[1] Lidong Zhou and Zygmunt J. Haas. Securing
ad hoc networks. IEEE Network, 13(6):24-30, 1999.
[2] Frank Stajano and Ross J.
Anderson. The resurrecting duckling: Security issues for ad-hoc
wireless networks. In Bruce Christianson, Bruno Crispo, James A.
Malcolm, and Michael Roe, editors, Security Protocols Workshop,
volume 1796 of Lecture Notes in Computer Science, pages 172-194.
Springer, 1999.
[3] M. Chen, W. Cui, V. Wen,
and A. Woo. Security and deployment issues in a sensor network,
2000.
[4] David Carman, Peter Kruus,
and Brian Matt. Constraints and approaches for distributed sensor
network security. Technical Report 00-010, NAI Labs, 2000.
[5] Sasha Slijepcevic, Miodrag
Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, and Mani B. Srivastava.
On communication security in wireless ad-hoc sensor networks. In
WETICE, pages 139-144. IEEE Computer Society, 2002.
[6] Adrian Perrig, John A. Stankovic, and David Wagner. Security in
wireless sensor networks. Comm.. ACM, 47(6):53-57, 2004.
[7] Naveen Sastry and David
Wagner. Security considerations for ieee 802.15.4 networks. In
Jakobsson and Perrig [126], pages 32-42.
[8] Fei Hu and Neeraj K.
Sharma. Security considerations in ad hoc sensor networks. Ad Hoc
Networks, 3(1):69-89, 2005.
[9] K. Jones, Ashraf Wadaa,
Stephan Olariu, Larry Wilson, and Mohamed Eltoweissy. Towards a new
paradigm for securing wireless sensor networks. In Christian
Hempelmann and Victor Raskin, editors, NSPW, pages 115-121. ACM,
2003.
[10] Tanveer Zia and Albert Y.
Zomaya. A secure triple-key management scheme for wireless sensor
networks. In INFOCOM [127].
[11] Rodrigo Roman, M. Carmen
Fernández Gago, and Javier Lopez. A survey on the applicability of
trust management systems for wireless sensor networks. In
Proceedings of the 3rd International Workshop on Security, Privacy
and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007),
pages 25-30, Istanbul, Turkey, 2007. IEEE.
[12] Rodrigo Roman, Cristina
Alcaraz, and Javier Lopez. A survey of cryptographic primitives and
implementations for hardware-constrained sensor network nodes.
MONET, 12(4):231-244, 2007.
[13] Rodrigo Roman, M. Carmen
Fernández Gago, and Javier Lopez. Featuring trust and reputation
management systems for constrained hardware devices. In F. Davide,
editor, Autonomics, volume 302 of ACM International Conference
Proceeding Series, page 6. ACM, 2007.
[14] Rodrigo Roman, Jianying
Zhou, and Javier Lopez. On the security of wireless sensor networks.
In Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganŕ,
Heow Pueh Lee, Youngsong Mun, David Taniar, and Chih Jeng Kenneth
Tan, editors, ICCSA (3), volume 3482 of Lecture Notes in Computer
Science, pages 681-690. Springer, 2005.
[15] Rodrigo Roman, Cristina
Alcaraz, and Javier Lopez. The role of wireless sensor networks in
the area of critical information infrastructure protection.
Information Security Technical Report, 12(1):24-31, 2007.
[16] Tanveer Zia and Albert
Zomaya. A security framework for wireless sensor networks. In In the
proceedings of the IEEE Sensors Applications Symposium (SAS06),
pages 49-53, Houston, Texas, 2007. IEEE.
[17] Chris Karlof and David
Wagner. Secure routing in wireless sensor networks: attacks and
countermeasures. Ad Hoc Networks, 1(2-3):293-315, 2003.
[18] Yih Chun Hu and Adrian
Perrig. A survey of secure wireless ad hoc routing. IEEE Security
and Privacy, 2(3):28-39, 2004.
