Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Security issues of mobile ad hoc and sensor networks

L Khelladi, D Djenouri, N Badache - IEEE Communications Surveys …, 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

SPINS: Security protocols for sensor networks

A Perrig, R Szewczyk, V Wen, D Culler… - Proceedings of the 7th …, 2001 - dl.acm.org
As sensor networks edge closer towards wide-spread deployment, security issues become a
central concern. So far, much research has focused on making sensor networks feasible and …

Wireless mesh networks: a survey

IF Akyildiz, X Wang, W Wang - Computer networks, 2005 - Elsevier
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh
routers have minimal mobility and form the backbone of WMNs. They provide network …

[图书][B] Wireless sensor networks

IF Akyildiz, MC Vuran - 2010 - books.google.com
This book presents an in-depth study on the recent advances in Wireless Sensor Networks
(WSNs). The authors describe the existing WSN applications and discuss the research …

Random key predistribution schemes for sensor networks

H Chan, A Perrig, D Song - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
Key establishment in sensor networks is a challenging problem because asymmetric key
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …

TinyOS: An operating system for sensor networks

P Levis, S Madden, J Polastre, R Szewczyk… - Ambient …, 2005 - Springer
We present TinyOS, a flexible, application-specific operating system for sensor networks,
which form a core component of ambient intelligence systems. Sensor networks consist of …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Packet leashes: a defense against wormhole attacks in wireless networks

YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …