References:

Brain, Marshall. “How Motes Work?” http://computer.howstuffworks.com/mote.htm/printable

.  Local copy

Capkun, S., and Jean-Pierre Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks", 24th International Conference on Computer Communications (INFOCOM’05), Miami, FL, 2005. local copy

Chan, H., and A. Perrig, “PIKE: Peer intermediaries for key establishment in sensor networks,” 24th International Conference on Computer Communications (INFOCOM’05), Miami, FL, 2005, vol. 1, pp. 524-535. local copy

Chan, H., A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” IEEE Security & Privacy, pp. 197-213, May 2003. local copy

Deng, J., R. Han, and S. Mishra, “A Performance Evaluation of Intrusion Tolerant Routing in Wireless Sensor Networks”, Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN 2003), pp. 349-364, Palo Alto, CA, Apr. 2003. local copy

Du, W., J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,” ACM Transactions on Information and System Security (TISSEC), vol. 8, issue 2, pp. 228-258, 2005. local copy

Eschenauer, L., and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington DC, pp. 41-47, 2002. local copy

Hu, L., and D. Evans, “Secure Aggregation for Wireless Networks,” Workshop on Security and Assurance in Ad hoc Networks, January 2003. local copy

Hu, Y.-C., A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” 22nd International Conference on Computer Communications (INFOCOM’03), San Francisco, CA, Apr. 2003, pp. 1976-1986. local copy

Huang, D., M. Mehta, D. Medhi, and L. Harn, “Location-aware key management scheme for wireless sensor networks,” ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington DC, 2004, pp. 29-42. local copy

Karlof, C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May 11, 2003. local copy

Karlof, C., N. Sastry, and D. Wagner, “TinySec: a Link Layer Security Architecture for Wireless Sensor Networks,” Proceedings of the 2nd international conference on Embedded networked sensor systems (ACM SenSys’04), 2004, pp. 162 - 175. local copy

Lazos, L., and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks”, Proceedings of 2004 ACM Workshop on Wireless Security (ACM WiSe), Philadelphia, PA, Oct. 2004, pp. 21-30. local copy

Liu, C., K. Wu, Y. Xiao, and B. Sun, "Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. local copy

Liu, D., and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington DC, pp. 52-61, 2003. local copy

Liu, D., P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks”, Proceedings of The Fourth International Conference on Information Processing in Sensor Networks (IPSN '05), Los Angeles, CA, pp. 99-106, April 2005. local copy

Liu, D., P. Ning, and W. Du, “Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks”, Proceedings of the 25th International conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, June 6-10, 2005, pp. 609-619. local copy

Liu, D., P. Ning, and W. Du, “Group-Based Key Pre-Distribution in Wireless Sensor Networks,” Proceedings of 2005 ACM Workshop on Wireless Security (ACM WiSe 2005), Cologne, Germany, September 2005, pp. 11-20. local copy

Luk, M., Perrig, A., and Whillock, B., “Seven cardinal properties of sensor network broadcast authentication,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 147-156, 2006.

Luk, M., Mezzour, G., Perrig, A., and Gilgor, V., “MiniSec: a secure sensor network communication architecture,” Proceedings of the 6th international conference on Information processing in sensor networks, pp. 479-488, April 25 - 27, 2007.

McCune, J.M., E. Shi, A. Perrig, M.K. Reiter, “Detection of Denial-Of-Message Attacks on Sensor Network Broadcasts,” Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2005, pp. 64-78. local copy

Newsome J., E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis and Defenses,” Proc. IEEE Information Processing on Sensor Networks (IPSN), Berkeley, CA, Apr. 2004, pp. 259-268. local copy

Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, pp. 521-534, 2002. local copy

Przydatek, B., D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” First ACM Conference on Embedded Networked Sensor Systems (ACM Sensys’03), pp. 255-265, Los Angeles, CA, 2003. local copy

Sadasivam, Karthik, Vishal Changrani, and T. Andrew Yang. “Scenario Based Performance Evaluation of Secure Routing in MANETs”. Proc. of the Second Int. Workshop on Mobile Ad Hoc Networks and Interoperability Issues (MANETII’05), in conjunction with the Int. Conf. on Wireless Networks (ICWN'05). 2005. local copy

Sadasivam, Karthik and T. Andrew Yang. Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks”. M.H. Hamza, P. Prapinmonkolkarn, T. Angkaew (Eds): Proc. of the IASTED Int. Multi-Conf. on Networks and Communication Systems (NCS 2005). 2005. local copy

Sun, B., Z. Chen, R. Wang, F. Yu, and V.C.M. Leung, “Towards Adaptive Anomaly Detection in Cellular Mobile Networks”, IEEE Consumer Communications and Networking Conference (CCNC'06), pp. 666-670, Las Vegas, 2006. local copy

Sun, B., C.-C Li, K. Wu, and Y. Xiao, “A Lightweight Secure Protocol for Wireless Sensor Networks”, Elsevier Computer Communications journal Special Issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond, Nov. 2005. local copy

Sun, B., K. Wu, and U. Pooch, “Zone-based Intrusion Detection System for Mobile Ad Hoc Networks”, International Journal of Ad Hoc & Sensor Wireless Networks, Sept. 2004. local copy

Sun, B., F. Yu, K. Wu, and V.C.M. Leung, “Mobility-Based Anomaly Detection in Cellular Mobile Networks”, ACM WiSe'04, in conjunction with ACM Mobicom'04, Philadelphia, PA, 2004, pp. 61-69. local copy

Sun, B., F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, “Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks”, IEEE Tran. on Vehicular Tech., Vol. 55, No. 3, May 2006. local copy

TinyECC, http://discovery.csc.ncsu.edu/~pning/software/TinyECC/index.html#Techniques. local copy

Traynor, P., H. Choi, G. Cao, S. Zhu, T. La Porta, “Establishing Pair-Wise Keys in Heterogeneous Sensor Networks,” 25th International Conference on Computer Communications (INFOCOM’06), April 2006, Barcelona, Spain. local copy

Tran, Sam Phu Manh, and T. Andrew Yang. “Evaluations of Target Tracking Methods in Wireless Sensor Networks”, Proceedings of the 37th ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE 2006). Houston, Texas. 3/1-5, 2006. local copy

Tran, Sam Phu Manh, and T. Andrew Yang. “OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks”, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006). 6/5-7, 2006, Taichung, Taiwan. local copy

Wagner, D., “Resilient Aggregation in Sensor Networks,” Second ACM Workshop on Security of Ad Hoc and Sensor Networks (ACM SASN’04), pp. 78-87, Washington DC, 2004. local copy

Wood, A.D., and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, (Oct. 2002), 54-62. local copy

Wood, A. D. and Stankovic, J. A., “AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks,” Proceedings of the 4th international conference on Embedded networked sensor systems, 2006.

Wood, A.D., and J. Stankovic, S. Son, “JAM: A Jammed-area Mapping Service for Sensor Networks,” Proceedings of the 24th Realtime System Symposium (RTSS), Cancun, Mexico, Dec. 2003, pp. 286-297. local copy

Wu, K., D. Dreef, B. Sun, and Y. Xiao, “Secure Data Aggregation without Persistent cryptographic operations in Wireless Sensor Networks,” Elsevier AD HOC Networks journal, special issue on Security Issues in Sensor and AD HOC Networks, accepted and to appear, 2006. local copy

Yang, T. Andrew and Yasir Zahur. Security in WLANs. Chapter 17 (pp. 429-250). Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. Mohammad Ilyas and Syed Ahson (Eds.). CRC Press. 2005. ISBN: 0849323231. local copy

Ye, F., H. Luo, S. Lu, L. Zhang, “Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks,” 23rd International Conference on Computer Communications (INFOCOM’04), Hong Kong, March, 2004, pp. 2446-2457. local copy

Yu, Z., and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks,” 25th International Conference on Computer Communications (INFOCOM’06), Barcelona, Spain, April, 2006. local copy

Zahur, Y. and Yang, T. A. “Wireless LAN Security and Laboratory Designs,” Journal of Computing in Small Colleges. Volume 19 Issue 3. Jan. 2004. local copy

Zhang, W., and G. Cao, “Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach,” 24th International Conference on Computer Communications (INFOCOM’05), Miami, FL, 2005, pp. 503-514. local copy

Zhou, L., J. Ni, and C.V. Ravishankar, “Efficient Key Establishment for Group-Based Wireless Sensor Deployments,” Proc. of the 4th ACM workshop on Wireless security (ACM WiSe’05), Cologne, Germany, pp. 1-10, 2005. local copy

Zhu, S., S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks,” IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, 2004, pp. 260-272. local copy

Zhou, Ying and Debao Xiao. Mobile agent-based policy management for wireless sensor networks”. Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Volume 2, 1207 – 1210. 23-26, Sept. 2005. local copy

Zhu, S., S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,” 11th IEEE International Conference on Network Protocols (ICNP), Atlanta, GA, pp. 326-335, 2003. local copy

Zhu, S., Setia, S., Jajodia, S., and Peng Ning, A., “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” IEEE Symposium on Security and Privacy, pp. 259-271, 2004.