[19] Hani Alzaid, Ernest Foo,
and Juan Manuel Gonzalez Nieto. Secure data aggregation in wireless
sensor network: a survey. In Ljiljana Brankovic and Mirka Miller,
editors, Sixth Australasian Information Security Conference (AISC
2008), volume 81 of CRPIT, pages 93-105, Wollongong, NSW, Australia,
2008. ACS.
[20] Yingpeng Sang, Hong Shen,
Yasushi Inoguchi, Yasuo Tan, and Naixue Xiong. Secure data
aggregation in wireless sensor networks: A survey. In Proceedings of
the Seventh International Conference on Parallel and Distributed
Computing, Applications and Technologies (PDCAT '06), pages 315-320,
Washington, DC, USA, 2006. IEEE Computer Society.
[21] Avinash Srinivasan and
Jie Wu. A survey on secure localization in wireless sensor networks,
2007.
[22] Tanveer Zia and Albert
Zomaya. Secure localization in wireless sensor networks. In In the
proceedings of the Asian Conference on Communication Systems and
Networks (AsiaCSN 2007), pages -, Phuket, Thailand, 2007.
[23] Lejla Batina, Nele
Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede.
Low-cost elliptic curve cryptography for wireless sensor networks.
In Buttyán et al. [128], pages 6-17.
[24] Erik-Oliver Bla˙ and
Martina Zitterbart. Towards acceptable public-key encryption in
sensor networks. In Soraya Kouadri Mostéfaoui and Zakaria Maamar,
editors, IWUC, pages 88-93. INSTICC Press, 2005.
[25] Leif Uhsadel, Axel
Poschmann, and Christof Paar. Enabling full-size public-key
algorithms on 8-bit sensor nodes. In Frank Stajano, Catherine
Meadows, Srdjan Capkun, and Tyler Moore, editors, ESAS, volume 4572
of Lecture Notes in Computer Science, pages 73-86. Springer, 2007.
[26] Ronald J. Watro, Derrick
Kong, Sue fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus.
Tinypk: securing sensor networks with public key technology. In
Setia and Swarup [129], pages 59-64.
[27] Mathias Bohge and Wade
Trappe. An authentication framework for hierarchical ad hoc sensor
networks. In Maughan and Perrig [130], pages 79-87.
[28] Gunnar Gaubatz,
Jens-Peter Kaps, and Berk Sunar. Public key cryptography in sensor
networks - revisited. In Castelluccia et al. [131], pages 2-18.
[29] David Malan. Crypto for
tiny objects. Technical Report TR-04-04, Harvard University, 2004.
[30] D. Malan, M. Welsh, and
M. Smith. A public-key infrastructure for key distribution in tinyOS
based on elliptic curve cryptography, 2004.
[31] G. Gaubatz, J. P. Kaps,
E. Ozturk, and B. Sunar. State of the art in ultra-low power public
key cryptography for wireless sensor networks. In Pervasive
Computing and Communications Workshops, 2005. PerCom 2005 Workshops.
Third IEEE International Conference on, pages 146-150, 2005.
[32] Vipul Gupta, Matthew
Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling
Chang Shantz. Sizzle: A standards-based end-to-end security
architecture for the embedded internet (best paper). In PerCom,
pages 247-256. IEEE Computer Society, 2005.
[33] Hans Eberle, Arvinderpal
Wander, Nils Gura, Sheueling Chang Shantz, and Vipul Gupta.
Architectural extensions for elliptic curve cryptography over gf(2m)
on 8-bit microprocessors. In ASAP, pages 343-349. IEEE Computer
Society, 2005.
[34] Javier Lopez. Unleashing
public-key cryptography in wireless sensor networks. Journal of
Computer Security, 14(5):469-482, 2006.
[35] An Liu and Peng Ning.
Tinyecc: A configurable library for elliptic curve cryptography in
wireless sensor networks. In IPSN, pages 245-256. IEEE Computer
Society, 2008.
