICNSC'10

72

S. J. Lee, I. G. Chun, W. T. Kim, S. M. Park

Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks.

ICTC'10

73

K. Zhang, C. Wang

A new Group Key Management Scheme with simple hash based authentication for wireless sensor networks.

ICCDA'10

74

J. Hu, E. Bai, Y. Yang

A novel key management scheme for hierarchical wireless sensor networks .

ICCT'10

75

S. Meibo, Y. Xiaoyuan, W. Lixian, Y. Heng

Key Management Scheme in WSN Based on Property of Circle.

CISE'10

76

M. M. Islam, M. M. Hassan, E.-N. Huh

Sensor Proxy Mobile IPv6 (SPMIPv6) - A framework of mobility supported IP-WSN.

ICCIT'10

77

M. Khanafer, M. Guennoun, H.T. Mouftah

Intrusion Detection System for WSN-Based Intelligent Transportation Systems.

GLOBECOM'10

78

P. Singaravelu, S. Verma

Viability of multivariate cryptosystems for WSN.

ICITST'10

79

A. S. Alkalbani, T. Mantoro, A. Md Tap

Comparison between RSA hardware and software implementation for WSNs security schemes.

ICT4M'10

80

H. Huang, S. Xiao, X. Meng, Y. Xiong

A Remote Home Security System Based on Wireless Sensor Network and GSM Technology.

NSWCTC'10

81

C. B. Margi, B. T. de Oliveira, G. T. de Sousa, M. A. Simplicio, P. S. L. M. Barreto, T. C. M. B. Carvalho, M. Näslund, R. Gold

Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds.

ICCCN'10

82

Q.-B. Chen, H.-J. Hu, Y.-L. Zhao, R. Chai

HIP-based network mobility management for WSN.

YCICT'10

83

P. Chapin, C. Skalka

SpartanRPC: Secure WSN middleware for cooperating domains.

MASS'10

84

H. Saxena, C. Ai, M. Valero, Y. Li, R. Beyah

DSF - A Distributed Security Framework for heterogeneous wireless sensor networks.

MILCOM'10

85

Y. Dong, H. Chang, Z. Zou, S. Tang

Energy aware routing algorithm for WSN applications in border surveillance.

THS'10

86

R.P. Kumar, T. Ravi

FFT based data perturbation method in WSN routing.

ICCIC'10

87

C.-W. Chiang, C.-C. Lin, R.-I. Chang

A new scheme of key distribution using implicit security in Wireless Sensor Networks.

ICACT'10

88

F.-C. Jiang, H.-W. Wu, D.-C. Huang, C.-H. Lin

Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques.

BWCCA'10

89

S. Chen, G. Yang, S. Chen

A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks.

CMC'10

90

R. Mzid, M. Boujelben, H. Youssef, M. Abid

Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography.

ICWUS'10

91

M.I. Salam, H.-J. Lee

A review on the PKC-based security architecture for wireless sensor networks.

ICCIT'10

92

S. Yang, J. Liu, C. Fan, X. Zhang, J. Zou

A new design of security wireless sensor network using efficient key management scheme.

ICNIDC'10

93

R. Chen

Research on security authentication of hierarchy distributed Wireless Sensor Network.

ICCAE'10

94

P. Szczechowiak, M. Scott, M. Collier

Securing wireless sensor networks: an identity-based cryptography approach.

IJSNET 8(11):182-192

95

S. Li, G. Zhou, F. Lei, Y. Zhao, B. Fu

Identity-Based Data Aggregation in Wireless Sensor Networks.

MVHI'10

96

H. Xiao, C. Hong-bing, Y. Geng

Identity-based authentication localization scheme for wireless sensor network.

97

S. Misra, A. Ghosh, A.P. Sagar P, M.S. Obaidat

Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints.

GreenCom-CPSCom'10

98

Z.-h. Qi, G. Yang, X.-y. Ren, Y.-w. Li

An ID-based ring signcryption scheme for wireless sensor networks.

IET-WSN'10

99

L.-P. Zhang, Y. Wang

An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks.

Journal of Communications 5(8)

100

Sk. Md. M. Rahman, K. El-Khatib

Private key agreement and secure communication for heterogeneous sensor networks.

JPDC 70(13):858--870

101

B. Patel, D. C. Jinwala

Investigating Identity Based Cryptography in Wireless Sensor Networks.

CNC'10

102

C. Krauß

Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection.

Journal IT'10

103

J.-W. Ho

A framework for robust detection and prevention of wide-spread node compromise in wireless sensor networks.

Ph.D. Thesis

104

G. de Meulenaer, F.-X. Standaert

Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks.

MOBILIGHT 45:229-242

105

T. Liqin, L. chuang

Computation and analysis of node intending trust in WSNs.

WCNIS'10

106

X. Jin, P. Putthapipat, D. Pan, N. Pissinou, S. K. Makki

Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN.

GLOBECOM'10

107

X. Wang, J. Li, X. Peng, B. Zou

Secure and Efficient Data Aggregation for Wireless Sensor Networks.

VTC'10f

108

R. Bista, H.-K. Yoo, J.-W. Chang

A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks.

CIT'10

109

R. Bista, K. Hee-Dae, J.-W. Chang

A New Private Data Aggregation Scheme for Wireless Sensor Networks.

CIT'10

110

S. Chen, G. Pierre, C.-H. Chi

Secure Data Aggregation Through Proactive Defense.

ICCCN'10

111

J. M. Bahiand, C. Guyeux, A. Makhoul

Secure Data Aggregation in Wireless Sensor Networks. Homomorphism versus Watermarking Approach.

ADHOCNETS'10

112

C. Li, F. Chen, Y. Zhan, L. Wang

Security Verification of Location Estimate in Wireless Sensor Networks.

WiCOM'10

113

S. Huang, S. Shieh

Authentication and secret search mechanisms for RFID-aware WSNs.

IJSN 5(1):15-25

 
114

Y.-K. Hsiao, R.-J. Hwang

An efficient secure data dissemination scheme for grid structure WSNs.

IJSN 5(1):26-34

 
115

C.-T. Hsueh, Y.-W. Li, C.-Y. Wen,  Y.-C. Ouyang

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks.

Sensors 10(2): 1251-1278

 
116

M. Li, W. Lou, K. Ren

Data security and privacy in wireless body area networks

IEEE Wireless Comm. 17(1): 51-58

 
117

H. Alzaid, D. Park, J. Gonzalez, C. Boyd, E. Foo

A Forward & Backward Secure Key Management in WSNs for PCS/ SCADA. A Revised Paper.

 Sensor Systems and Software

 
118

H. Alzaid, D. Park, J. Gonzalez, E. Foo

Mitigating Sandwich Attacks against a Secure Key Management Scheme in WSNs for PCS/SCADA.

AINA'10

119

H. Chen

Efficient compromising resilient authentication schemes for large scale WSNs.

WiSec'10

 
120

M. Wilhelm, I. Martinovic, J. B. Schmitt

Secret keys from entangled sensor motes: implementation and analysis

WiSec'10

 
121

Q. Mi, J. A. Stankovic, R. Stoleru

Secure walking GPS: a secure localization and key distribution
scheme for wireless sensor networks

WiSec'10

 
122

J. Ni, L. Zhou, C. V. Ravishankar

Dealing with random and selective attacks in wireless sensor systems

TOSN 6(2)

 
123

B. Carbunar, Y. Yu, W. Shi, M. Pearce, V. Vasudevan

Query privacy in wireless sensor networks

TOSN 6(2)

 
124

T. M. Vu, R. Safavi-Naini, C. Williamson

Securing WSNs against large-scale node capture attacks

ASIACCS

 
125

C.-K. Chu, J. K. Liu, J. Zhou, F. Bao , R. H. Deng

Practical ID-based encryption for wireless sensor network

ASIACCS

 
126

T. H. Hanh Le,  M. Takizawa

A Hybrid Technique for Efficient Medium Access Control in WSNs

AINA'10

 
127

P. Radmand, A. Talevski, S. Petersen, S. Carlsen

Taxonomy of WSN Cyber Security Attacks in the Oil and Gas Industries

AINA'10

 
128

J. Maerien, S. Michiels, C. Huygens, W. Joosen

MASY: MAnagement of Secret keYs for Federated Mobile WSNs.

Wimob'10

129

T. Inakota, M. U. Patil

Design and Implementation of Flexible Framework for Secure WSNs Applications

IJCSIS 8(3): 188-194

 
130

A. M. Raafat, M. Fathy, A. Yehia, M. A. Azer

Cooperation incentives in wireless Ad hoc networks

ICETC'10

 
131

N. Pham, R. K. Ganti, Y. S. Uddin, S. Nath, T. F. Abdelzaher

Privacy-preserving reconstruction of multidimensional data maps in vehicular participatory sensing

ESWN

 
132

W. Hu, H. Tan, P. Corke, W. C. Shih, S. Jha

Toward trusted wireless sensor networks.

TOSN 7(1)

 
133

C. Huygens, N. Matthys, W. Joosen

Optimized Resource Access Control in Shared Sensor Networks

MobiSec

134

J. K. Liu, J. Baek, J. Zhou, Y. Yang, J. W. Wong

Efficient online/offline identity-based signature for WSN

IJIS 9(4): 287-296

 
135

X. Li

Designing Localization Algorithms Robust to Signal Strength Attacks

SECON

 
136

G. Y. Keung, B. Li, Q. Zhang

The intrusion detection in mobile SN

MobiHoc

 
137

N. H. Azimi, H. Gupta, X. Hou, J. Gao

Data preservation under spatial failures in sensor networks

MobiHoc

 
138

B. Kong, H. Chen, X. Tang, K. Sezaki

Key Pre-Distribution Schemes for Large-Scale WSNs Using Hexagon Partition

WCNC

 
139

T. T. Dai, J. I. Agbinya

Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks

WCNC

 
140

A. Iqbal, M. Manzur Murshed

Attack-Resistant Sensor Localization under Realistic Wireless Signal Fading

WCNC

 
141

X. Xu, H. Jiang, L. Huang, H. Xu, M. Xiao

A Reputation-Based Revising Scheme for Localization in WSNs

WCNC

 
142

A. Clark, R. Poovendran

A Metric for Quantifying Key Exposure Vulnerability in WSNs.

WCNC

 
143

A. Fanian, M. Berenjkoub, H. Saidi, T. A. Gulliver

A Hybrid Key Establishment Protocol for Large Scale WSNs

WCNC

 
144

S. Guo, V. C. M. Leung

A Compromise-Resilient Group Rekeying Scheme for Hierarchical Wireless Sensor Networks

WCNC

 
145

X. Xiong, D. S. Wong, Xiaotie Deng

TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks

WCNC

 
146

R. Yasmin, E. Ritter, G. Wang

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

CIT

147

O. Cheikhrouhou, A. Koubâa, M. Boujelben, M. Abidm

A Lightweight User Authentication Scheme for Wireless Sensor Networks.

FT-ASN'10

148

O. Gaddour, A. Koubaa, O. Cheikhrouhou, M. Abid

Z-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor Networks.

SN'10

 
149

O. Cheikhrouhou, A. Koubâa, O. Gaddour, G. Dini, M. Abid

RiSeG: A Logical Ring Based Secure Group Communication Protocol for Wireless Sensor Networks.

ICWUS'10

 
150

O. Cheikhrouhou, M. Laurent, A. B. Abdallah, M. B. Jemaa

An EAP-EHash authentication method adapted to resource constrained terminals.

Annales of Télécommunications 65(5-6):271-284

 
151

B. Alomair, A. Clark, J. Cuellar, R. Poovendran

Statistical Framework for Source Anonymity in Sensor Networks.

GLOBECOM'10

 
152

B. Alomair, A. Clark, J. Cuellar, R. Poovendran

On Source Anonymity in Wireless Sensor Networks.

DSN'10

 
153

G. Zhan, W. Shi, J. Deng

TARF: A trust-aware routing framework for WSNs.

EWSN

 
2009        
1

W. Hu, P. Corke, W. C. Shih, and L. Overs.

secFleck: A Public Key Technology Platform for WSN.

EWSN 2009

2

I. Krontiris, Z. Benenson, T. Giannetsos, F. C. Freiling, T. Dimitriou.

Cooperative Intrusion Detection in WSNs.

EWSN 2009

 
3

Y. Oren, M. Feldhofer

A low-resource public-key identification scheme for RFID tags and sensor nodes.

WiSec 2009

 
4

I. Martinovic, P. Pichota, J. B. Schmitt.

Jamming for good: a fresh approach to authentic communication in WSNs.

WiSec 2009

 
5

R. Shokri, M. Poturals-ki, G. Ravot, P. Papadi-mitratos, J-P Hubaux.

A practical secure neighbor verification protocol for WSNs.

WiSec 2009

 
6

M. Jadliwala, Q. Duan, S. Upadhyaya, J. Xu.

Towards a theory for securing time synchronization in WSNs.

WiSec 2009

 
7

R. Di Pietro, C. Soriente, A. Spognardi, G. Tsudik.

Collaborative authentication in unattended WSNs.

WiSec 2009

 
8

H. Tan, D. Ostry, J. Zic, S. Jha.

A confidential and DoS-resistant multi-hop code dissemination protocol for WSNs.

WiSec 2009

 
9

E. De Cristofaro, J.-M. Bohli, D. Westhoff.

FAIR: fuzzy-based aggregation providing in-network resilience for real-time WSNs.

WiSec 2009

 
10

K. Sun, A. Liu, R. Xu, P. Ning, W. D. Maughan.

Securing network access in wireless sensor networks.

WiSec 2009

 
11

R. Roman, J. Lopez

Integrating WSNs and the Internet: A Security Analysis.

Internet Research, 19(2): 246-259

 
12

R. R. Brooks;  B. Pillai;  M. Pirretti; M. C. Weigle

Multicast Encryption Infrastructure for Security in Sensor Networks.

IJDSN 5(2): 139-157

 
13

R. A. Shaikh, Y.-K. Lee, S. Lee

Energy consumption analysis of  reputation-based trust management schemes for WSNs

ICUIMC'09

 
14

R. C. Chen, C.-F. Hsieh, Y.-F. Huang

A new method for intrusion detection on hierarchical WSNs.

ICUIMC'09

 
15

G. Wang, D. Choi, D. Kang

A lightweight key renewal scheme for clustered WSNs.

ICUIMC'09

 
16

Y. Sei, S. Honiden

Reporter node determination of replicated node detection.

ICUIMC'09

 
17

C. Huygens, W. Joosen

Federated and Shared Use of Sensor Networks through Security Middleware

ITNG'09

 
18

Y. Chen, K. Kleisouris, X. Li,  W. Trappe, R. P. Martin

A security and robustness performance analysis of localization algorithms to signal strength attacks.

TOSN 5(1)

 
19

Y. Law, M. Palaniswami, L. Hoesel, J. Doumen, P. Hartel, P.Havinga

Energy-efficient link-layer jamming attacks against WSNs MAC protocols.

TOSN 5(1)

 
20

M. Manulis, J. Schwenk

Security model and framework for information aggregation in WSNs.

TOSN 5(2)

 
21

C. Castelluccia, A. C.-F. Chan, E. Mykletun, G. Tsudik

Efficient and provably secure aggregation of encrypted data in wireless sensor networks.

TOSN 5(2)

 
22

O. Ugus, D. Westhoff, R. Laue, A. Shoufan, S.  Huss

Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for WSNs.

CoRR

 
23

R. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, Y.-J. Song

Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of WSNs.

Sensors 9(8): 5989-6007

 
24

J. Lopez, R. Roman, C. Alcaraz

Analysis of Security Threats, Requirements, Technologies and Standards in WSNs.

FOSAD

 
25

D.R. Raymond, R.C. Marchany, M.I. Brownfield, S.F. Midkiff.

Effects of Denial-of-Sleep Attacks on WSNs MAC
Protocols.

IEEE Trans. on Vehicular Technology 58(1): 367-380

 
26

P. Szczechowiak, A. Kargl, M. Scott, M. Collier

On the application of pairing based cryptography to WSNs

WISEC

 
27

M. T. Hansen

Asynchronous group key distribution on top of the cc2420 security mechanisms for WSNs

WISEC

 
28

O. Ugus, D. Westhoff, J.-M Bohli

A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme

WISEC

 
29

C. Ferguson, Q. Gu, H. Shi

Self-healing control flow protection in sensor applications

WISEC

 
30

P. Svenda, L. Sekanina, V. Matyas

Evolutionary design of secrecy amplification protocols for WSNs

WISEC

 
31

H. Alzaid, D. Park, J. Gonzalez, C. Boyd, E. Foo

A Forward & Backward Secure Key Management in WSNs for PCS/SCADA

SCUBE

32

R. Falk, H-J. Hof

Fighting Insomnia: A Secure Wake-Up Scheme for WSNs.

SECURWARE'09

 
33

D. F. Aranha, L. B. Oliveira, J. López and R. Dahab

NanoPBC: Implementing Cryptographic Pairings on an 8-bit Platform

CHiLE'09

34

D. F. Aranha, J. López, L. B. Oliveira and R. Dahab

 Efficient implementation of elliptic curves on sensor nodes.

CHiLE'09

35

J. Brodsky, A. McConnell

Jamming and Interference Induced Denial of Service Attacks on
IEEE 802.15.4 Based Wireless Networks

SCADA Security Scientific Symposium

 
36

H. Alzaid, S. Abanmi

A WSNs Test-bed for Wormhole Attacks.

JDCTA 3(3): 19-28

 
37

C.-M. Yu, C.-S. Lu, S.-Y. Kuo

A DoS-resilient en-route filtering scheme for WSNs

MobiHoc'09

 
38

C.-M. Yu, C.-S. Lu, S.-Y. Kuo

A Simple Non-Interactive Pairwise Key Establishment Scheme in WSNs.

SECON'09

39

C.-M. Yu, C.-S. Lu, S.-Y. Kuo

Efficient and Distributed Detection of Node Replication Attacks in Mobile WSNs

IEEE VTC'09

 
40

R. Shaikh, H. Jameel, B. J. d’Auriol 1, H. Lee, S. Lee, Y.-J. Song

Group-Based Trust Management Scheme for Clustered WSNs.

IEEE Transactions on 20(11): 1689-1712

 
41

T. Giannetsos, I. Krontiris, T. Dimitriou, F. Freiling

Intrusion Detection in WSNs.

Book Chapter

 
42

Q. Wang, T. Zhang

A Survey on Security in WSNs.

Book Chapter

 
43

I. Chatzigiannakis, E. Konstantinou

Key Establishment in WSNs.

Book Chapter

 
44

Y. Chen, H. Chen, W-S. Ku

Malicious Node Detection in Wireless Sensor Networks.

Book Chapter

 
45

A. Mpitziopoulos, D. Gavalas,
C. Konstantopoulos, G. Pantziou

Jamming in Wireless Sensor Networks.

Book Chapter

 
46

Aldar C.-F. Chan

Concealed Data Aggregation for Wireless Sensor Networks.

Book Chapter

 
47

A. K. Pathan, C. S. Hong

Weakly connected dominating set-based secure clustering and operation in distributed sensor networks

IJCNDS 3(2):175-195

 
48

R. Roman, J. Lopez, C. Alcaraz.

Do WSNs Need to be Completely Integrated into the Internet?

IoPTS

49

E. Sabbah, K.-D. Kang

Security in Wireless Sensor Networks.

Book Chapter

 
50

Y. W. Law, M. Palaniswami

Key Management in WSNs.

Book Chapter

 
51

J. Jaworski, M. Ren, K. Rybarczyk

Random key predistribution for WSNs using deployment knowledge

Computing 85(1-2):57-76

 
52

T. Naeem, K.-K. Loo

Common Security Issues and Challenges in WSNs and IEEE 802-11 WMNs.

JDCTA 3(1): 88-93

 
53

Md. Moniruzzaman, Md. J. Arafeen, S. Bose

Detection of Cloned Node Using RM, LSN, SET, Bloom Filter and AICN Protocol and Comparing Their Performances

JDCTA 3(3): 103-108

 
54

M. A. Simplicio Jr., P. d'A. F. F. S. Barbuda, P. S. L. M. Barreto, T. C. M. B. Carvalho, C. B. Margi

The MARVIN message authentication code and the LETTERSOUP authenticated
encryption scheme.

Security & Comm. Networks 2(2): 165-180

 
55

M. Boujelben, O. Cheikhrouhou, H. Youssef, M. Abid

A Pairing Identity based Key Management Protocol for Heterogeneous Wireless Sensor Networks.

N2S'09

 
56

M. Boujelben, O. Cheikhrouhou, H. Youssef, M. Abid

Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks.

SENSORCOMM'09

 
57

O. Cheikhrouhou, M. Boujelben, A. Koubaa, M. Abid

Attacks and Improvement of Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme.

AICCSA'09

 
58

H. Chen

Task-based Trust Management for Wireless Sensor Networks.

International Journal of Security and its Applications

 
59

Y. Chen,J. Shu,S. Zhang,L. Liu,L. Sun

Data Fusion in Wireless Sensor Networks.

ISECS'09

 
60

S. Ozdemir, Y. Xiao

Secure data aggregation in wireless sensor networks: A comprehensive overview.

Book Chapter

 
61

O. Cheikhrouhou, M. Laurent, A. B. Abdallah, M. B. Jemaa

An EAP-EHash authentication method adapted to resource constrained terminals.

Annals of telecommunications 65(5):271-284

 
2008        
1

S. Capkun and J.-P. Hubaux.

Secure positioning in wireless networks.

 IEEE TMC, 7(4):470–483

   
2

Q. Li, Y.-C. Hu, M. Zhao, A. Perrig, J. Walker, and W. Trappe.

SEAR: a secure efficient ad hoc on demand routing protocol for wireless network.

ASIACCS 2008

 
3

H. Alzaid, E. Foo, and J. M. Gonzalez Nieto.

Secure data aggregation in WSNs: a survey.

AISC 2008

4

A. Seshadri, M. Luk, A. Perrig

SAKE: Software Attestation for Key Establishment in WSNs

DCOSS 2008

 
5

W. Wang, J. Kong, B. K. Bhargava, and M. Gerla.

Visualization of wormholes in underwater sensor networks: a distributed approach.

IJSN, 3(1):10–23

 
6

X. Cui, Q. Li, B. Zhao.

An Association Model of Sensor Properties for Event Diffusion Spotting Sensor Networks.

APWeb 2008

 
7

A. Liu, P. Ning.

TinyECC: A Configurable Library for Elliptic Curve Cryptography in WSNs.

IPSN 2008

 
8

Q. Li, Y-C. Hu, M. Zhao, A. Perrig, J. Walker, W. Trappe.

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.

ASIACCS 2008

 
9

S. Hyun, P. Ning, A. Liu, W. Du.

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks.

IPSN 2008

 
10

J. Dong, K. E. Ackermann, B. Bavar, C. Nita-Rotaru.

Mitigating attacks against virtual coordinate based routing in WSNs.

WiSec 2008

 
11

A. Liu, Y-H. Oh, P. Ning

Secure and DoS-Resistant Code Dissemination in WSNs Using Seluge.

IPSN 2008

 
12

Q. Dong, D. Liu, P. Ning

Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in WSNs.

WiSec 2008

 
13

H. Alzaid, S. Abanmi, S. Kanhere, and C. T. Chou.

BANAID: a sensor network testbed for wormhole attacks.

AusCERT 2008

14

Q. Zhang, T. Yu, P. Ning.

A Framework for Identifying Compromised Nodes in WSNs

ACM TISSEC 11(3):1-37

 
15

P. Ning, A. Liu, W. Du.

Mitigating DoS attacks against broadcast authentication in wireless sensor networks.

