References:
Brain,
Capkun,
S., and Jean-Pierre Hubaux, "Secure Positioning of Wireless Devices with
Application to Sensor Networks", 24th
International Conference on Computer Communications (INFOCOM’05),
Chan,
H., and A. Perrig, “PIKE: Peer intermediaries for key establishment in sensor
networks,” 24th International Conference
on Computer Communications (INFOCOM’05),
Chan,
H., A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor
Networks,” IEEE Security & Privacy,
pp. 197-213, May 2003. local
copy
Deng,
J., R. Han, and S. Mishra, “A Performance Evaluation of Intrusion Tolerant
Routing in Wireless Sensor Networks”, Proceedings
of the 2nd IEEE International Workshop on Information Processing in Sensor
Networks (IPSN 2003), pp. 349-364, Palo Alto, CA, Apr. 2003. local copy
Du,
W., J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Pre-distribution Scheme
for Wireless Sensor Networks,” ACM
Transactions on Information and System Security (TISSEC), vol. 8, issue 2,
pp. 228-258, 2005. local
copy
Eschenauer,
L., and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of ACM Conference on Computer
and Communications Security (ACM CCS),
Hu,
L., and D. Evans, “Secure Aggregation for Wireless Networks,” Workshop on Security and Assurance in Ad hoc
Networks, January 2003. local
copy
Hu, Y.-C., A.
Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks
in Wireless Networks,” 22nd International
Conference on Computer Communications
(INFOCOM’03),
Huang,
D., M. Mehta, D. Medhi, and L. Harn, “Location-aware key management scheme for
wireless sensor networks,” ACM Workshop
on Security of Ad Hoc and Sensor Networks (SASN),
Karlof,
C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures”, Proceedings of the 1st
IEEE International Workshop on Sensor Network Protocols and Applications,
Karlof,
C., N. Sastry, and D. Wagner, “TinySec: a Link Layer Security Architecture for
Wireless Sensor Networks,” Proceedings of
the 2nd international conference on Embedded networked sensor systems (ACM
SenSys’04),
Lazos,
L., and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for
Wireless Sensor Networks”, Proceedings of
2004 ACM Workshop on Wireless Security (ACM WiSe),
Liu, C., K. Wu, Y. Xiao, and B. Sun, "Random Coverage with
Guaranteed Connectivity: Joint Scheduling
for Wireless Sensor Networks," IEEE Transactions on Parallel and
Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. local copy
Liu,
D., and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of ACM Conference on Computer
and Communications Security (ACM CCS),
Liu,
D., P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor
Networks”, Proceedings of The Fourth
International Conference on Information Processing in Sensor Networks (IPSN
'05), Los Angeles, CA, pp. 99-106, April 2005. local copy
Liu,
D., P. Ning, and W. Du, “Detecting Malicious Beacon Nodes for Secure Location
Discovery in Wireless Sensor Networks”, Proceedings
of the 25th International conference on Distributed Computing
Systems (ICDCS 2005), Columbus, Ohio, June 6-10, 2005, pp. 609-619. local copy
Liu,
D., P. Ning, and W. Du, “Group-Based Key Pre-Distribution in Wireless Sensor
Networks,” Proceedings of 2005 ACM
Workshop on Wireless Security (ACM WiSe 2005),
McCune,
J.M., E. Shi, A. Perrig, M.K. Reiter, “Detection of Denial-Of-Message Attacks
on Sensor Network Broadcasts,”, Proceedings
of IEEE Symposium on Security and Privacy, Oakland, CA, May 2005, pp.
64-78. local copy
Newsome
J., E. Shi, D. Song, and A. Perrig, “The Sybil Attack
in Sensor Networks: Analysis and Defenses,” Proc. IEEE Information
Processing on Sensor Networks (IPSN),
Przydatek,
B., D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor
Networks,” First ACM Conference on
Embedded Networked Sensor Systems (ACM Sensys’03), pp. 255-265,
Sadasivam, Karthik, Vishal Changrani, and T. Andrew Yang.
“Scenario Based Performance Evaluation of
Secure Routing in MANETs”. Proc. of the Second Int. Workshop on
Sadasivam, Karthik and T. Andrew Yang. “Evaluation of
Certificate-Based Authentication in Mobile Ad Hoc
Networks”. M.H. Hamza, P.