[36] Chris Karlof, Naveen
Sastry, and David Wagner. Tinysec: a link layer security
architecture for wireless sensor networks. In John A. Stankovic,
Anish Arora, and Ramesh Govindan, editors, SenSys, pages 162-175.
ACM, 2004.
[37] Stefan Schmidt, Holger
Krahn, Stefan Fischer, and Dietmar Wätjen. A security architecture
for mobile wireless sensor networks. In Castelluccia et al. [131],
pages 166-177.
[38] Prasanth Ganesan, Ramnath
Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank
Mueller, and Mihail L. Sichitiu. Analyzing and modeling encryption
overhead for sensor network nodes. In C. S. Raghavendra, Krishna M.
Sivalingam, Ramesh Govindan, and Parmesh Ramanathan, editors,
Wireless Sensor Networks and Applications, pages 151-159. ACM, 2003.
[39] H. Ozagur Sanli, Suat
Ozdemir, and Hassan Cam. SRDA: Secure Reference-Based Data
Aggregation Protocol for Wireless Sensor Networks. In VTC2004-Fall,
pages 4650- 4654, 2004.
[40] Kui Wu, Dennis Dreef, Bo
Sun, and Yang Xiao. Secure data aggregation without persistent
cryptographic operations in wireless sensor networks. Ad Hoc
Networks, 5(1):100-111, 2007.
[41] Ajay Mahimkar and
Theodore S. Rappaport. SecureDAV: A secure data aggregation and
verication protocol for sensor networks. In Global
Telecommunications Conference, volume 4, pages 2175-2179, 2004.
[42] Haowen Chan, Adrian
Perrig, and Dawn Song. Secure hierarchical in network aggregation in
sensor networks. In ACM Conference on Computer and Communications
Security, pages 278-287, 2006.
[43] Pawan Jadia and Anish
Mathuria. Efficient secure aggregation in sensor networks. In HiPC,
pages 40-49, 2004.
[44] Melek Önen and Rek Molva.
Secure data aggregation with multiple encryption. In Koen Langendoen
and Thiemo Voigt, editors, EWSN, volume 4373 of Lecture Notes in
Computer Science, pages 117-132. Springer, 2007.
[45] Lingxuan Hu and David
Evans. Secure aggregation for wireless network. In SAINT Workshops
[132], pages 384-394.
[46] Wenliang Du, Jing Deng,
Yunghsiang S. Han, and Pramod Varshney. A witness-based approach for
data fusion assurance in wireless sensor networks. In IEEE Global
Communications Conference (GLOBECOM), volume 3, pages 1435- 1439,
2003.
[47] Bartosz Przydatek, Dawn
Xiaodong Song, and Adrian Perrig. SIA: Secure information
aggregation in sensor networks. In Akyildiz et al. [133], pages
255-265.
[48] David Wagner. Resilient
aggregation in sensor networks. In Setia and Swarup [129], pages
78-87.
[49] Dirk Westho, Joao Girao,
and Mithun Acharya. Concealed data aggregation for reverse multicast
traffic in sensor networks: Encryption, key distribution, and routing
adaptation. IEEE Transactions on Mobile Computing, 05(10):1417-1431,
2006.
[50] Sencun Zhu, Sanjeev Setia,
Sushil Jajodia, and Peng Ning. Interleaved hop-by-hop authentication
against false data injection attacks in sensor networks. TOSN, 3(3),
2007.
[51] Yi Yang, Xinran Wang,
Sencun Zhu, and Guohong Cao. SDAP: : a secure hop-by-hop data
aggregation protocol for sensor networks. In Palazzo et al. [134],
pages 356-367.
[52] Tieyan Li, Yongdong Wu,
and Huafei Zhu. An efficient scheme for encrypted data aggregation
on sensor networks. In VTC Spring, pages 831-835. IEEE, 2006.
