Trusted embedded System Operating System (TeSOS) - Study and Design
暂无分享,去创建一个
Ahmad-Reza Sadeghi | Steffen Schulz | Alexandra Dmitrienko | Dennis Gessner | Markus Ullmann | Christian Stueble | Steffen Schulz | A. Sadeghi | A. Dmitrienko | M. Ullmann | D. Gessner | Christian Stueble
[1] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[2] Bennet S. Yee,et al. Dyad : a system for using physically secure coprocessors , 1991 .
[3] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[4] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] Angelos D. Keromytis,et al. Automated Recovery in a Secure Bootstrap Process , 1998, NDSS.
[6] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[7] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[8] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[9] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[10] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[11] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[12] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[13] Peter Gutmann,et al. Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.
[14] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[15] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[16] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[17] Deborah Estrin,et al. Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[18] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[19] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[20] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[21] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[22] Paramvir Bahl,et al. Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.
[23] Mohamed F. Younis,et al. Energy-aware routing in cluster-based sensor networks , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.
[24] Wendi B. Heinzelman,et al. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.
[25] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[26] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[27] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[28] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[29] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[30] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[31] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[32] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[33] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[34] Sang Hyuk Son,et al. IGF: A State-Free Robust Communication Protocol for Wireless Sensor Networks , 2003 .
[35] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[36] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[37] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[38] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[39] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[40] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[41] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[42] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[43] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[44] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[45] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[46] Chunming Qiao,et al. Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks , 2003, Comput. Networks.
[47] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[48] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[49] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[50] Catherine Rosenberg,et al. Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[51] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[52] Ingrid Verbauwhede,et al. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.
[53] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[54] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[55] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[56] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[57] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[58] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[59] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[60] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[61] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[62] John A. Stankovic,et al. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.
[63] J. Doug Tygar,et al. Side Effects Are Not Sufficient to Authenticate Software , 2004, USENIX Security Symposium.
[64] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[65] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[66] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[67] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[68] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[69] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[70] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[71] Paul J.M. Havinga,et al. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .
[72] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[73] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[74] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[75] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[76] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[77] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[78] Ajay D. Kshemkalyani,et al. Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.
[79] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[80] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[81] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[82] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[83] Jeff Rose,et al. MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..
[84] David E. Culler,et al. Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[85] Deborah Estrin,et al. Sympathy for the sensor network debugger , 2005, SenSys '05.
[86] Hairong Qi,et al. Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[87] Mani B. Srivastava,et al. A dynamic operating system for sensor nodes , 2005, MobiSys '05.
[88] T. Moon. Error Correction Coding: Mathematical Methods and Algorithms , 2005 .
[89] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[90] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[91] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[92] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[93] Saurabh Bagchi,et al. TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[94] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[95] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[96] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[97] Md. Abdul Hamid,et al. Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .
[98] Douglas R. Stinson,et al. A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[99] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[100] Nael B. Abu-Ghazaleh,et al. Towards resilient geographic routing in WSNs , 2005, Q2SWinet '05.
[101] Song Han,et al. Taxonomy of Attacks on Wireless Sensor Networks , 2006 .
[102] KD Kang. Securing Geographic Routing in Wireless Sensor Networks , 2006 .
[103] Rajeev Gandhi,et al. Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.
[104] Yoon-Hwa Choi,et al. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.
[105] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[106] Tam Tom Kevenaar,et al. Information-theoretic analysis of capacitive physical unclonable functions , 2006 .
[107] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[108] Adrian Perrig,et al. Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.
[109] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[110] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[111] Uyen Trang Nguyen,et al. Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[112] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[113] Tian He,et al. SIGF: A Family of Congurab le, Secure Routing Protocols for Wireless Sensor Networks , 2006 .
[114] Levente Buttyán,et al. Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.
[115] Sungyoung Lee,et al. Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[116] S. Shankar Sastry,et al. A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.
[117] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[118] Indranil Saha,et al. Location Verification Based Defense Against Sybil Attack in Sensor Networks , 2006, ICDCN.
[119] Choong Seon Hong,et al. Defense against lap-top class attacker in wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[120] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[121] J. Deng,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[122] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[123] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[124] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[125] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[126] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[127] Hari Balakrishnan,et al. Memento: A Health Monitoring System for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[128] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[129] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[130] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[131] Xiaomei Cao,et al. ROSS : Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks , 2007 .
[132] David Sanchez,et al. Secure, accurate and precise time synchronization for wireless sensor networks , 2007, Q2SWinet '07.
[133] Vincent Wai Sum Wong,et al. An energy-efficient multipath routing protocol for wireless sensor networks: Research Articles , 2007 .
[134] Maryline Laurent-Maknavicius,et al. SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks , 2007, MSN.
[135] Mohsen Guizani,et al. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.
[136] Jean-Philippe Babau,et al. An Ontology for Attacks in Wireless Sensor Networks , 2007 .
[137] Frederik Armknecht,et al. Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[138] Ricardo Dahab,et al. Identity-Based Encryption for Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[139] Yu-Kwong Kwok,et al. A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[140] Panagiotis Papadimitratos,et al. Efficient and Robust Secure Aggregation for Sensor Networks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.
[141] Levente Buttyán,et al. The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[142] Huafeng Wu,et al. Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[143] Sencun Zhu,et al. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[144] Fu Fei,et al. ASTS: An Agile Secure Time Synchronization Protocol for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[145] Yurong Xu,et al. Analysis of range-free anchor-free localization in a wsn under wormhole attack , 2007, MSWiM '07.
[146] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[147] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[148] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[149] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[150] Andreas Meier,et al. Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks , 2007, DCOSS.
