References:
Brain,
Capkun,
S., and Jean-Pierre Hubaux, "Secure Positioning
of Wireless Devices with Application to Sensor Networks", 24th International Conference on Computer
Communications
Chan,
H., and A. Perrig, “PIKE: Peer intermediaries for key establishment in sensor
networks,” 24th International Conference
on Computer Communications
Chan,
H., A. Perrig, and D. Song, “Random Key Predistribution
Schemes for Sensor Networks,” IEEE
Security & Privacy, pp. 197-213, May 2003. local
copy
Deng,
J., R. Han, and S. Mishra, “A Performance Evaluation
of Intrusion Tolerant Routing in Wireless Sensor Networks”, Proceedings of the 2nd IEEE International
Workshop on Information Processing in Sensor Networks
Du,
W., J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Pre-distribution Scheme for Wireless Sensor
Networks,” ACM Transactions on
Information and System Security
Eschenauer,
L., and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of ACM Conference on Computer
and Communications Security
Hu,
L., and D. Evans, “Secure Aggregation for Wireless Networks,” Workshop on Security and Assurance in Ad hoc
Networks, January 2003. local copy
Hu, Y.-C., A.
Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks
in Wireless Networks,” 22nd International
Conference on Computer Communications
Huang,
D., M. Mehta, D. Medhi, and L. Harn,
“Location-aware key management scheme for wireless sensor networks,” ACM Workshop on Security of Ad Hoc and
Sensor Networks
Karlof,
C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures”, Proceedings of the 1st
IEEE International Workshop on Sensor Network Protocols and Applications,
Karlof,
C., N. Sastry, and D. Wagner, “TinySec: a Link Layer Security Architecture for Wireless
Sensor Networks,” Proceedings of the 2nd
international conference on Embedded networked sensor systems
Lazos,
L., and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for
Wireless Sensor Networks”, Proceedings of
2004 ACM Workshop on Wireless Security
Liu, C., K. Wu, Y. Xiao, and B. Sun, "Random Coverage with
Guaranteed Connectivity: Joint Scheduling
for Wireless Sensor Networks," IEEE Transactions on Parallel and
Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. local copy
Liu,
D., and P. Ning, “Establishing Pairwise Keys in
Distributed Sensor Networks,” Proceedings
of ACM Conference on Computer and Communications Security
Liu,
D., P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor
Networks”, Proceedings of The Fourth
International Conference on Information Processing in Sensor Networks
Liu,
D., P. Ning, and W. Du, “Detecting Malicious Beacon Nodes for Secure Location
Discovery in Wireless Sensor Networks”, Proceedings
of the 25th International conference on Distributed Computing
Systems
Liu,
D., P. Ning, and W. Du, “Group-Based Key Pre-Distribution in Wireless Sensor
Networks,” Proceedings of 2005 ACM
Workshop on Wireless Security
Luk,
M., Perrig, A., and Whillock, B., “Seven cardinal properties of sensor network broadcast
authentication,” Proceedings of the
fourth ACM workshop on Security of ad hoc and sensor networks, pp. 147-156,
2006.
Luk,
M., Mezzour, G., Perrig, A., and Gilgor,
V., “MiniSec: a secure sensor network communication
architecture,” Proceedings of the 6th
international conference on Information processing in sensor networks, pp.
479-488, April 25 - 27, 2007.
McCune,
J.M., E. Shi, A. Perrig, M.K. Reiter, “Detection of Denial-Of-Message Attacks
on Sensor Network Broadcasts,” Proceedings
of IEEE Symposium on Security and Privacy, Oakland, CA, May 2005, pp.
64-78. local
copy
Newsome
J., E. Shi, D. Song, and A. Perrig, “The Sybil Attack
in Sensor Networks: Analysis and Defenses,” Proc. IEEE Information
Processing on Sensor Networks
Perrig,
A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. “SPINS: Security Protocols
for Sensor Networks,” Wireless Networks,
vol. 8, pp. 521-534, 2002. local copy
Przydatek,
B., D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor
Networks,” First ACM Conference on
Embedded Networked Sensor Systems
Sadasivam, Karthik, Vishal Changrani, and T. Andrew Yang.
“Scenario Based Performance Evaluation of
Secure Routing in MANETs”. Proc. of the Second Int. Workshop on
Sadasivam, Karthik and T. Andrew Yang. “Evaluation of
Certificate-Based Authentication in Mobile Ad Hoc
Networks”. M.H. Hamza, P. Prapinmonkolkarn, T. Angkaew
Sun, B., Z. Chen, R. Wang, F. Yu, and V.C.M. Leung, “Towards
Adaptive Anomaly Detection in Cellular Mobile Networks”, IEEE Consumer Communications and Networking Conference
Sun,
B., C.-C Li, K. Wu, and Y. Xiao, “A Lightweight Secure Protocol for Wireless
Sensor Networks”, Elsevier Computer
Communications journal Special Issue on Wireless
Sensor Networks: Performance, Reliability, Security, and Beyond, Nov. 2005. local copy
Sun, B., K. Wu, and U. Pooch, “Zone-based Intrusion Detection
System for Mobile Ad Hoc Networks”, International
Journal of Ad Hoc & Sensor Wireless Networks, Sept. 2004. local copy
Sun, B., F. Yu, K. Wu, and V.C.M. Leung, “Mobility-Based Anomaly
Detection in Cellular Mobile Networks”, ACM
WiSe'04, in conjunction with ACM Mobicom'04, Philadelphia, PA, 2004, pp.
61-69. local copy
Sun, B., F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, “Enhancing
Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks”, IEEE Tran. on Vehicular Tech., Vol. 55,
No. 3, May 2006. local copy
TinyECC, http://discovery.csc.ncsu.edu/~pning/software/TinyECC/index.html#Techniques. local
copy
Traynor, P.,
H. Choi, G. Cao, S. Zhu, T. La Porta, “Establishing
Pair-Wise Keys in Heterogeneous Sensor Networks,” 25th International Conference on Computer Communications
Tran,
Sam Phu Manh, and T. Andrew Yang. “Evaluations of Target Tracking Methods in
Wireless Sensor Networks”, Proceedings of the 37th ACM SIGCSE
Technical Symposium on Computer Science Education
Tran,
Sam Phu Manh, and T. Andrew Yang. “OCO: Optimized Communication &
Organization for Target Tracking in Wireless Sensor Networks”, Proceedings of the IEEE International
Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
Wagner,
D., “Resilient Aggregation in Sensor Networks,” Second ACM Workshop on Security of Ad Hoc and Sensor Networks
Wood,
A.D., and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer,
Wood, A. D. and Stankovic, J. A., “AMSecure:
secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless
sensor networks,” Proceedings of the 4th
international conference on Embedded networked sensor systems, 2006.
Wood, A.D., and J. Stankovic, S. Son, “JAM: A
Jammed-area Mapping Service for Sensor Networks,” Proceedings of the 24th Realtime System
Symposium
Wu, K.,
D. Dreef, B. Sun, and Y. Xiao, “Secure Data Aggregation without Persistent
cryptographic operations in Wireless Sensor Networks,” Elsevier AD HOC Networks journal, special issue on Security Issues in
Sensor and AD HOC Networks, accepted and to appear, 2006. local
copy
Yang,
T. Andrew and Yasir Zahur. Security in WLANs. Chapter 17
Ye,
F., H. Luo, S. Lu, L. Zhang, “Statistical En-route Detection and Filtering of
Injected False Data in Sensor Networks,” 23rd
International Conference on Computer Communications
Yu,
Z., and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data Injection
in Wireless Sensor Networks,” 25th
International Conference on Computer Communications
Zahur,
Y. and Yang, T. A. “Wireless LAN Security and Laboratory Designs,” Journal of Computing in Small Colleges.
Volume 19 Issue 3. Jan. 2004. local copy
Zhang,
W., and G. Cao, “Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach,” 24th International Conference on Computer
Communications
Zhou,
L., J. Ni, and C.V. Ravishankar, “Efficient Key
Establishment for Group-Based Wireless Sensor Deployments,” Proc. of the 4th ACM workshop on Wireless
security
Zhu,
S., S. Setia, S. Jajodia, and P. Ning, “An
Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection
in Sensor Networks,” IEEE Symposium on
Security and Privacy, Oakland, CA, May 9-12, 2004, pp. 260-272. local copy
Zhou, Ying and Debao Xiao. Mobile agent-based policy
management for wireless sensor networks”. Proceedings
of the 2005 International Conference on Wireless Communications, Networking and
Zhu,
S., S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks:
A Probabilistic Approach,” 11th IEEE
International Conference on Network Protocols
Zhu, S., Setia, S., Jajodia,
S., and Peng Ning, A., “An interleaved hop-by-hop
authentication scheme for filtering of injected false data in sensor networks,”
IEEE Symposium on Security and Privacy,
pp. 259-271, 2004.