Prapinmonkolkarn, T. Angkaew
(Eds): Proc. of the IASTED Int. Multi-Conf. on Networks and Communication
Systems (NCS 2005). 2005. local
copy
Sun, B., Z. Chen, R. Wang, F. Yu, and V.C.M. Leung, “Towards
Adaptive Anomaly Detection in Cellular Mobile Networks”, IEEE Consumer Communications and Networking Conference (CCNC'06),
pp. 666-670,
Sun, B.,
C.-C Li, K. Wu, and Y. Xiao, “A Lightweight Secure Protocol for Wireless Sensor
Networks”, Elsevier Computer
Communications journal Special Issue on Wireless
Sensor Networks: Performance, Reliability, Security, and Beyond, Nov. 2005. local
copy
Sun, B., K. Wu, and U. Pooch, “Zone-based Intrusion Detection
System for Mobile Ad Hoc Networks”, International
Journal of Ad Hoc & Sensor Wireless Networks, Sept. 2004. local
copy
Sun, B., F. Yu, K. Wu, and V.C.M. Leung, “Mobility-Based Anomaly
Detection in Cellular Mobile Networks”, ACM
WiSe'04, in conjunction with ACM Mobicom'04, Philadelphia, PA, 2004, pp.
61-69. local
copy
Sun, B., F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, “Enhancing
Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks”, IEEE Tran. on Vehicular Tech., Vol. 55,
No. 3, May 2006. local
copy
TinyECC,
http://discovery.csc.ncsu.edu/~pning/software/TinyECC/index.html#Techniques. local copy
Traynor,
P., H. Choi, G. Cao, S. Zhu, T. La Porta, “Establishing Pair-Wise Keys in
Heterogeneous Sensor Networks,” 25th
International Conference on Computer Communications (INFOCOM’06), April
2006,
Tran,
Sam Phu Manh, and T. Andrew Yang. “Evaluations of Target Tracking Methods in
Wireless Sensor Networks”, Proceedings of the 37th ACM SIGCSE
Technical Symposium on Computer Science Education (SIGCSE 2006).
Tran,
Sam Phu Manh, and T. Andrew Yang. “OCO: Optimized Communication &
Organization for Target Tracking in Wireless Sensor Networks”, Proceedings of the IEEE International
Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006).
6/5-7, 2006,
Wagner,
D., “Resilient Aggregation in Sensor Networks,” Second ACM Workshop on Security of Ad Hoc and Sensor Networks (ACM
SASN’04), pp. 78-87,
Wood,
A.D., and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, (Oct. 2002), 54-62. local
copy
Wood, A.D., and J. Stankovic, S. Son, “JAM: A
Jammed-area Mapping Service for Sensor Networks,” Proceedings of the 24th Realtime System Symposium (RTSS),
Wu,
K., D. Dreef, B. Sun, and Y. Xiao, “Secure Data Aggregation without Persistent
cryptographic operations in Wireless Sensor Networks,” Elsevier AD HOC Networks journal, special issue on Security Issues in
Sensor and AD HOC Networks, accepted and to appear, 2006. local copy
Yang,
T. Andrew and Yasir Zahur. Security in WLANs. Chapter 17 (pp. 429-250). Handbook of Wireless Local Area Networks:
Applications, Technology, Security, and Standards. Mohammad Ilyas and Syed
Ahson (Eds.). CRC Press. 2005. ISBN: 0849323231. local copy
Ye,
F., H. Luo, S. Lu, L. Zhang, “Statistical En-route Detection and Filtering of
Injected False Data in Sensor Networks,” 23rd
International Conference on Computer Communications (INFOCOM’04),
Yu,
Z., and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data Injection
in Wireless Sensor Networks,” 25th
International Conference on Computer Communications (INFOCOM’06),
Zahur,
Y. and Yang, T. A. “Wireless LAN Security and Laboratory Designs,” Journal of Computing in Small Colleges.
Volume 19 Issue 3. Jan. 2004. local
copy
Zhang,
W., and G. Cao, “Group Rekeying for Filtering False Data in Sensor Networks: A
Predistribution and Local Collaboration-Based Approach,” 24th International Conference on Computer Communications (INFOCOM’05),
Zhou,
L., J. Ni, and C.V. Ravishankar, “Efficient Key Establishment for Group-Based
Wireless Sensor Deployments,” Proc. of
the 4th ACM workshop on Wireless security (ACM WiSe’05),
Zhu,
S., S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop
Authentication Scheme for Filtering False Data Injection in Sensor Networks,” IEEE Symposium on Security and Privacy,
Oakland, CA, May 9-12, 2004, pp. 260-272. local
copy
Zhou, Ying and Debao Xiao. Mobile agent-based policy
management for wireless sensor networks”. Proceedings
of the 2005 International Conference on Wireless Communications, Networking and
Zhu,
S., S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure
Communication in Ad Hoc Networks: A Probabilistic Approach,” 11th IEEE International Conference on
Network Protocols (ICNP),