Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing …
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a …
A Perrig, R Szewczyk, V Wen, D Culler… - Proceedings of the 7th …, 2001 - dl.acm.org
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and …
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network …
This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research …
H Chan, A Perrig, D Song - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …
P Levis, S Madden, J Polastre, R Szewczyk… - Ambient …, 2005 - Springer
We present TinyOS, a flexible, application-specific operating system for sensor networks, which form a core component of ambient intelligence systems. Sensor networks consist of …
YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …