Wireless Sensor Networks: Emerging Applications and Security Solutions

[1]  Elfed Lewis,et al.  Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[4]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[5]  Li Gong,et al.  A matrix key-distribution scheme , 2005, Journal of Cryptology.

[6]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[7]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[8]  John A. Stankovic,et al.  AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks , 2006, SenSys '06.

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Aura Ganz,et al.  Runtime security composition for sensor networks (SecureSense) , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[12]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, INFOCOM.

[13]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[14]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[15]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[16]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[17]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[18]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[19]  Alfred C. Weaver,et al.  Remote Medical Monitoring , 2008, Computer.

[20]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[21]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[22]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[23]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[24]  Benton H. Calhoun,et al.  Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.

[25]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[26]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[27]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[28]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[29]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[30]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[31]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[32]  Yi Yang,et al.  A Survey on Technologies for Implementing Sensor Networks for Power Delivery Systems , 2007, 2007 IEEE Power Engineering Society General Meeting.

[33]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[34]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[35]  Dharma P. Agrawal,et al.  Next-Generation Wearable Networks , 2003, Computer.

[36]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).