Trusted embedded System Operating System (TeSOS) - Study and Design

[1]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[2]  Bennet S. Yee,et al.  Dyad : a system for using physically secure coprocessors , 1991 .

[3]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[4]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[5]  Angelos D. Keromytis,et al.  Automated Recovery in a Secure Bootstrap Process , 1998, NDSS.

[6]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[7]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[8]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[9]  Mike Chen,et al.  Security and Deployment Issues in a Sensor Network , 2000 .

[10]  Mika Ståhlberg Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .

[11]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[12]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[13]  Peter Gutmann,et al.  Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.

[14]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[15]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[16]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[17]  Deborah Estrin,et al.  Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[18]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[19]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[20]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[21]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[22]  Paramvir Bahl,et al.  Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.

[23]  Mohamed F. Younis,et al.  Energy-aware routing in cluster-based sensor networks , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[24]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[25]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[26]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[27]  Koen Langendoen,et al.  An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.

[28]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[29]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[30]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[31]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[32]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[33]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[34]  Sang Hyuk Son,et al.  IGF: A State-Free Robust Communication Protocol for Wireless Sensor Networks , 2003 .

[35]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[36]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[37]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[38]  Mihir Bellare,et al.  Forward-Security in Private-Key Cryptography , 2003, CT-RSA.

[39]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[40]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[41]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[42]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[43]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[44]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[45]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[46]  Chunming Qiao,et al.  Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks , 2003, Comput. Networks.

[47]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[48]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[49]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[50]  Catherine Rosenberg,et al.  Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[51]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[52]  Ingrid Verbauwhede,et al.  Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.

[53]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[54]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[55]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[56]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[57]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[58]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[59]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[60]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[61]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[62]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[63]  J. Doug Tygar,et al.  Side Effects Are Not Sufficient to Authenticate Software , 2004, USENIX Security Symposium.

[64]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[65]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[66]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[67]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[68]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[69]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[70]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[71]  Paul J.M. Havinga,et al.  A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .

[72]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[73]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[74]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[75]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[76]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[77]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[78]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[79]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[80]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[81]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[82]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[83]  Jeff Rose,et al.  MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..

[84]  David E. Culler,et al.  Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[85]  Deborah Estrin,et al.  Sympathy for the sensor network debugger , 2005, SenSys '05.

[86]  Hairong Qi,et al.  Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[87]  Mani B. Srivastava,et al.  A dynamic operating system for sensor nodes , 2005, MobiSys '05.

[88]  T. Moon Error Correction Coding: Mathematical Methods and Algorithms , 2005 .

[89]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[90]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[91]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[92]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[93]  Saurabh Bagchi,et al.  TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[94]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[95]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[96]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[97]  Md. Abdul Hamid,et al.  Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .

[98]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[99]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[100]  Nael B. Abu-Ghazaleh,et al.  Towards resilient geographic routing in WSNs , 2005, Q2SWinet '05.

[101]  Song Han,et al.  Taxonomy of Attacks on Wireless Sensor Networks , 2006 .

[102]  KD Kang Securing Geographic Routing in Wireless Sensor Networks , 2006 .

[103]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[104]  Yoon-Hwa Choi,et al.  A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.

[105]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[106]  Tam Tom Kevenaar,et al.  Information-theoretic analysis of capacitive physical unclonable functions , 2006 .

[107]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[108]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.

[109]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[110]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[111]  Uyen Trang Nguyen,et al.  Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[112]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[113]  Tian He,et al.  SIGF: A Family of Congurab le, Secure Routing Protocols for Wireless Sensor Networks , 2006 .

[114]  Levente Buttyán,et al.  Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.

[115]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[116]  S. Shankar Sastry,et al.  A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.

[117]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[118]  Indranil Saha,et al.  Location Verification Based Defense Against Sybil Attack in Sensor Networks , 2006, ICDCN.

[119]  Choong Seon Hong,et al.  Defense against lap-top class attacker in wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[120]  Boris Skoric,et al.  Read-Proof Hardware from Protective Coatings , 2006, CHES.

[121]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[122]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[123]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[124]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[125]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[126]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[127]  Hari Balakrishnan,et al.  Memento: A Health Monitoring System for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[128]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[129]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[130]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[131]  Xiaomei Cao,et al.  ROSS : Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks , 2007 .

[132]  David Sanchez,et al.  Secure, accurate and precise time synchronization for wireless sensor networks , 2007, Q2SWinet '07.

[133]  Vincent Wai Sum Wong,et al.  An energy-efficient multipath routing protocol for wireless sensor networks: Research Articles , 2007 .

[134]  Maryline Laurent-Maknavicius,et al.  SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks , 2007, MSN.

[135]  Mohsen Guizani,et al.  Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.

[136]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[137]  Frederik Armknecht,et al.  Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[138]  Ricardo Dahab,et al.  Identity-Based Encryption for Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[139]  Yu-Kwong Kwok,et al.  A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[140]  Panagiotis Papadimitratos,et al.  Efficient and Robust Secure Aggregation for Sensor Networks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.

[141]  Levente Buttyán,et al.  The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[142]  Huafeng Wu,et al.  Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[143]  Sencun Zhu,et al.  Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[144]  Fu Fei,et al.  ASTS: An Agile Secure Time Synchronization Protocol for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[145]  Yurong Xu,et al.  Analysis of range-free anchor-free localization in a wsn under wormhole attack , 2007, MSWiM '07.

[146]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[147]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[148]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[149]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[150]  Andreas Meier,et al.  Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks , 2007, DCOSS.

