Reliability of wireless sensors with code attestation for intrusion detection
References (27)
- L. Choi, K. Choi, J. Kim, B.J. Park, Virtual sink rotation: Low-energy scalable routing protocol for ubiquitous sensor...
- N. Ramanathan, M. Yarvis, J. Chhabra, N. Kushalnagar, L. Krishnamurthy, D. Estrin, A stream-oriented power management...
- et al.
Medium access control with coordinated adaptive sleeping for wireless sensor networks
IEEE Transactions on Networking
(June 2004) - et al.
Event-driven power management for wireless sensor networks
- M. Mathews, M. Song, S. Shetty, R. McKenzie, Detecting compromised nodes in wireless sensor networks, in: 8th ACIS...
- et al.
A survey of secure wireless ad hoc routing
IEEE Security & Privacy Magazine
(May–June 2004) - C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: 1st IEEE...
- et al.
Security in wireless sensor networks
Communications of the ACM
(2004) - et al.
Designing secure sensor networks
IEEE Wireless Communications
(Dec. 2004) - G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in:...
Denial of service in sensor networks
IEEE Computer
(Oct. 2002)
Cited by (13)
Scale-free topology evolution for wireless sensor networks
2013, Computers and Electrical EngineeringCitation Excerpt :In addition, natural disaster and deliberate attack will lead WSNs being collapsed easily. Therefore, how to improve the survivability of network is an important concern in the study of WSNs [5–9]. Survivability is the ability of the network to maintain or recover essential services when the network is influenced by limited energy, harsh environment or deliberately attacked [10].
DADS: Decentralized attestation for device swarms
2019, ACM Transactions on Privacy and SecurityReliability assessment of photovoltaic wireless sensor networks for forest fire propagation detection
2018, International Journal of Modelling and SimulationUnity is strength! combining attestation and measurements inspection to handle malicious data injections in WSNs
2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017A survey on energy efficient intrusion detection in wireless sensor networks
2017, Journal of Ambient Intelligence and Smart EnvironmentsAttestation in Wireless Sensor Networks: A survey
2016, ACM Computing Surveys
Copyright © 2010 Elsevier B.V. All rights reserved.