Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

FDAC: Toward fine-grained distributed data access control in wireless sensor networks

S Yu, K Ren, W Lou - IEEE transactions on parallel and …, 2010 - ieeexplore.ieee.org
Distributed sensor data storage and retrieval have gained increasing popularity in recent
years for supporting various applications. While distributed architecture enjoys a more …

Data security in unattended wireless sensor networks

R Di Pietro, LV Mancini, C Soriente… - IEEE Transactions …, 2009 - ieeexplore.ieee.org
In recent years, wireless sensor networks (WSNs) have been a very popular research topic,
offering a treasure trove of systems, networking, hardware, security, and application-related …

Blocking objectionable images: adult images and harmful symbols

H Zheng, H Liu, M Daoudi - … and Expo (ICME)(IEEE Cat. No …, 2004 - ieeexplore.ieee.org
This paper describes a practical objectionable image filtering system, aimed at children's
safer Web access. It includes two image filters: adult image filter and harmful symbol filter. In …

[PDF][PDF] Mobility and cooperation to thwart node capture attacks in manets

M Conti, R Di Pietro, LV Mancini, A Mei - EURASIP Journal on Wireless …, 2009 - Springer
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of
networks subject to some unique security issues. In particular, one of the most vexing …

Epidemiological approach for data survivability in unattended wireless sensor networks

JM Bahi, C Guyeux, M Hakem, A Makhoul - Journal of Network and …, 2014 - Elsevier
Unattended wireless sensor networks (UWSNs) are wireless sensor networks characterized
by sporadic sink presence and operation in hostile settings. The absence of the sink for …

United we stand: Intrusion resilience in mobile unattended WSNs

R Di Pietro, G Oligeri, C Soriente… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is …

Security in mobile wireless sensor networks-A survey

Y Ren, VA Oleshchuk, FY Li, X Ge - 2011 - uia.brage.unit.no
Thanks to recent advances in robotics, sensors and wireless communications, it is feasible
to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that …

Intrusion-resilience in mobile unattended WSNs

R Di Pietro, G Oligeri, C Soriente… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources and lack of tamper-resistance. Once a sensor is …