Security Issues In Zigbee Networks

[1]  Jelena V. Misic,et al.  Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic , 2006, IEEE Transactions on Parallel and Distributed Systems.

[2]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[3]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[4]  Gwo-Jia Jong,et al.  The Wireless Sensor Network for Home-Care System Using ZigBee , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[5]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[6]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Giannis F. Marias,et al.  Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs , 2006, EURASIP J. Wirel. Commun. Netw..

[9]  Mohammad S. Obaidat,et al.  Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[10]  Edgar H. Callaway,et al.  Home networking with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks , 2002, IEEE Commun. Mag..

[11]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[12]  Mohammad S. Obaidat,et al.  Attack Graph Generation with Infused Fuzzy Clustering , 2009, SECRYPT.

[13]  Sheng Zhong,et al.  Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.

[14]  Hideki Imai,et al.  Security in Wireless Communication , 2002, Wirel. Pers. Commun..

[15]  Vijay Kumar,et al.  Robot and sensor networks for first responders , 2004, IEEE Pervasive Computing.

[16]  Mohammad S. Obaidat,et al.  A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis , 2008, Simul..

[17]  Mazliza Othman Principles of mobile computing and communications , 2007 .

[18]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[19]  Li Zhang,et al.  The Realization of Intelligent Home by ZigBee Wireless Network Technology , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.

[20]  Cristina Nita-Rotaru,et al.  Secure group communication in wireless mesh networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[21]  K. Malaric,et al.  ZigBee wireless standard , 2006, Proceedings ELMAR 2006.

[22]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..

[23]  Mohammad S. Obaidat,et al.  A Fuzzy logic-based Energy Efficient Packet Loss Preventive Routing Protocol , 2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems.

[24]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[25]  Mohammad S. Obaidat,et al.  An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.

[26]  Sudip Misra,et al.  Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..

[27]  Athina P. Petropulu,et al.  Energy-Efficient Channel Estimation in MIMO Systems , 2006 .

[28]  Robin Kravets,et al.  Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[29]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[30]  Anand Raghunathan,et al.  Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..

[31]  Prashant Krishnamurthy,et al.  The interaction of security and survivability in hybrid wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.