[151] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[152] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[153] Sang Hoon Lee,et al. Event-Driven Power Management for Wireless Sensor Networks , 2007, SEUS.
[154] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[155] Jörg Nolte,et al. A Flexible Scheduling Framework for Deeply Embedded Systems , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[156] C. Bekara,et al. A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks With no Requirements for Trusted Aggregator Nodes , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).
[157] Hairong Qi,et al. A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[158] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[159] Meng-Yen Hsieh,et al. Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..
[160] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[161] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.
[162] Geng Yang,et al. Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[163] Evgeny Osipov,et al. tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks , 2007, NEW2AN.
[164] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[165] Gelareh Taban,et al. Efficient Handling of Adversary Attacks in Aggregation Applications , 2008, ESORICS.
[166] J. Misic,et al. Detection of Sybil Attack in Beacon Enabled IEEE802.15.4 Networks , 2008, 2008 International Wireless Communications and Mobile Computing Conference.
[167] David Richard Raymond. Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols , 2008 .
[168] 李辉,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[169] Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .
[170] Meriel Huggard,et al. An end-to-end routing protocol for peer-to-peer communication in wireless sensor networks , 2008, MiNEMA '08.
[171] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[172] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[173] Michele Zorzi,et al. SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[174] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[175] D. Bernstein. RSA signatures and Rabin – Williams signatures : the state of the art , 2008 .
[176] Qijun Gu,et al. Towards self-propagate mal-packets in sensor networks , 2008, WiSec '08.
[177] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[178] An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.
[179] Mehul Motani,et al. DiMo: distributed node monitoring in wireless sensor networks , 2008, MSWiM '08.
[180] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[181] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.
[182] Sajal K. Das,et al. Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.
[183] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[184] Jean-Philippe Babau,et al. Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[185] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[186] T. Anjali,et al. A game theoretic approach to gray hole attacks in Wireless Mesh Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[187] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[188] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[189] Devu Manikantan Shila,et al. Defending selective forwarding attacks in WMNs , 2008, 2008 IEEE International Conference on Electro/Information Technology.
[190] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[191] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[192] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[193] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[194] Eduardo Freire Nakamura,et al. Sensor stream reduction for clustered wireless sensor networks , 2008, SAC '08.
[195] T.A. Zia,et al. Reputation-based trust management in wireless sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[196] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[197] Theodore B. Zahariadis,et al. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks , 2009, MOBILIGHT.
[198] Jinhui Xu,et al. Towards a theory for securing time synchronization in wireless sensor networks , 2009, WiSec '09.
[199] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[200] Travis Goodspeed. Reversing and Exploiting Wireless Sensors , 2009 .
[201] Wang Chunlei,et al. Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .
[202] Dirk Westhoff,et al. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.
[203] Aline Carneiro Viana,et al. Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.
[204] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[205] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[206] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[207] José Manuel Moya,et al. Intrusion Detection in Sensor Networks Using Clustering and Immune Systems , 2009, IDEAL.
[208] Hong Luo,et al. Entropy-Based Trust Management for Data Collection in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[209] Theodore B. Zahariadis,et al. A novel flexible trust management system for heterogeneous wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[210] Piotr Szczechowiak,et al. TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[211] Indranil Saha,et al. Security against Sybil Attack in Wireless Sensor Network through Location Verification , 2009, ICDCN.
[212] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[213] Fortunato Santucci,et al. Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents , 2009, S-CUBE.
[214] A. C. Viana,et al. Fighting Sinkhole Attacks in Tree-based Routing Topologies , 2009 .
[215] Claudio Soriente,et al. On the difficulty of software-based attestation of embedded devices , 2009, CCS.
[216] Philip Levis,et al. Collection tree protocol , 2009, SenSys '09.
[217] Stamatis Voliotis,et al. An energy and trust-aware routing protocol for large wireless sensor networks , 2009 .
[218] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[219] Mani B. Srivastava,et al. Estimating clock uncertainty for efficient duty-cycling in sensor networks , 2009, TNET.
[220] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[221] K. Q. Yan,et al. A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .
[222] Liang Tang,et al. S-SPIN: A Provably Secure Routing Protocol for Wireless Sensor Networks , 2009, 2009 International Conference on Communication Software and Networks.
[223] Xingming Sun,et al. Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[224] Kasmiran Jumari,et al. Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network , 2009 .
[225] Rosario Gennaro,et al. Making the Diffie-Hellman Protocol Identity-Based , 2010, CT-RSA.
[226] Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks , 2009 .
[227] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[228] Hans-Joachim Hof,et al. Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[229] Young-Koo Lee,et al. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks , 2009, ICUIMC '09.
[230] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[231] Felix C. Freiling,et al. Attacker Models for Wireless Sensor Networks , 2010, it Inf. Technol..
[232] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[233] Neeli R. Prasad,et al. Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices , 2010, Comput. J..
[234] Levente BUTTYA’N. APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION : CHALLENGES AND DESIGN OPTIONS , 2010 .
[235] Yang Geng. An Identity-Based Encryption Scheme for Broadcasting , 2010 .
[236] Wen-Chung Chang,et al. Defending Sybil attacks based on neighboring relations in wireless sensor networks , 2010, Secur. Commun. Networks.
[237] Ahmad-Reza Sadeghi,et al. Lightweight Remote Attestation Using Physical Functions , 2011 .
[238] Markus Ullmann,et al. Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme , 2011, WiSec '11.
[239] Muhammad Ibrahim,et al. SPINS: Security Protocols for Sensor Networks , 2011 .