After finishing the literature in the Wireless Sensor Network (WSN) security area, the security architecture (security map) of security issues in WSN is drawn as in the following figure:
Figure 1: Security Architecture for WSN.
Also, the security areas in WSN can be categorized into seven categories. Details about these categories are listed in the following table:
Categories |
Sub-categories | Publications |
Survey. | Generic | [1] [2] [3] [4][5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] |
Secure Routing | [17] [18] |
|
Secure Aggregation | [19] [20] |
|
Secure Localization | [21] [22] |
|
Cryptography. | Asymmetric | [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] |
Symmetric | [36] [37] [38] |
|
Secure Data Aggregation. | - | [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] |
Secure Routing. | - | [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] |
Key Management. | Probabilistic | [96] [97] [98] [99] [100] [101] [99] [102] [103] [104] [105] [106] [107] [108] [109] |
Deterministic | [110] [111] [112] |
|
Location Aware Security. | Location Verification | [113] [114] [115] [116] [117] [118] [119] [120] [121] [122] [123] [124] [125] |
Attacks | Sybil | [72] [73] [74] [75] [76] [75] |
Wormhole | [77] [78] [79] [80] [81] [82] [83] [84] [85] [86] |
|
DOS | [87] [88] [89] [90] [91] |
|
Node Replication | [92] |
|
Node Compromise | [93] [94] [95] |
Hint: this table is still under ongoing update/review and can be downloaded in pdf format from here. Please update us with any missing publications. All the contact details can be found in the top right menu.
References:
[1] Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
[2] Frank Stajano and Ross J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194. Springer, 1999.
[3] M. Chen, W. Cui, V. Wen, and A. Woo. Security and deployment issues in a sensor network, 2000.
[4] David Carman, Peter Kruus, and Brian Matt. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, 2000.
[5] Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, and Mani B. Srivastava. On communication security in wireless ad-hoc sensor networks. In WETICE, pages 139-144. IEEE Computer Society, 2002.
[6] Adrian Perrig, John A. Stankovic, and David Wagner. Security in wireless sensor networks. Comm.. ACM, 47(6):53-57, 2004.
[7] Naveen Sastry and David Wagner. Security considerations for ieee 802.15.4 networks. In Jakobsson and Perrig [126], pages 32-42.
[8] Fei Hu and Neeraj K. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1):69-89, 2005.
[9] K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wilson, and Mohamed Eltoweissy. Towards a new paradigm for securing wireless sensor networks. In Christian Hempelmann and Victor Raskin, editors, NSPW, pages 115-121. ACM, 2003.
[10] Tanveer Zia and Albert Y. Zomaya. A secure triple-key management scheme for wireless sensor networks. In INFOCOM [127].
[11] Rodrigo Roman, M. Carmen Fernández Gago, and Javier Lopez. A survey on the applicability of trust management systems for wireless sensor networks. In Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), pages 25-30, Istanbul, Turkey, 2007. IEEE.
[12] Rodrigo Roman, Cristina Alcaraz, and Javier Lopez. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. MONET, 12(4):231-244, 2007.
[13] Rodrigo Roman, M. Carmen Fernández Gago, and Javier Lopez. Featuring trust and reputation management systems for constrained hardware devices. In F. Davide, editor, Autonomics, volume 302 of ACM International Conference Proceeding Series, page 6. ACM, 2007.
[14] Rodrigo Roman, Jianying Zhou, and Javier Lopez. On the security of wireless sensor networks. In Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngsong Mun, David Taniar, and Chih Jeng Kenneth Tan, editors, ICCSA (3), volume 3482 of Lecture Notes in Computer Science, pages 681-690. Springer, 2005.
[15] Rodrigo Roman, Cristina Alcaraz, and Javier Lopez. The role of wireless sensor networks in the area of critical information infrastructure protection. Information Security Technical Report, 12(1):24-31, 2007.
[16] Tanveer Zia and Albert Zomaya. A security framework for wireless sensor networks. In In the proceedings of the IEEE Sensors Applications Symposium (SAS06), pages 49-53, Houston, Texas, 2007. IEEE.
[17] Chris Karlof and David Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3):293-315, 2003.
[18] Yih Chun Hu and Adrian Perrig. A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3):28-39, 2004.
[19] Hani Alzaid, Ernest Foo, and Juan Manuel Gonzalez Nieto. Secure data aggregation in wireless sensor network: a survey. In Ljiljana Brankovic and Mirka Miller, editors, Sixth Australasian Information Security Conference (AISC 2008), volume 81 of CRPIT, pages 93-105, Wollongong, NSW, Australia, 2008. ACS.
[20] Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan, and Naixue Xiong. Secure data aggregation in wireless sensor networks: A survey. In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06), pages 315-320, Washington, DC, USA, 2006. IEEE Computer Society.
[21] Avinash Srinivasan and Jie Wu. A survey on secure localization in wireless sensor networks, 2007.
[22] Tanveer Zia and Albert Zomaya. Secure localization in wireless sensor networks. In In the proceedings of the Asian Conference on Communication Systems and Networks (AsiaCSN 2007), pages -, Phuket, Thailand, 2007.
[23] Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede. Low-cost elliptic curve cryptography for wireless sensor networks. In Buttyán et al. [128], pages 6-17.
[24] Erik-Oliver Blaÿ and Martina Zitterbart. Towards acceptable public-key encryption in sensor networks. In Soraya Kouadri Mostéfaoui and Zakaria Maamar, editors, IWUC, pages 88-93. INSTICC Press, 2005.
[25] Leif Uhsadel, Axel Poschmann, and Christof Paar. Enabling full-size public-key algorithms on 8-bit sensor nodes. In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, ESAS, volume 4572 of Lecture Notes in Computer Science, pages 73-86. Springer, 2007.
[26] Ronald J. Watro, Derrick Kong, Sue fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus. Tinypk: securing sensor networks with public key technology. In Setia and Swarup [129], pages 59-64.
[27] Mathias Bohge and Wade Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Maughan and Perrig [130], pages 79-87.
[28] Gunnar Gaubatz, Jens-Peter Kaps, and Berk Sunar. Public key cryptography in sensor networks - revisited. In Castelluccia et al. [131], pages 2-18.
[29] David Malan. Crypto for tiny objects. Technical Report TR-04-04, Harvard University, 2004.
[30] D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography, 2004.
[31] G. Gaubatz, J. P. Kaps, E. Ozturk, and B. Sunar. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, pages 146-150, 2005.
[32] Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling Chang Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper). In PerCom, pages 247-256. IEEE Computer Society, 2005.
[33] Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang Shantz, and Vipul Gupta. Architectural extensions for elliptic curve cryptography over gf(2m) on 8-bit microprocessors. In ASAP, pages 343-349. IEEE Computer Society, 2005.
[34] Javier Lopez. Unleashing public-key cryptography in wireless sensor networks. Journal of Computer Security, 14(5):469-482, 2006.
[35] An Liu and Peng Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN, pages 245-256. IEEE Computer Society, 2008.
[36] Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In John A. Stankovic, Anish Arora, and Ramesh Govindan, editors, SenSys, pages 162-175. ACM, 2004.
[37] Stefan Schmidt, Holger Krahn, Stefan Fischer, and Dietmar Wätjen. A security architecture for mobile wireless sensor networks. In Castelluccia et al. [131], pages 166-177.
[38] Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller, and Mihail L. Sichitiu. Analyzing and modeling encryption overhead for sensor network nodes. In C. S. Raghavendra, Krishna M. Sivalingam, Ramesh Govindan, and Parmesh Ramanathan, editors, Wireless Sensor Networks and Applications, pages 151-159. ACM, 2003.
[39] H. Ozagur Sanli, Suat Ozdemir, and Hassan Cam. SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks. In VTC2004-Fall, pages 4650- 4654, 2004.