ACM TOSN 4(1):1-35

 
16

C. Kuo, A. Studer, A. Perrig.

Mind your manners: socially appropriate wireless key establishment for groups

WiSec 2008

 
17

D. Liu, P. Ning, W. Du.

Group-based key predistribution for WSNs.

ACM TOSN 4(2):1-30

 
18

Y. Yang, S. Zhu, G. Cao.

Improving sensor network immunity under worm attacks: a software diversity approach.

MobiHoc 2008

 
19

R. Roman, J. Lopez, S. Gritzalis.

Situation Awareness Mechanisms for Wireless Sensor Networks.

IEEE Communications Magazine 46(4): 102-107

 
20

H. Alzaid, E. Foo, J. M. Gonzalez Nieto.

RSDA: Reputation-based Secure Data Aggregation in WSNs.

SeNAmI 2008

   
21

M. Shao, Y. Yang, S. Zhu, G. Cao.

Towards Statistically Strong Source Anonymity for WSNs.

Infocom

   
22

Y. Yang, X. Wang, S. Zhu, G. Cao.

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.

TISSEC 11(4)

   
23

R. Roman, J. Lopez.

KeyLED - Transmitting sensitive data over out-of-band channels in WSNs.

IEEE WSNS

 
24

C. Krauß, M. Schneider, C. Eckert.

Defending against false-endorsement-based dos attacks in WSNs

WiSec 2008

 
25

B. Driessen, A. Poschmann, C. Paar.

Comparison of innovative signature algorithms for WSNs.

WiSec 2008

 
26

 K. B. Frikken, J. A. Dougherty IV.

An efficient integrity-preserving scheme for hierarchical sensor aggregation.

WiSec 2008

 
27

Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, G. Cao.

Towards event source unobservability with minimum network traffic in WSNs.

WiSec 2008

 
28

D. K. Nilsson, T. Roosta, U. Lindqvist, A. Valdes.

Key management and secure software updates in wireless process control environments.

WiSec 2008

 
29

Y. Hanna, H. Rajan, W. Zhang.

SLEDE: a domain-specific verification framework for sensor network security protocol implementations.

WiSec 2008

 
30

J. Wu, D. R. Stinson.

Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor

WiSec 2008

 
31

C. C. Tan, H. Wang, S. Zhong, Q. Li.

Body sensor network security: an identity-based cryptography approach.

WiSec 2008

 
32

J-M. Bohli, A. Hessler, O. Ugus, D. Westhoff.

A secure and resilient WSN roadside architecture for intelligent transport systems.

WiSec 2008

 
33

M. Conti, R. D. Pietro, L. V. Mancini, A. Mei.

Emergent properties: detection of the node-capture attack in mobile WSNs.

WiSec 2008

 
34

H. Alzaid, M. Alfaraj

MASA: End-to-End data security in sensor networks using a mix of asymmetric and symmetric approaches

NTMS 2008

 
35

A. Francillon, C. Castelluccia

Code injection attacks on Harvard-architecture devices.

ACM CCS 2008

36

K. Yadav, K. Sharma, M. Ghose

Wireless Sensor Networks Security: A New Approach.

ADCOM

 
37

A. Chung, U. Roedig 

DHB-KEY: An Efficient Key Distribution Scheme for WSNs.

WSNS 2008

 
38

D. Galindo, R. Roman, J. Lopez

A Killer Application for Pairings: Authenticated Key Establishment in Underwater WSNs

CANS 2008

39

L. Mostarda, A.Navarra

Distributed Intrusion Detection Systems for Enhancing Security in Mobile WSNs.

IJDSN 4(2): 83-109

 
40

J. Yin, S. K. Madria 

ESecRout: An Energy Efficient Secure Routing for WSNs.

IJDSN 4(2): 67-82

 
41

S. Rajasegarar, C. Leckie, M. Palaniswami

Anomaly Detection in Wireless Sensor Networks.

IEEE Wireless Comm.  15(4): 34-40

 
42

S. Rajasegarar, C. Leckie, M. Palaniswami

CESVM: Centred Hyperellipsoid-al Support Vector Machine Based Anomaly Detection.

IEEE ICC 2008

 
43

M. Takruri, S. Rajasegarar, S. Challa, C. Leckie, M. Palaniswami

Online Drift Correction in Wireless Sensor Networks Using Spatio-Temporal Modeling.

Fusion 2008

 
44

R.A. Shaikh, H. Jameel, B. J. d'Auriol, S. Lee, Y. J. Song, H. Lee

Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detect-ion Schemes of WSNs.

ICYCS

45

R.A. Shaikh, H.Jameel,  B. J. d'Auriol, S. Lee, Y. J. Song, H. Lee

Network Level Privacy for Wireless Sensor Networks.

IAS 2008

 
46

V. C. Giruka, M. Singhal, J. Royalty, S. Varanasi

Security in wireless sensor networks.

Wireless Comm. & Mobile Comp.:8(1):1-24

 
47

E. Sabbah, K.-D. Kang, N. Abu-Ghazaleh,  A. Majeed, K. Liu

An application-driven approach to designing secure WSNs.

Wireless Comm. & Mobile Comp.:8(3):369-384

 
48

J. Zhang, V.  Varadharajan

A New Security Scheme for Wireless Sensor Networks.

GLOBECOM

 
49

H. Shafiei, A. Mehdizadeh, A. Khonsari, M. Ould-Khaoua

A Combinatorial Approach for Key-Distribution in WSNs.

GLOBECOM

 
50

L.B. Oliveira, M. Scott, J. Lopez, R. Dahab

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in WSNs

INSS

 
51

S. R. Afzal, S. Biswas, J-b. Koh, T. Raza, G. Lee, D-k. Kim

RSRP: A Robust Secure Routing Protocol for Mobile Ad hoc Networks

WCNC

 
52

C.-M. Yu, T.-Y. Chi, C.-S. Lu, S.-Y. Kuo

A constrained random perturbation vector-based pairwise key establishment scheme for WSNs.

MobiHoc

 
53

C.-M. Yu, C.-S. Lu, S.-Y. Kuo

Mobile Sensor Network Resilient Against Node Replication Attacks

SECON

 
54

X. Du and H.-H. Chen

Security in Wireless Sensor Networks.

IEEE Wireless Communications 15(4): 60-66

 
55

F. Stajano, D. Cvrcek, M. Lewis

Steel, Cast Iron and Concrete: Security Engineering for Real World WSNs.

ACNS

 
56

F. Dressler

Authenticated Reliable and Semi-reliable Communication in WSNs

I. J. Network Security 7(1): 61-68

 
57

A. K. Das

ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks

I. J. Network Security 7(1): 358-369

 
58

G. d. Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira

On the Energy Cost of Communication and Cryptography in WSNs

WiMob

 
59

S. K. Dhurandher, S. Misra,  M. S. Obaidat, N. Gupta

QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for WSNs Using Ant Colony Optimization

WiMob

 
60

S. Misra, K. I. Abraham, M. S. Obaidat, P. V. Krishna

Intrusion Detection in WSNs: The S-Model Learning Automata Approach

WiMob

 
61

S. M. M. Rahman, N. Nasser, Kassem Saleh

Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous WSNs

WiMob

 
62

I. Krontiris, T. Giannetsos, T. Dimitriou

Launching a Sinkhole Attack in WSNs; The Intruder Side

WiMob

 
63

M. Boujelben, H. Youssef, M. Abid

An Efficient Scheme for Key Pre-distribution in WSNs

WiMob

 
64

F. Kausar, M. Q. Saeed , A. Masood

Key Management and Secure Routing in Heterogeneous Sensor Networks

WiMob

 
65

D. A. Knox, T. Kunz

RF Fingerprints for Secure Authentication in Single-Hop WSN

WiMob

 
66

C. Kraus, M. Schneider, C. Eckert

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs

WiMob

 
67

F. N.-Abdesselam, B. Bensaou, T. Taleb

Detecting and Avoiding Wormhole Attacks in WSNs

IEEE Comm. Magazine 46(4): 127-132

 
68

M. A. Simplicio Jr.,  P. S. L. M. Barreto, T. C. M. B. Carvalho, C. B. Margi, M. Naslund

The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking

PiLBA'08

 
69

K. Ren, W. Lou, Y. Zhang

LEDS:Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks

IEEE Transactions on Mobile Computing 7(5):585-598

 
70

P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, R. Dahab

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks.