[53] Jing Deng, Richard Han,
and Shivakant Mishra. Security support for in network processing in
wireless sensor networks. In Setia and Swarup [135], pages 83-93.
[54] Haowen Chan, Adrian
Perrig, Bartosz Przydatek, and Dawn Xiaodong Song. SIA: secure
information aggregation in sensor networks. Journal of Computer
Security, 15(1):69-102, 2007.
[55] Sergio D. Servetto and
Guillermo Barrenechea. Constrained random walks on random graphs:
routing algorithms for large scale wireless sensor networks. In
Raghavendra and Sivalingam [136], pages 12-21.
[56] David Braginsky and
Deborah Estrin. Rumor routing algorithm for sensor networks. In
Raghavendra and Sivalingam [136], pages 22-31.
[57] Baruch Awerbuch, David
Holmer, Cristina Nita-Rotaru, and Herbert Rubens. An on-demand
secure routing protocol resilient to byzantine failures. In W.
Douglas Maughan and Nitin H. Vaidya, editors, Workshop on Wireless
Security, pages 21-30. ACM, 2002.
[58] Baruch Awerbuch, Robert
G. Cole, Reza Curtmola, David Holmer, and Herbert Rubens. Dynamics
of learning algorithms for the on-demand secure byzantine routing
protocol. In Buttyán et al. [128], pages 98-112.
[59] Qing Li, Yih-Chun Hu,
Meiyuan Zhao, Adrian Perrig, Jesse Walker, and Wade Trappe. Sear: a
secure e-cient ad hoc on demand routing protocol for wireless
networks. In Abe and Gligor [137], pages 201-204.
[60] Bryan Parno, Mark Luk,
Evan Gaustad, and Adrian Perrig. Secure sensor network routing: a
clean-slate approach. In Christophe Diot and Mostafa H. Ammar,
editors, CoNEXT, page 11. ACM, 2006.
[61] Yih-Chun Hu, Adrian
Perrig, and David B. Johnson. Ariadne: A secure on-demand routing
protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38,
2005.
[62] Yih-Chun Hu, David B.
Johnson, and Adrian Perrig. Sead: secure efficient distance vector
routing for mobile wireless ad hoc networks. Ad Hoc Networks,
1(1):175-192, 2003.
[63] Panagiotis Papadimitratos,
Zygmunt J. Haas, and Jean-Pierre Hubaux. How to specify and how to
prove correctness of secure routing protocols for manet. In
BROADNETS. IEEE, 2006.
[64] Panagiotis Papadimitratos
and Zygmunt J. Haas. Secure link state routing for mobile ad hoc
networks. In SAINT Workshops [132], pages 379-383.
[65] Kimaya Sanzgiri, Bridget
Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M.
Belding-Royer. A secure routing protocol for ad hoc networks. In
ICNP, pages 78-89. IEEE Computer Society, 2002.
[66] Alec Woo, Terence Tong,
and David E. Culler. Taming the underlying challenges of reliable
multihop routing in sensor networks. In Akyildiz et al. [133], pages
14-27.
[67] Jing Deng, Richard Han,
and Shivakant Mishra. A performance evaluation of intrusion-tolerant
routing in wireless sensor networks. In Feng Zhao and Leonidas J.
Guibas, editors, IPSN, volume 2634 of Lecture Notes in Computer
Science, pages 349-364. Springer, 2003.
[68] Jing Deng, Richard Han,
and Shivakant Mishra. Insens: Intrusion tolerant routing for
wireless sensor networks. Computer Communications, 29(2):216-230,
2006.
[69] Xiaoyun Wang, Lizhen
Yang, and Kefei Chen. Sdd: Secure distributed diffusion protocol for
sensor networks. In Castelluccia et al. [131], pages 205-214.
[70] Anthony D. Wood, Lei
Fang, John A. Stankovic, and Tian He. Sigf: a family of
configurable, secure routing protocols for wireless sensor networks.
In Sencun Zhu and Donggang Liu, editors, SASN, pages 35-48. ACM,
2006.
[71] Qing Li, Yih-Chun Hu,
Meiyuan Zhao, Adrian Perrig, Jesse Walker, and Wade Trappe. Sear: a
secure e-cient ad hoc on demand routing protocol for wireless
networks. In Abe and Gligor [137], pages 201-204.
[72] James Newsome, Elaine
Shi, Dawn Xiaodong Song, and Adrian Perrig. The sybil attack in
sensor networks: analysis & defenses. In Kannan Ramchandran, Janos
Sztipanovits, Jennifer C. Hou, and Thrasyvoulos N. Pappas, editors,
IPSN, pages 259-268. ACM, 2004.
[73] Qinghua Zhang, Pan Wang,
Douglas S. Reeves, and Peng Ning. Defending against sybil attacks in
sensor networks. In ICDCS Workshops, pages 185-191. IEEE Computer
Society, 2005.
[74] Murat Demirbas and
Youngwhan Song. An rssi-based scheme for sybil attack detection in
wireless sensor networks. In WOWMOM '06: Proceedings of the 2006
International Symposium on on World of Wireless, Mobile and
Multimedia Networks, pages 564-570, Washington, DC, USA, 2006. IEEE
Computer Society.
[75] Rajani Muraleedharan,
Yanjun Yan, and Lisa Ann Osadciw. Detecting sybil attacks in image
senor network using cognitive intelligence. In Silvia Giordano,
Stephan Olariu, and David Simplot-Ryl, editors, Sensor and Actor
Networks, pages 59-60. ACM, 2007.
[76] Debapriyay Mukhopadhyay
and Indranil Saha. Location verification based defense against sybil
attack in sensor networks. In Soma Chaudhuri, Samir R. Das, Himadri
S. Paul, and Srikanta Tirthapura, editors, ICDCN, volume 4308 of
Lecture Notes in Computer Science, pages 509-521. Springer, 2006.
[77] Weichao Wang, Jiejun
Kong, Bharat K. Bhargava, and Mario Gerla. Visualisation of
wormholes in underwater sensor networks: a distributed approach.
IJSN, 3(1):10-23, 2008.
[78] Weichao Wang, Bharat K.
Bhargava, Yi Lu, and Xiaoxin Wu. Defending against wormhole attacks
in mobile ad hoc networks. Wireless Communications and Mobile
Computing, 6:483-503, 2006.
[79] Weichao Wang and Bharat
K. Bhargava. Visualization of wormholes in sensor networks. In
Jakobsson and Perrig [126], pages 51-60.
[80] Maria Gorlatova. Review
of existing wormhole attack discovery techniques. Technical Report
ADA462894, OTTAWA University, 2006.
[81] Ji-Hoon Yun, Il-Hwan Kim,
Jae-Han Lim, and Seung-Woo Seo. Wodem: Wormhole attack defense
mechanism in wireless sensor networks. In Frank Stajano, Hyoung
Joong Kim, Jong-Suk Chae, and Seong-Dong Kim, editors, ICUCT, volume
4412 of Lecture Notes in Computer Science, pages 200-209. Springer,
2006.
[82] Ritesh Maheshwari, Jie
Gao, and Samir R. Das. Detecting wormhole attacks in wireless
networks using connectivity information. In INFOCOM, pages 107-115.
IEEE, 2007.
[83] Yih-Chun Hu, Adrian
Perrig, and David B. Johnson. Wormhole attacks in wireless networks.
IEEE Journal on Selected Areas in Communications, 24(2):370-380,
2006.
[84] Yih-Chun Hu, Adrian
Perrig, and David B. Johnson. Packet leashes: A defense against
wormhole attacks in wireless networks. In INFOCOM, 2003.
[85] Lingxuan Hu and David
Evans. Using directional antennas to prevent wormhole attacks. In
NDSS. The Internet Society, 2004.
