Tabla de Contenidos:
  • Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye [and others]
  • Location tracking attack in ad hoc networks based on topology information / Boto Bako [and others]
  • Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das
  • Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka
  • Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur
  • Secure multi-path data delivery in sensor networks / Dijiang Huang
  • SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong
  • Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero
  • C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen
  • Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic
  • Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou
  • ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe
  • Secure k-connectivity properties of wireless sensor networks / Yee Wei Law [and others]
  • Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung
  • Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš
  • Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić
  • Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao
  • Practical user access control in sensor networks / HaodongWang and Qun Li.