EWSN'08

 
71

L. Cambacedes, P. Sitbon

Cryptographic Key Management for SCADA Systems-Issues and Perspectives.

ISA2008

 
72

A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, M. Cardei

Reputation and Trust-Based Systems for Ad Hoc and Sensor Networks.

Book chapter

 
73

S. Ganeriwal, L. Balzano, M. Srivastava

Reputation-based framework for high integrity sensor networks.

New York

 
74

Y. Ren, A. Boukerche

Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks.

ICC'08

 
75

S. Zdemir

Functional reputation based reliable data aggregation and transmission for wireless sensor networks.

Computer Communications 31(17):3941-3953

 
76

M. M. Haque, A. K. Pathan, C. S. Hong

Securing U-Healthcare WSNs using Public Key Based Scheme.

CoRR

 
77

A. K. Pathan, C. S. Hong

Feasibility of PKC in Resource-Constrained WSNs.

ICCIT

 
78

M. M. Haque, A. K. Pathan, C. S. Hong, E.-n. Huh

An Asymmetric Key-Based Security Architecture for WSNs.

TIIS

 
79

A. K. Pathan, C. S. Hong

SERP: secure energy-efficient routing protocol for densely deployed WSNs.

annals of Telecommunications

 
80

R. Castro

Application-Driven Security in Wireless Sensor Networks.

BLV. LOUIS PASTEUR, 35. 29071 MALAGA

 
81

A. Lyer, S. Kulkarni, V. Mhatre,  C. Rosenberg

A Taxonomy-based Approach to Design of Large-scale Sensor Networks.

New York, USA

 
82

C. Krau, M. Schneider, C. Eckert

On Handling Insider Attacks in Wireless Sensor Networks.

ISTR 13(3):165-172

 
83

J. Yick, B. Mukherjee, D. Ghosal

Wireless sensor network survey.

CA 95616

 
84

P. Haghani ,P. Papadimitratos, M. Poturalski, K. Aberer, J.-P.  Hubaux

Efficient and Robust Secure Aggregation for Sensor Networks.

IEEE ICNP Workshop on Secure Network Protocols

 
85

S. Setia, S. Roy, S. Jajodia

Secure Data Aggregation in Wireless Sensor Networks.

Book chapter

 
86

S. Zdemir

Functional Reputation Based Data Aggregation for Wireless SensorNetworks

WiMob'08

 
87

Z. Yao, D. Kim, Y. Doh

PLUS: parameterised localised trust management-based security framework for sensor networks.

IJSNET 3(4):224-236

 
88

A. Boukerche, Y. Ren

A trust-based security system for ubiquitous and pervasive computing environments.

Computer Communications 31(18):4343-4351

 
89

A. Srinivasan, F. Li, J. Wu

A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks.

ICDCS'08

 
90

H. Chen, H. Wu ,J. Hu, C. Gao, H. Wu, J. Hu

Agent-Based Trust Management Model for Wireless Sensor Networks.

MUE'08

 
91

D. Xiao, J. Feng, H. Zhang

A formal reputation system for trusting wireless sensor network.

WUJONS 13(2):173-179

 
92

R. Roman, C. Fernadez-Gago, J. Lopez, H. H. Chen

Trust and Reputation Systems for Wireless Sensor Networks.

Book chapter

 
2007            
1

R. Maheshwari, J. Gao, and S. R. Das.

Detecting wormhole attacks in wireless networks using connectivity information.

INFOCOM 2007

 
2

Q. Dong and D. Liu.

Using auxiliary sensors for pairwise key establishment in WSNs.

Networking 4479 of LNCS: 251–262.

 
3

M. Luk, G. Mezzour, A. Perrig, V. D. Gligor.

MiniSec: a secure sensor network communication architecture.

IPSN 2007

 
4

C. Kuo, M. Luk, R. Negi, A. Perrig.

Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes.

SenSys 2007

5

H. Chan, A. Perrig, B. Przydatek, D. X. Song.

SIA: Secure information aggregation in sensor networks.

Computer Security 15(1): 69-102

 
6

R. Muraleedharan, Y. Yan, and L. A. Osadciw.

Detecting sybil attacks in image sensor network using cognitive intelligence.

Sensor and Actor Networks, pages 59–60.

 
7

M. Onen and R. Molva.

Secure data aggregation with multiple encryption.

EWSN, v. 4373 of LNCS, pages 117–132.

 
8

A. Srinivasan and J. Wu.

A survey on secure localization in wireless sensor networks

Book Chapter

   
9

M. C. Fernandez-Gago, R. Roman, J. Lopez

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.

SecPerU 2007

10

L. Uhsadel, A. Poschmann, and C. Paar.

Enabling full-size public-key algorithms on 8-bit sensor nodes.

ESAS, volume 4572 of LNCS, pages 73–86.

 
11

K. Wu, D. Dreef, B. Sun, and Y. Xiao.

Secure data aggregation without persistent cryptographic operations in WSNs.

Ad Hoc Networks, 5(1):100–111

 
12

W. Zhang, M. Tran, S. Zhu, and G. Cao.

A random perturbation-based scheme for pairwise key establishment in WSNs.

MobiHoc, pages 90–99.

 
13

R. Roman, M. C. Fernandez-Gago, J. Lopez.

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices.

Autonomics 2007

14

R. Roman, C. Alcaraz.

Applicability of Public Key Infrastructures in Wireless Sensor Networks.

EuroPKI'07

15

R. Roman, C. Alcaraz. J. Lopez.

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.

MONET 12(4): 231-244

 
16

S. Zhu, S. Setia, S. Jajodia, and P. Ning.

Interleaved hop-by-hop authentication against false data inject-ion attacks in sensor networks.

TOSN, 3(3)

 
17

R. Roman, C. Alcaraz,
J. Lopez.

The role of WSNs in the area of Critical Information Infrastructure Protection.

Information Security Technical Report, 12(1): 24-31

 
18

T. Zia, A. Zomaya, N. Ababneh.

Evaluation of Overheads in Security Mechanisms in WSNs.

SENSORCOMM

 
19

T. Zia, A. Zomaya

Secure Localization in Wireless Sensor Networks.

AsiaCSN

 
20

T. Zia, A. Zomaya

A Malicious Node Detection Mechanism in WSNs.

ICONS

21

M. Shao, S. Zhu, W. Zhang, G. Cao.

pDCS: Security and Privacy Supp-ort for Data-Centric WSNs.

INFOCOM

 
22

Y. Yang, X. Wang, S. Zhu, G. Cao

Distributed Software-based Attestation for Node Compromise Detection in WSNs.

SRDS

 
23

H. Song, S. Zhu, G. Cao.

Attack-Resilient Time Synchronization for WSNs.

Ad Hoc Networks 5 (1): 112-125

 
24

P. Traynor, R. Kumar,  H. Choi, G. Cao, S. Zhu, T. F. La Porta.

Efficient Hybrid Security Mechanisms for Heterogeneous WSNs.

IEEE Transactions on Mobile Computing 6(6):663-677

 
25

B. Panja, S. K. Madria,   B. K. Bhargava

Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks.

IJDSN 3(2):201-223

 
26

R. R. Brooks, P. Y. Govindaraju,  M. Pirretti, N, Vijaykrishnan,  M, T. Kandemir

On the detection of clones in WSNs using random key predistribution.

IEEE Transaction 37(6):1246-1258

 
27

R. R. Brooks, B. Pillai, M. C. Weigle, M. Pirretti

Optimal layout of multicast groups using network embedded multicast security in ad hoc sensor networks.

IJDSN 3(3):273-287

 
28

S. Rajasegarar, C. Leckie, M. Palaniswami, J. Bezdek

Quarter Sphere Based Distributed Anomaly Detection in WSNs.

