A Scalable Solution for Securing Wireless Sensor Networks

[1]  Fan Hong,et al.  Intrusion Detection in Ad-hoc Networks , 2006 .

[2]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[6]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[7]  Paramvir Bahl,et al.  PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.

[8]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[9]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[10]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[11]  V.V. Zhirnov,et al.  New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.

[12]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[13]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[14]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[15]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[16]  Jaap C. Haartsen,et al.  The Bluetooth radio system , 2000, IEEE Personal Communications.

[17]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[18]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[19]  Birgit Pfitzmann,et al.  Trusting Mobile User Devices and Security Modules , 1997, Computer.

[20]  Paul Saffo,et al.  Sensors: the next wave of innovation , 1997, CACM.

[21]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[22]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.