Have a personal or library account? Click to login
Adaptive Security Modules in Incrementally Deployed Sensor Networks Cover

Adaptive Security Modules in Incrementally Deployed Sensor Networks

Open Access
|Dec 2017

References

  1. [1]A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no. 5, pp. 521-534 (2002).
  2. [2]B. Doyle, S. Bell, A. F. Smeaton, K. McCusker, and N. O’Connor., “Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks”, The Computer Journal, vol. 49, no. 4, pp. 443-453 (2006).
  3. [3]L.B. Oliveira, H.C. Wong, Antonio A. F. Loureiro, and Ricardo Dahab, “On the Design of Secure Protocols for Hierarchical Sensor Networks”, International Journal of Security and Networks, vol. 2, no.3/4, pp. 216-227 (2007).10.1504/IJSN.2007.013175
  4. [4]Y. P. Chen, A. L. Liestman, and J. Liu, “Clustering algorithms for ad hoc wireless networks”, Ad Hoc and Sensor Networks 2004.
  5. [5]W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proc. of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. (2000).
  6. [6]C.C. Su, K.M. Chang, M.F. Horng, and Y.H. Kuo, “The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks”, IEEE Wireless Communications and Networking Conference, Mar. 2005.
  7. [7]S. Sanyal el etc, “Security Scheme for Distributed DoS in Mobile Ad Hoc Networks”, Lecture Notes in Computer Science, vol. 3326, pp.541 (2004).10.1007/978-3-540-30536-1_68
  8. [8]I. Khalil, S. Bagchi, and N.B. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Network”, International Conference on Dependable Systems and Networks (2005).
  9. [9]K. Akkaya and M. Younis, “A Survey of Routing Protocols in Wireless Sensor Networks”, Elsevier Ad Hoc Network Journal, vol. 3/3 pp. 325-349 (2005).10.1016/j.adhoc.2003.09.010
  10. [10]Q. Xue, and A. Ganz, “Runtime Security Composition for Sensor Networks”, Proc. of IEEE Vehicular Technology Conference, Oct. (2003).10.1109/VETECF.2003.1286169
  11. [11]M. Boghe, and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks”, Proc. of the 2003 ACM Workshop on Wireless Security, pp. 79-87 (2003).10.1145/941311.941324
Language: English
Page range: 70 - 86
Published on: Dec 13, 2017
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2017 Meng-Yen Hsieh, Yueh-Min Huang, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.