IEEE ICC'07

 
29

S. Rajasegarar, J. Bezdek, C. Leckie and M. Palaniswami

Analysis of Anomalies in IBRL Data from a Wireless Sensor Network Deployment.

SENSORCOMM'07

 
30

C.-C. Chang, S. Muftic, D. Nagel

Measurement of Energy Costs of Security in Wireless Sensor Nodes.

ICCCN

 
31

S. D. Oliveira, H. C. Wong, J. M. S. Nogueira

NEKAP: Intruder Resilient and Energy Efficient Key Establishment in WSNs.

ICCCN

 
32

M. Klonowski, M. Kutylowski, M. Ren, K. Rybarczyk

Forward-Secure Key Evolution in Wireless Sensor Networks.

CANS

 
33

M. Healy, T. Newe, E. Lewis

Resources Implications for Data Security in Wireless Sensor Network Nodes.

SensorComm

 
34

S. Al-Wakeel, S. Al-Swailemm

PRSA: A Path Redundancy Based Security Algorithm for WSNS.

WCNC

 
35

P. S. L. M. Barreto, M. A. Simplício Jr.

CURUPIRA, a block cipher for constrained platforms.

SBRC'07

 
36

L.B. Oliveira, R. Dahab ,J. Lopez, F. Daguano ,A . F. Loureiro

Identity-Based encryption for sensor networks.

PERCOMW '07

 
37

C. Fontaine, F. Galand

A survey of homomorphic encryption for non-specialists.

EURASIP '07

 
38

M.M. Woolfson, M.S. Woolfson

Mathematics for Physics.

Book Chapter

 
39

E. Cayirci, T. Coplu

SENDROM: Sensor networks for disaster relief operations management.

WN 13(3):409-423

 
40

I. Khalil, S. Bagchi, N.Shroff

LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.

journal Computer Networks

 
41

A. Josang, R. Ismail, C. Boyd

A survey of trust and reputation systems for online service provision.

DSS 43(2):618-644

 
42

A. Boukerche, L. Xu, K. El-Khatib

Trust-based security for wireless ad hoc and sensor networks.

journal Computer Communications

 
43

H. Chen,H. Wu,X. ZhouC. Gao

Reputation-based Trust in Wireless Sensor Networks.

MUE'07

 
44

S. Peter,K. Piotrowski, P. Langendoerfer

On Concealed Data Aggregation for Wireless Sensor Networks.

CCNC'07

 
45

G.V. Crosby, N. Pissinou

Cluster-Based Reputation and Trust for Wireless Sensor Networks.

CCNC'07

 
46

A. K. Pathan, J. H. Ryu, M. M. Haque, C. S. Hong

Security Management in WSNs with a Public Key Based Scheme.

APNOMS

 
47

A. K. Pathan, M. M. Haque, C. S. Hong

A Secure Lightweight Approach of Node Membership Verification in Dense HDSN.

MILCOM

 
48

M. M. Haque, A. K. Pathan, B. G. Choi, C. S. Hong

An Efficient PKC-Based Security Architecture for WSNs.

MILCOM

 
49

A. K. Pathan, C. S. Hong

A Secure Energy-Efficient Routing Protocol for WSNs.

ISPA

 
50

A. K. Pathan, C. S. Hong

Securing Sensor Reports in Wireless Sensor Networks.

Euro-Par

 
2006            
1

S. Capkun and J.-P. Hubaux.

Secure positioning in wireless networks.

IEEE Journal on Selected Areas in Communications, 24(2):221–232

 
2

H. Chan, A. Perrig, and D. Song.

Secure hierarchical in-network aggregation in sensor networks.

ACM CCS 2006

 
3

M. Demirbas and Y. Song.

An RSSI-based scheme for sybil attack detection in WSNs.

WOWMOM ’06

 
4

W. Du, L. Fang, and P. Ning.

LAD: Localization anomaly detection for wireless sensor networks.

J. Parallel Distrib. Comput., 66(7):874–886

 
5

M. Gorlatova.

Review of existing wormhole attack discovery techniques.

Technical Report ADA462894, OTTAWA University,

 
6

Y.-C. Hu, A. Perrig, and D. B. Johnson.

Wormhole attacks in wireless networks.

IEEE Journal on Selected Areas in Communications, 24(2):370–380

 
7

T. Li, Y. Wu, and H. Zhu.

An efficient scheme for encrypted data aggregation on sensor networks.

VTC Spring,

 
8

D. Mukhopadhyay and I. Saha.

Location verification based defense against sybil attack in sensor networks.

ICDCN, v.4308 of LNCS, pages 509–521.

 
9

P. Papadimitratos, Z. J. Haas, and J.-P. Hubaux.

How to specify and how to prove correctness of secure routing protocols for MANET.

BROADNETS.

 
10

B. Parno, M. Luk, E. Gaustad, and A. Perrig.

Secure sensor network routing: a clean-slate approach.

CoNEXT

 
11

W. Wang, B. K. Bhargava, Y. Lu, and X. Wu.

Defending against wormhole attacks in mobile ad hoc networks.

Wireless Communications and Mobile Computing, 6:483–503

 
12

D. Westhoff, J. Girao, and M. Acharya.

Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation.

IEEE Transactions on Mobile Computing, 05(10):1417–1431

 
13

A. D. Wood, L. Fang, J. A. Stankovic, and T. He.

SIGF: A family of configurable, secure routing protocols for WSNs.

SASN

 
14

J.-H. Yun, I.-H. Kim, J.-H. Lim, and S.-W. Seo.

WODEM: Wormhole attack defense mechanism in wireless sensor networks.

ICUCT, v.4412 of LNCS, pages 200–209.

 
15

S. Zhu, S. Setia, and S. Jajodia.

LEAP: Efficient security mechanisms for large-scale distributed sensor networks.

TOSN, 2(4):500–528

 
16

B. Awerbuch, R. G. Cole, R. Curtmola, D. Holmer, and H. Rubens.

Dynamics of learning algorithms for the on-demand secure byzantine routing protocol.

ESAS 2006

 
17

Y. Yang, X. Wang, S. Zhu, and G. Cao.

SDAP: a secure hop-by-hop data aggregation protocol for sensor networks.

MobiHoc 2006

 
18

L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede.

Low-cost elliptic curve cryptography for wireless sensor networks.

ESAS 2006

 
19

S. Capkun, M. Cagalj, and M. B. Srivastava.

Secure localization with hidden and mobile base stations.

INFOCOM

 
20

P. Traynor, H. Choi, G. Cao, S. Zhu, and T. L. Porta.

Establishing pairwise keys in heterogeneous sensor networks.

INFOCOM

 
21 T. Zia and A. Y. Zomaya. Security Issues in Wireless Sensor Networks.

ICSNC 2006

 
22 T. Zia and A. Y. Zomaya. A Secure Triple-Key Management Scheme for WSNs

INFOCOM

 
23

Y. Sang, H. Shen, Y. Inoguchi, Y. Tan, and N. Xiong.

Secure data aggregation in WSNs: A survey.

PDCAT ’06

 
24

C. Alcaraz, R. Roman.

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.

CRITIS 2006

25

J. López, J. A. Montenegro, R. Roman

Service-Oriented Security Architecture for CII based on Sensor Networks.

SecPerU 2006

26

R. Roman, J. Zhou, J. López.

Applying Intrusion Detection Systems to WSNs.

CCNC 2006

27

J. López.

Unleashing public-key cryptography in wireless sensor networks.

Journal of Comp. Sec. 14(5): 469-482

 
28

T. Zia, A. Zomaya

A Security Frameowrk for Wireless Sensor Networks.

SAS06

29

C. E. Loo, M. Y. Ng,       C. Leckie, M. Palaniswami

Intrusion Detection for Routing Attacks in Sensor Networks.

IJDSN 2(4):313-332

 
30

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. McDaniel, M. T. Kandemir,
R. R. Brooks

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence.

IJDSN 2(3):267-287

 
31

S. Rajasegarar, C. Leckie, M. Palaniswami, J. Bezdek

Distributed Anomaly Detection in WSNs.