[86] Hani Alzaid, Suhail
Abanmi, Salil Kanhere, and Chun Tung Chou. BANAID: a sensor network
testbed for wormhole attacks. In AusCERT, 2008.
[87] Anthony D. Wood and John
A. Stankovic. Denial of service in sensor networks. IEEE Computer,
35(10):54-62, 2002.
[88] Thomas L. Martin, Michael
S. Hsiao, Dong S. Ha, and Jayan Krishnaswami. Denial-of-service
attacks on battery-powered mobile computers. In PerCom, pages
309-318. IEEE Computer Society, 2004.
[89] Jonathan M. McCune,
Elaine Shi, Adrian Perrig, and Michael K. Reiter. Detection of
denial-of-message attacks on sensor network broadcasts. In IEEE
Symposium on Security and Privacy [138], pages 64-78.
[90] Peng Ning, An Liu, and
Wenliang Du. Mitigating dos attacks against broadcast authentication
in wireless sensor networks. TOSN, 4(1):1-35, 2008.
[91] Qi Dong, Donggang Liu,
and Peng Ning. Pre-authentication filters: providing dos resistance
for signature-based broadcast authentication in sensor networks. In
Virgil D. Gligor, Jean-Pierre Hubaux, and Radha Poovendran, editors,
WISEC, pages 2-12. ACM, 2008.
[92] Bryan Parno, Adrian
Perrig, and Virgil D. Gligor. Distributed detection of node
replication attacks in sensor networks. In IEEE Symposium on
Security and Privacy [138], pages 49-63.
[93] Yi Yang, Xinran Wang,
Sencun Zhu, and Guohong Cao. Distributed software-based attestation
for node compromise detection in sensor networks. In SRDS, pages
219-230. IEEE Computer Society, 2007.
[94] Tanveer Zia and Albert
Zomaya. A malicious node detection mechanism in wireless sensor
networks. In In the proceedings of the International Conference on
Network Security (ICONS 2007), pages 273-281, Erode, India, 2007.
[95] Qing Zhang, Ting Yu, and
Peng Ning. A framework for identifying compromised nodes in wireless
sensor networks. ACM Transactions on Information System Security (TISSEC).,
11(3):1-37.
[96] Laurent Eschenauer and
Virgil D. Gligor. A key-management scheme for distributed sensor
networks. In Vijayalakshmi Atluri, editor, ACM Conference on
Computer and Communications Security, pages 41-47. ACM, 2002.
[97] Haowen Chan, Adrian
Perrig, and Dawn Xiaodong Song. Random key predistribution schemes
for sensor networks. In IEEE Symposium on Security and Privacy, pages
197-. IEEE Computer Society, 2003.
[98] Roberto Di Pietro, Luigi
V. Mancini, and Alessandro Mei. Random key assignment for secure wireless sensor
networks. In Setia and Swarup [135], pages 62-71.
[99] Donggang Liu and Peng
Ning. Location-based pairwise key establishments for static sensor networks. In
Setia and Swarup [135], pages 72-82.
[100] Qi Dong and Donggang
Liu. Using auxiliary sensors for pairwise key establishment in wsn. In Ian F. Akyildiz,
Raghupathy Sivakumar, Eylem Ekici, Jaudelice Cavalcante de
Oliveira, and Janise McNair, editors, Networking, volume 4479 of
Lecture Notes in Computer Science, pages 251-262. Springer, 2007.
[101] Donggang Liu, Peng Ning,
and Rongfang Li. Establishing pairwise keys in distributed sensor
networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, 2005.
[102] Wensheng Zhang, Minh
Tran, Sencun Zhu, and Guohong Cao. A random perturbation-based scheme for
pairwise key establishment in sensor networks. In Evangelos Kranakis,
Elizabeth M. Belding, and Eytan Modiano, editors, MobiHoc, pages 90-99.
ACM, 2007.
[103] Patrick Traynor, Heesook
Choi, Guohong Cao, Sencun Zhu, and Tom La Porta. Establishing pair-wise
keys in heterogeneous sensor networks. In INFOCOM [127].
