A source-location privacy protocol in WSN based on locational angle

WP Wang, L Chen, JX Wang - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
In environments where sensor networks are used to monitor sensitive objects or valuable
assets, attackers may use the method of hop-by-hop backtracking to find out the protected …

Privacy and security in biomedical applications of wireless sensor networks

E Stuart, M Moh, TS Moh - 2008 First International Symposium …, 2008 - ieeexplore.ieee.org
Wireless sensor network applications in healthcare and biomedical technology have
received increasing attention, while associated security and privacy issues remain open …

On the security of route discovery in MANETs

M Burmester, B De Medeiros - IEEE Transactions on Mobile …, 2009 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted
broadcast range and resources, and no fixed infrastructure. Communication is achieved by …

Security of wireless sensor networks

DE Burgner, LA Wahsheh - 2011 Eighth International …, 2011 - ieeexplore.ieee.org
Wireless sensor networks have been researched extensively over the past few years. They
were first used by the military for surveillance purposes and have since expanded into …

[HTML][HTML] Modeling and verifying ad hoc routing protocols

M Arnaud, V Cortier, S Delaune - Information and Computation, 2014 - Elsevier
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize
their infrastructure. In such networks, a central issue, addressed by routing protocols, is to …

Mitigating colluding injected attack using monitoring verification in mobile ad‐hoc networks

F Kandah, Y Singh, W Zhang… - Security and …, 2013 - Wiley Online Library
Mobile ad‐hoc networks (MANETs) have attracted significant research attention recently
because of the fast growth of laptops, personal digital assistant, and 802.11/Wi‐Fi wireless …

Colluding injected attack in mobile ad-hoc networks

F Kandah, Y Singh, C Wang - 2011 IEEE Conference on …, 2011 - ieeexplore.ieee.org
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless
networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) …

S-SPIN: a provably secure routing protocol for wireless sensor networks

L Tang, QL Li - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
In this paper, we present a provably secure routing protocol for wireless sensor networks,
called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is …

The security proof of a link-state routing protocol for wireless sensor networks

G Acs, L Buttyán, I Vajda - 2007 IEEE International Conference …, 2007 - ieeexplore.ieee.org
In this paper, we present a flexible and mathematically rigorous modeling framework for
analyzing the security of sensor network routing protocols. Then, we demonstrate the usage …

[PDF][PDF] Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA

M Pura, V Patriciu, I Bica - International Journal of Computers and …, 2009 - academia.edu
Ad hoc networks are a relatively new and promising communication technology. Its key
aspect is represented by the specific routing protocols that assure the ad hoc manner of inter …