IEEE ICCS 2006

 
32

R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, Y. J. Song

Trust Management Problem in Distributed WSNs

RTCSA'06

33

R. A. Shaikh, S. Lee, M. A. Khan, Y. Jae Song

LSec: Lightweight Security Protocol for Distributed WSNs.

PWC

 
34

H. Alzaid, S. Abanmi, S. Kanhere, C.T. Chou

Detecting Wormhole Attack in Wireless Sensor Network.

Technical Report

 
35

A. K. Pathan, T. T. Dai, C. S. Hong

A Key Management Scheme with Encoding and Improved Security for WSNs.

ICDCIT

 
36

T. T. Dai, A. K. Pathan, C. S. Hong

A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for WSNs

APNOMS

 
37

A. K. Pathan, C. S. Hong

A Key- Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN

HPCC

 
38

A. K. Pathan, T. T. Dai, C. S. Hong

An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in WSNs.

CIT

 
39

A. K. Pathan, C. S. Hong

Secure Clustering in DSN with Key Predistribution and WCDS.

CoRR

 
40

A. K. Pathan, H.-W. Lee, C. S. Hong

Security in Wireless Sensor Networks: Issues and Challenges

CoRR

 
41

M. Ren, T. Kanti Das, J. Zhou

Diverging Keys in WSNs.

ICS

 
42

S. Mauw, I. Vessem, B. Bos

Forward Secure Communication in WSNs

SPC

 
43

J. P. Walters, Z. Liang, W. Shi, V. Chaudhary

Wireless Sensor Network Security: A Survey

book chapter

 
44

M. Vieiral, A. Cunha, D. Silva

Designing Wireless Sensor Nodes.

SAMOS'06

 
45

A. Wadda, K. Jones, S.Olariu, M. Elthweissy

A scalable solution for securing wireless sensor networks..

 

 
46

J. Deng, R. Han, S. Mishra

INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks.

Computer Communications, 29(2):216–230

 
47

H. Cam, S. Ozdemir, P.Nair, D.Muthuavinashiappan, H.Ozgur Sanli

Energy-efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks.

Book chapter

 
48

W. T. Teacy, J. Patel, N.R. Jennings, M. Luck

TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources.

AAAMS 12 (2):183-198

 
49

Y. Wang, G. Attebury,
B. Ramamurthy

A survey of security issues in wireless sensor networks.

IEEE Communications Surveys and Tutorials

 
50

Y. Sun, Z. Han, W. Yu, K. J. Liu

A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.

IEEE Computer and Communications Societies

 
51

J. Arango, A. Efrat, S.Ramasubramanian, S. Pink

Retransmission and Backoff Strategies for Broadcasting in Multi-hop Wireless Networks.

BROADNETS 2006

 
52

R. Dawson, C. Boyd, E. Dawson, J. Nieto

SKMA: a key management architecture for SCADA systems.

AusGrid'06

 
53

E. Mykletun, J. Girao, D. hoff

Public key based cryptoschemes for data concealment in wireless sensor networks.

ICC'06

 
54

A. Becher, Z. Benenson,
M. Dornseif

Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.

SIPC 3934:104-118

 
55

E.Change, T. Dillon , F. K. Hussain

Trust and Reputation for Service-Oriented Environments

book chapter

 
56

S. Galbraith, K. Paterson,
N. Smart

Pairings for cryptographers.

 

 
57

T. He, P. Vicaire , T. Yan, L. Luo, L.Gu, G. Zhou, R. Stoleru, Q. Cao, J. A. Stankovic, T. F. Abdelzaher

Achieving Real-Time Target Tracking Using Wireless Sensor Networks.

RTAS'06

 
58

Y. Law, J. Doumen, P. H. Harte

Survey and benchmark of block ciphers for wireless sensor
networks.

TOSN

 
59

A. Milenkovic, C. Otto, E.  Jovanov

Wireless sensor networks for personal health monitoring: Issues and an implementation.

Computer Communications, 29(13-14):2521–2533

 
60

K. Ren, W. Lou, Y. Zhang

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.

IEEE

 
61

T. Roosta, S. Shieh, S. Sastry

Taxonomy of Security Attacks in Sensor Networks.

SIRI'06

 
62

R. Rajagopalan, P. K. Varshney

Data aggregation techniques in sensor networks: A survey.

IEEE Communications Surveys and Tutorials

 
63

B. Schneier

Who Owns Your Computer?.

 

 
64

A. Srinivasan, J. Teitelbaum, J.  Wu

DRBTS: Distributed Reputation-based Beacon Trust System.

DASC'06

 
65

O. Younis, M. Krunz, S. Ramasubramanian

Node clustering in wireless sensor networks: recent developments
and deployment challenges.

IEEE Network

 
2005

     
1

E.-O. Blaß and M. Zitterbart.

Towards acceptable public-key encryption in sensor networks.

IWUC

 
2

W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili.

A pairwise key predistribution scheme for WSNS.

ACM TISSEC, 8(2):228–258

 
3

W. Du, L. Fang, and P. Ning.

LAD: Localization anomaly detection for  WSNs.

IPDPS

 
4

H. Eberle, A. Wander, N. Gura, S. C. Shantz, and V. Gupta.

Architectural extensions for elliptic curve cryptography over gf(2^m) on 8-bit microprocessors.

ASAP

 
5

G. Gaubatz, J. P. Kaps, E. Ozturk, and B. Sunar.

State of the art in ultra-low power public key cryptography for wireless sensor networks.

PerCom 2005

 
6

V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz.

SIZZLE: A standards-based end-to-end security architecture for the embedded internet.

PerCom 2005

 
7

F. Hu and N. K. Sharma.

Security considerations in ad hoc sensor networks.

Ad Hoc Networks, 3(1):69–89

 
8

Y.C. Hu, A. Perrig, and D. B. Johnson.

ARIADNE: A secure on-demand routing protocol for ad hoc networks.

Wireless Networks, 11(1-2):21–38

 
9

L. Lazos and R. Poovendran.

SERLOC: Robust localization for wireless sensor networks.

TOSN, 1(1):73–100

 
10

D. Liu, P. Ning, and W. Du.

Detecting malicious beacon nodes for secure location discovery in WSNs.

ICDCS

 
11

D. Liu, P. Ning, and R. Li.

Establishing pairwise keys in distributed sensor networks.

 ACM Trans. Inf. Syst. Secur., 8(1):41–77,

 
12

S. Capkun and J.P. Hubaux.

Secure positioning of wireless devices with application to sensor networks.

INFOCOM

 
13

H. Chan and A. Perrig.

PIKE: peer intermediaries for key establishment in WSNs.

INFOCOM

 
14

L. Fang, W. Du, and P. Ning.

A beacon-less location discovery scheme for WSNs.

INFOCOM

 
15

Z. Li, W. Trappe, Y. Zhang, and B. Nath.

Robust statistical methods for securing wireless localization in sensor networks.

IPSN

 
16

D. Liu, P. Ning, and W. Du.

Attack-resistant location estimation in sensor networks.

IPSN

 
17

J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter.

Detection of denial-of-message attacks on sensor network broadcasts.

IEEE Symposium on Security and Privacy (S&P 2005)

 
18

B. Parno, A. Perrig, and V. D. Gligor.

Distributed detection of node replication attacks in sensor networks.

IEEE Symposium on Security and Privacy (S&P 2005)

 
19

Q. Zhang, P. Wang, D. S. Reeves, and P. Ning.

Defending against sybil attacks in sensor networks.

ICDCS

 
20

R. Roman, J. Zhou, J. Lopez.

On the Security of WSNs.

ICCSA

21

D. Carman

New Directions in Sensor Network Key Management.

IJDSN 1(1): 3-15

 
22

A. Wander, N. Gura, H. Eberle, V. Gupta, S. C. Shantz

Energy Analysis of Public-Key Cryptography for WSNs

PerCom

 
23

Y. W. Law, P. J.M. Havinga

How to Secure a WSN.

ISSNIP

 
24        
2004

     
1

R. J. Anderson, H. Chan, and A. Perrig.

Key infection: Smart trust for smart dust.

