default search action
SASN 2006: Alexandria, VA, USA
- Sencun Zhu, Donggang Liu:
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-554-1
Trust, access control and privacy
- Shu Chen, Yu Zhang, Wade Trappe:
Inverting sensor networks and actuating the environment for spatio-temporal access control. 1-12 - Xiaoxin Wu, Ninghui Li:
Achieving privacy in mesh networks. 13-22 - Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
Robust cooperative trust establishment for MANETs. 23-34
Secure routing
- Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He:
SIGF: a family of configurable, secure routing protocols for wireless sensor networks. 35-48 - Gergely Ács, Levente Buttyán, István Vajda:
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. 49-58 - Suk-Bok Lee, Yoon-Hwa Choi:
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. 59-70
Secure data aggregation and transmission
- Sankardas Roy, Sanjeev Setia, Sushil Jajodia:
Attack-resilient hierarchical data aggregation in sensor networks. 71-82 - Levente Buttyán, Péter Schaffer, István Vajda:
RANBAR: RANSAC-based resilient aggregation in sensor networks. 83-90 - Mahdi Kefayati, Hamid R. Rabiee, Seyed Ghassem Miremadi, Ahmad Khonsari:
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. 91-100
Attacks and countermeasures
- Abdulrahman Alarifi, Wenliang Du:
Diversify sensor nodes to improve resilience against node compromise. 101-112 - Mario Strasser, Harald Vogt:
Autonomous and distributed node recovery in wireless sensor networks. 113-122 - Yongjin Kim, Ahmed Helmy:
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. 123-134 - Svetlana Radosavac, John S. Baras, George V. Moustakides:
Impact of optimal MAC layer attacks on the network layer. 135-146
Broadcast authentication and key management
- Mark Luk, Adrian Perrig, Bram Whillock:
Seven cardinal properties of sensor network broadcast authentication. 147-156 - Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean Wang:
Location-aware key predistribution scheme for wide area wireless sensor networks. 157-168 - Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter:
How public key cryptography influences wireless sensor node lifetime. 169-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.