Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Security issues of mobile ad hoc and sensor networks

L Khelladi, D Djenouri, N Badache - IEEE Communications Surveys …, 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

LEAP+ Efficient security mechanisms for large-scale distributed sensor networks

S Zhu, S Setia, S Jajodia - ACM Transactions on Sensor Networks …, 2006 - dl.acm.org
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management
protocol for sensor networks that is designed to support in-network processing, while at the …

Establishing pairwise keys in distributed sensor networks

D Liu, P Ning, R Li - ACM Transactions on Information and System …, 2005 - dl.acm.org
Pairwise key establishment is a fundamental security service in sensor networks; it enables
sensor nodes to communicate securely with each other using cryptographic techniques …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

S Zhu, S Setia, S Jajodia, P Ning - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
Sensor networks are often deployed in unattended environments, thus leaving these
networks vulnerable to false data injection attacks in which an adversary injects false data …

[PDF][PDF] Key distribution mechanisms for wireless sensor networks: a survey

SA Camtepe, B Yener - Rensselaer Polytechnic Institute, Troy, New York …, 2005 - cs.rpi.edu
Advances in technology introduce new application areas for sensor networks. Foreseeable
wide deployment of mission critical sensor networks creates concerns on security issues …

LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks

I Khalil, S Bagchi, NB Shroff - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation
among nodes to relay each other's packets exposes them to a wide range of security attacks …

Combinatorial design of key distribution mechanisms for wireless sensor networks

SA Camtepe, B Yener - IEEE/ACM Transactions on networking, 2007 - ieeexplore.ieee.org
Secure communications in wireless sensor networks operating under adversarial conditions
require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment …

A survey on key management mechanisms for distributed wireless sensor networks

MA Simplício Jr, PSLM Barreto, CB Margi… - Computer …, 2010 - Elsevier
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …