A source-location privacy protocol in WSN based on locational angle
In environments where sensor networks are used to monitor sensitive objects or valuable
assets, attackers may use the method of hop-by-hop backtracking to find out the protected …
assets, attackers may use the method of hop-by-hop backtracking to find out the protected …
Privacy and security in biomedical applications of wireless sensor networks
E Stuart, M Moh, TS Moh - 2008 First International Symposium …, 2008 - ieeexplore.ieee.org
Wireless sensor network applications in healthcare and biomedical technology have
received increasing attention, while associated security and privacy issues remain open …
received increasing attention, while associated security and privacy issues remain open …
On the security of route discovery in MANETs
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted
broadcast range and resources, and no fixed infrastructure. Communication is achieved by …
broadcast range and resources, and no fixed infrastructure. Communication is achieved by …
Security of wireless sensor networks
DE Burgner, LA Wahsheh - 2011 Eighth International …, 2011 - ieeexplore.ieee.org
Wireless sensor networks have been researched extensively over the past few years. They
were first used by the military for surveillance purposes and have since expanded into …
were first used by the military for surveillance purposes and have since expanded into …
[HTML][HTML] Modeling and verifying ad hoc routing protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize
their infrastructure. In such networks, a central issue, addressed by routing protocols, is to …
their infrastructure. In such networks, a central issue, addressed by routing protocols, is to …
Mitigating colluding injected attack using monitoring verification in mobile ad‐hoc networks
Mobile ad‐hoc networks (MANETs) have attracted significant research attention recently
because of the fast growth of laptops, personal digital assistant, and 802.11/Wi‐Fi wireless …
because of the fast growth of laptops, personal digital assistant, and 802.11/Wi‐Fi wireless …
Colluding injected attack in mobile ad-hoc networks
F Kandah, Y Singh, C Wang - 2011 IEEE Conference on …, 2011 - ieeexplore.ieee.org
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless
networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) …
networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) …
S-SPIN: a provably secure routing protocol for wireless sensor networks
L Tang, QL Li - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
In this paper, we present a provably secure routing protocol for wireless sensor networks,
called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is …
called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is …
The security proof of a link-state routing protocol for wireless sensor networks
In this paper, we present a flexible and mathematically rigorous modeling framework for
analyzing the security of sensor network routing protocols. Then, we demonstrate the usage …
analyzing the security of sensor network routing protocols. Then, we demonstrate the usage …
[PDF][PDF] Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA
Ad hoc networks are a relatively new and promising communication technology. Its key
aspect is represented by the specific routing protocols that assure the ad hoc manner of inter …
aspect is represented by the specific routing protocols that assure the ad hoc manner of inter …