[104] Sencun Zhu, Shouhuai Xu,
Sanjeev Setia, and Sushil Jajodia. Establishing pairwise keys for secure
communication in ad hoc networks: A probabilistic approach. In ICNP, pages
326-335. IEEE Computer Society, 2003.
[105] Wenliang Du, Jing Deng,
Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram
Khalili. A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur., 8(2):228-258, 2005.
[106] Wenliang Du, Jing Deng,
Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney. A key
management scheme for wireless sensor networks using deployment knowledge. In
INFOCOM, 2004.
[107] Ross J. Anderson, Haowen
Chan, and Adrian Perrig. Key infection: Smart trust for smart dust. In ICNP,
pages 206-215. IEEE Computer Society, 2004.
[108] Joengmin Hwang and
Yongdae Kim. Revisiting random key predistribution schemes for wireless sensor
networks. In Setia and Swarup [129], pages 43-52.
[109] Haowen Chan and Adrian
Perrig. Pike: peer intermediaries for key establishment in sensor networks. In INFOCOM
[139], pages 524-535.
[110] Roberto Di Pietro, Luigi
V. Mancini, Yee Wei Law, Sandro Etalle, and Paul J. M. Havinga. Lkhw: A
directed diusion-based secure multicast scheme for wireless sensor
networks. In ICPP Workshops, pages 397-. IEEE Computer Society, 2003.
[111] Sencun Zhu, Sanjeev
Setia, and Sushil Jajodia. LEAP: Efficient security mechanisms for large-scale
distributed sensor networks. TOSN, 2(4):500- 528, 2006.
[112] Sencun Zhu, Sanjeev
Setia, and Sushil Jajodia. Leap: efficient security mechanisms for large-scale
distributed sensor networks. In Sushil Jajodia, Vijayalakshmi Atluri, and
Trent Jaeger, editors, ACM Conference on Computer and Communications
Security, pages 62-72. ACM, 2003.
[113] Naveen Sastry, Umesh
Shankar, and David Wagner. Secure verification of location claims. In Maughan
and Perrig [130], pages 1-10.
[114] Loukas Lazos and Radha
Poovendran. Serloc: Robust localization for wireless sensor networks.
TOSN, 1(1):73-100, 2005.
[115] Loukas Lazos and Radha
Poovendran. Serloc: secure range-independent localization for wireless
sensor networks. In Jakobsson and Perrig [126], pages 21-30.
[116] Sapon Tanachaiwiwat,
Pinalkumar Dave, Rohan Bhindwale, and Ahmed Helmy. Secure locations:
routing on trust and isolating compromised sensors in location-aware
sensor networks. In Akyildiz et al. [133], pages 324-325.
[117] Srdjan Capkun, Kasper
Bonne Rasmussen, Mario Cagalj, and Mani B. Srivastava. Secure location verication with hidden and mobile base stations. IEEE Trans. Mob. Comput.,
7(4):470-483, 2008.
[118] Srdjan Capkun, Mario
Cagalj, and Mani B. Srivastava. Secure localization with hidden and mobile base
stations. In INFOCOM [127].
[119] Srdjan Capkun and
Jean-Pierre Hubaux. Secure positioning in wireless networks. IEEE Journal on
Selected Areas in Communications, 24(2):221-232, 2006.
[120] Zang Li, Wade Trappe,
Yanyong Zhang, and Badri Nath. Robust statistical methods for securing wireless
localization in sensor networks. In IPSN [140], pages 91-98.
[121] Donggang Liu, Peng Ning,
and Wenliang Du. Attack-resistant location estimation in sensor networks.
In IPSN [140], pages 99-106.
[122] Donggang Liu, Peng Ning,
and Wenliang Du. Detecting malicious beacon nodes for secure location
discovery in wireless sensor networks. In ICDCS, pages 609-619. IEEE Computer
Society, 2005.