[40] Kui Wu, Dennis Dreef, Bo Sun, and Yang Xiao. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks, 5(1):100-111, 2007.
[41] Ajay Mahimkar and Theodore S. Rappaport. SecureDAV: A secure data aggregation and verication protocol for sensor networks. In Global Telecommunications Conference, volume 4, pages 2175-2179, 2004.
[42] Haowen Chan, Adrian Perrig, and Dawn Song. Secure hierarchical in network aggregation in sensor networks. In ACM Conference on Computer and Communications Security, pages 278-287, 2006.
[43] Pawan Jadia and Anish Mathuria. Efficient secure aggregation in sensor networks. In HiPC, pages 40-49, 2004.
[44] Melek Önen and Rek Molva. Secure data aggregation with multiple encryption. In Koen Langendoen and Thiemo Voigt, editors, EWSN, volume 4373 of Lecture Notes in Computer Science, pages 117-132. Springer, 2007.
[45] Lingxuan Hu and David Evans. Secure aggregation for wireless network. In SAINT Workshops [132], pages 384-394.
[46] Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney. A witness-based approach for data fusion assurance in wireless sensor networks. In IEEE Global Communications Conference (GLOBECOM), volume 3, pages 1435- 1439, 2003.
[47] Bartosz Przydatek, Dawn Xiaodong Song, and Adrian Perrig. SIA: Secure information aggregation in sensor networks. In Akyildiz et al. [133], pages 255-265.
[48] David Wagner. Resilient aggregation in sensor networks. In Setia and Swarup [129], pages 78-87.
[49] Dirk Westho, Joao Girao, and Mithun Acharya. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 05(10):1417-1431, 2006.
[50] Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN, 3(3), 2007.
[51] Yi Yang, Xinran Wang, Sencun Zhu, and Guohong Cao. SDAP: : a secure hop-by-hop data aggregation protocol for sensor networks. In Palazzo et al. [134], pages 356-367.
[52] Tieyan Li, Yongdong Wu, and Huafei Zhu. An efficient scheme for encrypted data aggregation on sensor networks. In VTC Spring, pages 831-835. IEEE, 2006.
[53] Jing Deng, Richard Han, and Shivakant Mishra. Security support for in network processing in wireless sensor networks. In Setia and Swarup [135], pages 83-93.
[54] Haowen Chan, Adrian Perrig, Bartosz Przydatek, and Dawn Xiaodong Song. SIA: secure information aggregation in sensor networks. Journal of Computer Security, 15(1):69-102, 2007.
[55] Sergio D. Servetto and Guillermo Barrenechea. Constrained random walks on random graphs: routing algorithms for large scale wireless sensor networks. In Raghavendra and Sivalingam [136], pages 12-21.
[56] David Braginsky and Deborah Estrin. Rumor routing algorithm for sensor networks. In Raghavendra and Sivalingam [136], pages 22-31.
[57] Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens. An on-demand secure routing protocol resilient to byzantine failures. In W. Douglas Maughan and Nitin H. Vaidya, editors, Workshop on Wireless Security, pages 21-30. ACM, 2002.
[58] Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, and Herbert Rubens. Dynamics of learning algorithms for the on-demand secure byzantine routing protocol. In Buttyán et al. [128], pages 98-112.
[59] Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, and Wade Trappe. Sear: a secure e-cient ad hoc on demand routing protocol for wireless networks. In Abe and Gligor [137], pages 201-204.
[60] Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig. Secure sensor network routing: a clean-slate approach. In Christophe Diot and Mostafa H. Ammar, editors, CoNEXT, page 11. ACM, 2006.
[61] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, 2005.
[62] Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1):175-192, 2003.
[63] Panagiotis Papadimitratos, Zygmunt J. Haas, and Jean-Pierre Hubaux. How to specify and how to prove correctness of secure routing protocols for manet. In BROADNETS. IEEE, 2006.
[64] Panagiotis Papadimitratos and Zygmunt J. Haas. Secure link state routing for mobile ad hoc networks. In SAINT Workshops [132], pages 379-383.
[65] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. A secure routing protocol for ad hoc networks. In ICNP, pages 78-89. IEEE Computer Society, 2002.
[66] Alec Woo, Terence Tong, and David E. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In Akyildiz et al. [133], pages 14-27.
[67] Jing Deng, Richard Han, and Shivakant Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Feng Zhao and Leonidas J. Guibas, editors, IPSN, volume 2634 of Lecture Notes in Computer Science, pages 349-364. Springer, 2003.
[68] Jing Deng, Richard Han, and Shivakant Mishra. Insens: Intrusion tolerant routing for wireless sensor networks. Computer Communications, 29(2):216-230, 2006.
[69] Xiaoyun Wang, Lizhen Yang, and Kefei Chen. Sdd: Secure distributed diffusion protocol for sensor networks. In Castelluccia et al. [131], pages 205-214.
[70] Anthony D. Wood, Lei Fang, John A. Stankovic, and Tian He. Sigf: a family of configurable, secure routing protocols for wireless sensor networks. In Sencun Zhu and Donggang Liu, editors, SASN, pages 35-48. ACM, 2006.
[71] Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, and Wade Trappe. Sear: a secure e-cient ad hoc on demand routing protocol for wireless networks. In Abe and Gligor [137], pages 201-204.
[72] James Newsome, Elaine Shi, Dawn Xiaodong Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses. In Kannan Ramchandran, Janos Sztipanovits, Jennifer C. Hou, and Thrasyvoulos N. Pappas, editors, IPSN, pages 259-268. ACM, 2004.
[73] Qinghua Zhang, Pan Wang, Douglas S. Reeves, and Peng Ning. Defending against sybil attacks in sensor networks. In ICDCS Workshops, pages 185-191. IEEE Computer Society, 2005.
[74] Murat Demirbas and Youngwhan Song. An rssi-based scheme for sybil attack detection in wireless sensor networks. In WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pages 564-570, Washington, DC, USA, 2006. IEEE Computer Society.
[75] Rajani Muraleedharan, Yanjun Yan, and Lisa Ann Osadciw. Detecting sybil attacks in image senor network using cognitive intelligence. In Silvia Giordano, Stephan Olariu, and David Simplot-Ryl, editors, Sensor and Actor Networks, pages 59-60. ACM, 2007.
[76] Debapriyay Mukhopadhyay and Indranil Saha. Location verification based defense against sybil attack in sensor networks. In Soma Chaudhuri, Samir R. Das, Himadri S. Paul, and Srikanta Tirthapura, editors, ICDCN, volume 4308 of Lecture Notes in Computer Science, pages 509-521. Springer, 2006.
[77] Weichao Wang, Jiejun Kong, Bharat K. Bhargava, and Mario Gerla. Visualisation of wormholes in underwater sensor networks: a distributed approach. IJSN, 3(1):10-23, 2008.
[78] Weichao Wang, Bharat K. Bhargava, Yi Lu, and Xiaoxin Wu. Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6:483-503, 2006.
[79] Weichao Wang and Bharat K. Bhargava. Visualization of wormholes in sensor networks. In Jakobsson and Perrig [126], pages 51-60.
[80] Maria Gorlatova. Review of existing wormhole attack discovery techniques. Technical Report ADA462894, OTTAWA University, 2006.
[81] Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim, and Seung-Woo Seo. Wodem: Wormhole attack defense mechanism in wireless sensor networks. In Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, and Seong-Dong Kim, editors, ICUCT, volume 4412 of Lecture Notes in Computer Science, pages 200-209. Springer, 2006.
[82] Ritesh Maheshwari, Jie Gao, and Samir R. Das. Detecting wormhole attacks in wireless networks using connectivity information. In INFOCOM, pages 107-115. IEEE, 2007.
[83] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):370-380, 2006.
[84] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM, 2003.
[85] Lingxuan Hu and David Evans. Using directional antennas to prevent wormhole attacks. In NDSS. The Internet Society, 2004.
[86] Hani Alzaid, Suhail Abanmi, Salil Kanhere, and Chun Tung Chou. BANAID: a sensor network testbed for wormhole attacks. In AusCERT, 2008.
[87] Anthony D. Wood and John A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
[88] Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, and Jayan Krishnaswami. Denial-of-service attacks on battery-powered mobile computers. In PerCom, pages 309-318. IEEE Computer Society, 2004.
[89] Jonathan M. McCune, Elaine Shi, Adrian Perrig, and Michael K. Reiter. Detection of denial-of-message attacks on sensor network broadcasts. In IEEE Symposium on Security and Privacy [138], pages 64-78.
[90] Peng Ning, An Liu, and Wenliang Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. TOSN, 4(1):1-35, 2008.
[91] Qi Dong, Donggang Liu, and Peng Ning. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. In Virgil D. Gligor, Jean-Pierre Hubaux, and Radha Poovendran, editors, WISEC, pages 2-12. ACM, 2008.
[92] Bryan Parno, Adrian Perrig, and Virgil D. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy [138], pages 49-63.
[93] Yi Yang, Xinran Wang, Sencun Zhu, and Guohong Cao. Distributed software-based attestation for node compromise detection in sensor networks. In SRDS, pages 219-230. IEEE Computer Society, 2007.
[94] Tanveer Zia and Albert Zomaya. A malicious node detection mechanism in wireless sensor networks. In In the proceedings of the International Conference on Network Security (ICONS 2007), pages 273-281, Erode, India, 2007.
[95] Qing Zhang, Ting Yu, and Peng Ning. A framework for identifying compromised nodes in wireless sensor networks. ACM Transactions on Information System Security (TISSEC)., 11(3):1-37.
[96] Laurent Eschenauer and Virgil D. Gligor. A key-management scheme for distributed sensor networks. In Vijayalakshmi Atluri, editor, ACM Conference on Computer and Communications Security, pages 41-47. ACM, 2002.
[97] Haowen Chan, Adrian Perrig, and Dawn Xiaodong Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-. IEEE Computer Society, 2003.
[98] Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Random key assignment for secure wireless sensor networks. In Setia and Swarup [135], pages 62-71.
[99] Donggang Liu and Peng Ning. Location-based pairwise key establishments for static sensor networks. In Setia and Swarup [135], pages 72-82.
[100] Qi Dong and Donggang Liu. Using auxiliary sensors for pairwise key establishment in wsn. In Ian F. Akyildiz, Raghupathy Sivakumar, Eylem Ekici, Jaudelice Cavalcante de Oliveira, and Janise McNair, editors, Networking, volume 4479 of Lecture Notes in Computer Science, pages 251-262. Springer, 2007.
[101] Donggang Liu, Peng Ning, and Rongfang Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, 2005.
[102] Wensheng Zhang, Minh Tran, Sencun Zhu, and Guohong Cao. A random perturbation-based scheme for pairwise key establishment in sensor networks. In Evangelos Kranakis, Elizabeth M. Belding, and Eytan Modiano, editors, MobiHoc, pages 90-99. ACM, 2007.
[103] Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, and Tom La Porta. Establishing pair-wise keys in heterogeneous sensor networks. In INFOCOM [127].
[104] Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In ICNP, pages 326-335. IEEE Computer Society, 2003.
[105] Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258, 2005.
[106] Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
[107] Ross J. Anderson, Haowen Chan, and Adrian Perrig. Key infection: Smart trust for smart dust. In ICNP, pages 206-215. IEEE Computer Society, 2004.
[108] Joengmin Hwang and Yongdae Kim. Revisiting random key predistribution schemes for wireless sensor networks. In Setia and Swarup [129], pages 43-52.
[109] Haowen Chan and Adrian Perrig. Pike: peer intermediaries for key establishment in sensor networks. In INFOCOM [139], pages 524-535.