ICNP

 
2

L. Hu and D. Evans.

Using directional antennas to prevent wormhole attacks.

NDSS

 
3

Y. C. Hu and A. Perrig.

A Survey of Secure Wireless Ad Hoc Routing.

IEEE Security and Privacy, 2(3):28–39

 
4

C. Karlof, N. Sastry, and D. Wagner.

TinySec: a link layer security architecture for WSNs.

SenSys

 
5

A. Mahimkar and T. S. Rappaport.

SecureDAV: A secure data aggregation and verification protocol for sensor networks.

Global Telecomm. Conference, 4:2175–2179

 
6

D. Malan.

Crypto for tiny objects.

Technical Report TR-04-04, Harvard University

 
7

D. Malan, M. Welsh, and M. Smith.

A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography

IEEE SECON 2004

 
8

T. L. Martin, M. S. Hsiao, D. S. Ha, and J. Krishnaswami.

Denial-of-service attacks on battery-powered mobile computers.

PerCom

 
9

J. Newsome, E. Shi, D. X. Song, and A. Perrig.

The sybil attack in sensor networks: analysis & defenses.

IPSN

 
10

A. Perrig, J. A. Stankovic, and D. Wagner.

Security in wireless sensor networks.

Commun. ACM, 47(6):53–57,

 
11

H. O. Sanli, S. Ozdemir, and H. Cam.

SRDA: Secure Reference-Based Data Aggregation Protocol for WSNs.

VTC2004-Fall

 
12

G. Gaubatz, J.-P. Kaps, and B. Sunar.

Public key cryptography in sensor networks - revisited.

ESAS 2004

 
13

J. Hwang and Y. Kim.

Revisiting random key pre-distribution schemes for WSN.

SASN 2004

 
14

P. Jadia and A. Mathuria.

Efficient secure aggregation in sensor networks.

HiPC

 
15

L. Lazos and R. Poovendran.

SeRLoc: secure range-independent localization for wireless sensor networks.

ACM Workshop on Wireless Security

 
16

N. Sastry and D. Wagner.

Security considerations for ieee 802.15.4 networks.

ACM Workshop on Wireless Security

 
17

D. Wagner.

Resilient aggregation in WSNs.

SASN 2004

 
18

W. Wang and B. K. Bhargava.

Visualization of wormholes in sensor networks.

ACM Workshop on Wireless Security

 
19

S. Schmidt, H. Krahn, S. Fischer, and D. Watjen.

A security architecture for mobile WSNs.

Sec. in Ad-hoc and Sensor Net., ESAS

 
20

X. Wang, L. Yang, and K. Chen.

SDD: Secure distributed diffusion protocol for sensor networks.

Security in Ad-hoc and Sensor Networks, ESAS 2004

 
21

R. J.Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus.

TinyPK: securing sensor networks with public key technology.

SASN 2004

 
22

D. E. Culler, D. Estrin, M. B. Srivastava

Guest Editors' Introduction: Overview of Sensor Networks

IEEE Computer 37(8): 41-49

 
23

A. Agah, A.K. Das, K. Basu

A game theory based approach for security in WSNs

PCCC

 
24        
2003            
1

S. Zhu, S. Xu, S. Setia, and S. Jajodia.

Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach.

ICNP

 
2

S. Zhu, S. Setia, and S. Jajodia.

LEAP: efficient security mechanisms for large-scale distributed sensor networks.

ACM Conference on Computer and Communications Security

 
3

C. Karlof and D.Wagner.

Secure routing in WSNs: attacks and countermeasures.

Ad Hoc Networks, 1(2-3):293–315

 
4

K. Jones, A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy.

Towards a new paradigm for securing WSNs.

NSPW

 
5

Y.-C. Hu, A. Perrig, D. B. Johnson.

Packet leashes: A defense against wormhole attacks in wireless networks.

INFOCOM

 
6

P. Ganesan, R. Venugopalan, P. Peddabachagari, A. G. Dean, F. Mueller, M. L. Sichitiu.

Analyzing and modeling encryption overhead for sensor network nodes.

Wireless Sensor Networks and Applications

 
7

W. Du, J. Deng, Y. S. Han, P. Varshney.

A witness-based approach for data fusion assurance in WSN.

GLOBECOM, 3:1435– 1439

 
8

J. Deng, R. Han, S. Mishra.

A performance evaluation of intrusion-tolerant routing in wireless sensor networks.

LNCS-IPSN, 2634:349–364  
9

Y.-C. Hu, D. B. Johnson, A. Perrig.

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks.

Ad Hoc Networks, 1(1):175–192  
10

H. Chan, A. Perrig, D. X. Song.

Random key predistribution schemes for sensor networks.

IEEE Symposium on Security and Privacy  
11

M. Bohge W. Trappe.

An authentication framework for hierarchical ad hoc sensor networks.

ACM Workshop on Wireless Security  
12

J. Deng, R. Han, S. Mishra.

Security support for in-network processing in WSNs.

SASN 2003  
13

D. Liu, P. Ning.

Location-based pairwise key establishments for static sensor networks.

SASN 2003  
14

R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, P. J. M. Havinga.

LKHW: A directed diffusion-based secure multicast scheme for WSNs.

ICPP Workshops  
15

R. D. Pietro, L. V. Mancini, A. Mei.

Random key-assignment for secure WSNs.

SASN 2003  
16

B. Przydatek, D. X. Song, A. Perrig.

SIA: Secure information aggregation in WSNs.

SenSys 2003  
17

S. Tanachaiwiwat, P. Dave, R. Bhindwale, A. Helmy.

Secure locations: routing on trust and isolating compromised sensors in location-aware WSNs.

SenSys 2003  
18

N. Sastry, U. Shankar, D. Wagner.

Secure verification of location claims.

ACM Workshop on Wireless Security  
19

L. Hu, D. Evans.

Secure aggregation for wireless network.

SAINT  
20

C.-Y. Chong, S.P. Kumar

Sensor networks: evolution, opportunities, and challenges

IEEE 91(8): 1247-1256  
21

H. Chan, A. Perrig

Security and Privacy in Sensor Networks

IEEE Computer 36(10): 103-105  
22

R. Venugopalan, P. Ganesan, P. Peddabachagari, A. G. Dean, F. Mueller, M. L. Sichitiu

Encryption overhead in embedded systems and sensor network nodes: modeling and analysis

CASES  
2002

       
1

S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava.

On communication security in wireless ad-hoc sensor networks.

WETICE  
2

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer.

A secure routing protocol for ad hoc networks.

ICNP  
3

L. Eschenauer and V. D. Gligor.

A key-management scheme for distributed WSNs.

ACM Conference on Comp. and Comm. Security  
4

A. D. Wood and J. A. Stankovic.

Denial of service in sensor networks.

IEEE Computer, 35(10):54–62  
5

B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens.

An on-demand secure routing protocol resilient to byzantine failures.

ACM Workshop on Wireless Security.  
6

S. D. Servetto and G. Barrenechea.

Constrained random walks on random graphs: routing algorithms for large scale WSNs.

1st ACM Inter. Workshop on WSN and App.  
7

D. Braginsky and D. Estrin.

Rumor routing algorithm for sensor networks.

1st ACM Inter. Workshop on WSNs and App.  
8

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci

Wireless sensor networks: a survey.

Computer Networks 38(4): 393-422  
2001

       
             
2000            
1

M. Chen, W. Cui, V. Wen, and A. Woo.

Security and deployment issues in a sensor network

   
2

D. Carman, P. Kruus, and B. Matt.

Constraints and approaches for distributed sensor network security.

Technical Report 00-010, NAI Labs  
1999            
1

F. Stajano and R. J. Anderson.

The resurrecting duckling: Security issues for ad-hoc wireless networks.

Security Protocols Workshop, v. 1796 of LNCS, p. 172–194.  
2

L. Zhou and Z. J. Haas.

Securing ad hoc networks.

IEEE Network, 13(6):24–30  

 

 

free webpage hit counter

Copyright © Hani Alzaid. All rights reserved.