[123] Lei Fang, Wenliang Du,
and Peng Ning. A beacon-less location discovery scheme for wireless sensor
networks. In INFOCOM [139], pages 161-171.
[124] Wenliang Du, Lei Fang,
and Peng Ning. Lad: Localization anomaly detection for wireless sensor networks.
In IPDPS. IEEE Computer Society, 2005.
[125] Wenliang Du, Lei Fang,
and Peng Ning. Lad: Localization anomaly detection for wireless sensor networks.
J. Parallel Distrib. Comput., 66(7):874-886, 2006.
[126] Markus Jakobsson and
Adrian Perrig, editors. Proceedings of the 2004 ACM Workshop on Wireless
Security, Philadelphia, PA, USA, October 1, 2004. ACM, 2004.
[127] INFOCOM 2006. 25th IEEE
International Conference on Computer Communications, Joint Conference
of the IEEE Computer and Communications Societies, 23-29 April
2006, Barcelona, Catalunya, Spain. IEEE, 2006.
[128] Levente Buttyán, Virgil
D. Gligor, and Dirk Westho, editors. Security and Privacy in Ad-Hoc and
Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany,
September 20-21, 2006, Revised Selected Papers, volume 4357 of Lecture
Notes in Computer Science. Springer, 2006.
[129] Sanjeev Setia and Vipin
Swarup, editors. Proceedings of the 2nd ACM Workshop on Security of ad hoc
and Sensor Networks, SASN 2004, Washington, DC, USA, October 25,
2004. ACM, 2004.
[130] W. Douglas Maughan and
Adrian Perrig, editors. Proceedings of the 2003 ACM Workshop on Wireless
Security, San Diego, CA, USA, September 19, 2003. ACM, 2003.
[131] Claude Castelluccia,
Hannes Hartenstein, Christof Paar, and Dirk Westho, editors. Security in Ad-hoc
and Sensor Networks, First European Workshop, ESAS 2004,
Heidelberg, Germany, August 6, 2004, Revised Selected Papers, volume 3313
of Lecture Notes in Computer Science. Springer, 2005.
[132] 2003 Symposium on
Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 -
Orlando, FL, USA, Proceedings. IEEE Computer Society, 2003.
[133] Ian F. Akyildiz, Deborah
Estrin, David E. Culler, and Mani B. Srivastava, editors. Proceedings of the
1st International Conference on Embedded Networked Sensor Systems,
SenSys 2003, Los Angeles, California, USA, November 5-7, 2003. ACM, 2003.
[134] Sergio Palazzo, Marco
Conti, and Raghupathy Sivakumar, editors. Proceedings of the 7th ACM
International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc
2006, Florence, Italy, May 22-25, 2006. ACM, 2006.
[135] Sanjeev Setia and Vipin
Swarup, editors. Proceedings of the 1st ACM Workshop on Security of ad hoc
and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003. ACM,
2003.
[136] Cauligi S. Raghavendra
and Krishna M. Sivalingam, editors. Proceedings of the First ACM International
Workshop on Wireless Sensor Networks and Applications, WSNA 2002,
Atlanta, Georgia, USA, September 28, 2002. ACM, 2002.
[137] Masayuki Abe and Virgil
D. Gligor, editors. Proceedings of the 2008 ACM Symposium on Information,
Computer and Communications Security, ASIACCS 2008, Tokyo,
Japan, March 18-20, 2008. ACM, 2008.
[138] 2005 IEEE Symposium on
Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA. IEEE
Computer Society, 2005.
[139] INFOCOM 2005. 24th
Annual Joint Conference of the IEEE Computer and Communications Societies,
13-17 March 2005, Miami, FL, USA. IEEE, 2005.
[140] Proceedings of the
Fourth International Symposium on Information Processing in Sensor Networks,
IPSN 2005, April 25-27, 2005, UCLA, Los Angeles, California, USA.
IEEE, 2005.