[151]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[152]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[153]  Sang Hoon Lee,et al.  Event-Driven Power Management for Wireless Sensor Networks , 2007, SEUS.

[154]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[155]  Jörg Nolte,et al.  A Flexible Scheduling Framework for Deeply Embedded Systems , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[156]  C. Bekara,et al.  A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks With no Requirements for Trusted Aggregator Nodes , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).

[157]  Hairong Qi,et al.  A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[158]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[159]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[160]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[161]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.

[162]  Geng Yang,et al.  Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[163]  Evgeny Osipov,et al.  tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks , 2007, NEW2AN.

[164]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[165]  Gelareh Taban,et al.  Efficient Handling of Adversary Attacks in Aggregation Applications , 2008, ESORICS.

[166]  J. Misic,et al.  Detection of Sybil Attack in Beacon Enabled IEEE802.15.4 Networks , 2008, 2008 International Wireless Communications and Mobile Computing Conference.

[167]  David Richard Raymond Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols , 2008 .

[168]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[169]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[170]  Meriel Huggard,et al.  An end-to-end routing protocol for peer-to-peer communication in wireless sensor networks , 2008, MiNEMA '08.

[171]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.

[172]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[173]  Michele Zorzi,et al.  SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[174]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[175]  D. Bernstein RSA signatures and Rabin – Williams signatures : the state of the art , 2008 .

[176]  Qijun Gu,et al.  Towards self-propagate mal-packets in sensor networks , 2008, WiSec '08.

[177]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[178]  An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.

[179]  Mehul Motani,et al.  DiMo: distributed node monitoring in wireless sensor networks , 2008, MSWiM '08.

[180]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[181]  Xiaodong Wang,et al.  Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.

[182]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[183]  Hovav Shacham,et al.  When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.

[184]  Jean-Philippe Babau,et al.  Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[185]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[186]  T. Anjali,et al.  A game theoretic approach to gray hole attacks in Wireless Mesh Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[187]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[188]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[189]  Devu Manikantan Shila,et al.  Defending selective forwarding attacks in WMNs , 2008, 2008 IEEE International Conference on Electro/Information Technology.

[190]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[191]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[192]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[193]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[194]  Eduardo Freire Nakamura,et al.  Sensor stream reduction for clustered wireless sensor networks , 2008, SAC '08.

[195]  T.A. Zia,et al.  Reputation-based trust management in wireless sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[196]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[197]  Theodore B. Zahariadis,et al.  A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks , 2009, MOBILIGHT.

[198]  Jinhui Xu,et al.  Towards a theory for securing time synchronization in wireless sensor networks , 2009, WiSec '09.

[199]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[200]  Travis Goodspeed Reversing and Exploiting Wireless Sensors , 2009 .

[201]  Wang Chunlei,et al.  Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .

[202]  Dirk Westhoff,et al.  A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.

[203]  Aline Carneiro Viana,et al.  Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.

[204]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[205]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[206]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[207]  José Manuel Moya,et al.  Intrusion Detection in Sensor Networks Using Clustering and Immune Systems , 2009, IDEAL.

[208]  Hong Luo,et al.  Entropy-Based Trust Management for Data Collection in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[209]  Theodore B. Zahariadis,et al.  A novel flexible trust management system for heterogeneous wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[210]  Piotr Szczechowiak,et al.  TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[211]  Indranil Saha,et al.  Security against Sybil Attack in Wireless Sensor Network through Location Verification , 2009, ICDCN.

[212]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[213]  Fortunato Santucci,et al.  Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents , 2009, S-CUBE.

[214]  A. C. Viana,et al.  Fighting Sinkhole Attacks in Tree-based Routing Topologies , 2009 .

[215]  Claudio Soriente,et al.  On the difficulty of software-based attestation of embedded devices , 2009, CCS.

[216]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[217]  Stamatis Voliotis,et al.  An energy and trust-aware routing protocol for large wireless sensor networks , 2009 .

[218]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[219]  Mani B. Srivastava,et al.  Estimating clock uncertainty for efficient duty-cycling in sensor networks , 2009, TNET.

[220]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[221]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[222]  Liang Tang,et al.  S-SPIN: A Provably Secure Routing Protocol for Wireless Sensor Networks , 2009, 2009 International Conference on Communication Software and Networks.

[223]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[224]  Kasmiran Jumari,et al.  Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network , 2009 .

[225]  Rosario Gennaro,et al.  Making the Diffie-Hellman Protocol Identity-Based , 2010, CT-RSA.

[226]  Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks , 2009 .

[227]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[228]  Hans-Joachim Hof,et al.  Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[229]  Young-Koo Lee,et al.  Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks , 2009, ICUIMC '09.

[230]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[231]  Felix C. Freiling,et al.  Attacker Models for Wireless Sensor Networks , 2010, it Inf. Technol..

[232]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[233]  Neeli R. Prasad,et al.  Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices , 2010, Comput. J..

[234]  Levente BUTTYA’N APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION : CHALLENGES AND DESIGN OPTIONS , 2010 .

[235]  Yang Geng An Identity-Based Encryption Scheme for Broadcasting , 2010 .

[236]  Wen-Chung Chang,et al.  Defending Sybil attacks based on neighboring relations in wireless sensor networks , 2010, Secur. Commun. Networks.

[237]  Ahmad-Reza Sadeghi,et al.  Lightweight Remote Attestation Using Physical Functions , 2011 .

[238]  Markus Ullmann,et al.  Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme , 2011, WiSec '11.

[239]  Muhammad Ibrahim,et al.  SPINS: Security Protocols for Sensor Networks , 2011 .