[110] Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, and Paul J. M. Havinga. Lkhw: A directed diusion-based secure multicast scheme for wireless sensor networks. In ICPP Workshops, pages 397-. IEEE Computer Society, 2003.
[111] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. TOSN, 2(4):500- 528, 2006.
[112] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In Sushil Jajodia, Vijayalakshmi Atluri, and Trent Jaeger, editors, ACM Conference on Computer and Communications Security, pages 62-72. ACM, 2003.
[113] Naveen Sastry, Umesh Shankar, and David Wagner. Secure verification of location claims. In Maughan and Perrig [130], pages 1-10.
[114] Loukas Lazos and Radha Poovendran. Serloc: Robust localization for wireless sensor networks. TOSN, 1(1):73-100, 2005.
[115] Loukas Lazos and Radha Poovendran. Serloc: secure range-independent localization for wireless sensor networks. In Jakobsson and Perrig [126], pages 21-30.
[116] Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, and Ahmed Helmy. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In Akyildiz et al. [133], pages 324-325.
[117] Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, and Mani B. Srivastava. Secure location verication with hidden and mobile base stations. IEEE Trans. Mob. Comput., 7(4):470-483, 2008.
[118] Srdjan Capkun, Mario Cagalj, and Mani B. Srivastava. Secure localization with hidden and mobile base stations. In INFOCOM [127].
[119] Srdjan Capkun and Jean-Pierre Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):221-232, 2006.
[120] Zang Li, Wade Trappe, Yanyong Zhang, and Badri Nath. Robust statistical methods for securing wireless localization in sensor networks. In IPSN [140], pages 91-98.
[121] Donggang Liu, Peng Ning, and Wenliang Du. Attack-resistant location estimation in sensor networks. In IPSN [140], pages 99-106.
[122] Donggang Liu, Peng Ning, and Wenliang Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In ICDCS, pages 609-619. IEEE Computer Society, 2005.
[123] Lei Fang, Wenliang Du, and Peng Ning. A beacon-less location discovery scheme for wireless sensor networks. In INFOCOM [139], pages 161-171.
[124] Wenliang Du, Lei Fang, and Peng Ning. Lad: Localization anomaly detection for wireless sensor networks. In IPDPS. IEEE Computer Society, 2005.
[125] Wenliang Du, Lei Fang, and Peng Ning. Lad: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput., 66(7):874-886, 2006.
[126] Markus Jakobsson and Adrian Perrig, editors. Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004. ACM, 2004.
[127] INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain. IEEE, 2006.
[128] Levente Buttyán, Virgil D. Gligor, and Dirk Westho, editors. Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, volume 4357 of Lecture Notes in Computer Science. Springer, 2006.
[129] Sanjeev Setia and Vipin Swarup, editors. Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004. ACM, 2004.
[130] W. Douglas Maughan and Adrian Perrig, editors. Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003. ACM, 2003.
[131] Claude Castelluccia, Hannes Hartenstein, Christof Paar, and Dirk Westho, editors. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, volume 3313 of Lecture Notes in Computer Science. Springer, 2005.
[132] 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings. IEEE Computer Society, 2003.
[133] Ian F. Akyildiz, Deborah Estrin, David E. Culler, and Mani B. Srivastava, editors. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003. ACM, 2003.
[134] Sergio Palazzo, Marco Conti, and Raghupathy Sivakumar, editors. Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006. ACM, 2006.
[135] Sanjeev Setia and Vipin Swarup, editors. Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003. ACM, 2003.
[136] Cauligi S. Raghavendra and Krishna M. Sivalingam, editors. Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, WSNA 2002, Atlanta, Georgia, USA, September 28, 2002. ACM, 2002.
[137] Masayuki Abe and Virgil D. Gligor, editors. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. ACM, 2008.
[138] 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA. IEEE Computer Society, 2005.
[139] INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA. IEEE, 2005.
[140] Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, April 25-27, 2005, UCLA, Los Angeles, California, USA. IEEE, 2005.