TY - CHAP AU - Chan, H. AU - Perrig, A. AU - Song, D. PY - 2003 DA - 2003// TI - Random key predistribution schemes for sensor networks BT - Proceedings of the IEEE Symposium on Security and Privacy (S&P '03) ID - Chan2003 ER - TY - CHAP AU - Newsome, J. AU - Shi, E. AU - Song, D. AU - Perrig, A. PY - 2004 DA - 2004// TI - The sybil attack in sensor networks: analysis & defenses BT - Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04) ID - Newsome2004 ER - TY - CHAP AU - Demirbas, M. AU - Song, Y. PY - 2006 DA - 2006// TI - An RSSI-based scheme for sybil attack detection in wireless sensor networks BT - Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '06) ID - Demirbas2006 ER - TY - JOUR AU - Di Pietro, R. AU - Mancini, L. V. AU - Mei, A. PY - 2006 DA - 2006// TI - Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks JO - Wireless Networks VL - 12 UR - https://doi.org/10.1007/s11276-006-6530-5 DO - 10.1007/s11276-006-6530-5 ID - Di Pietro2006 ER - TY - CHAP AU - Conti, M. AU - Di Pietro, R. AU - Mancini, L. V. AU - Mei, A. PY - 2007 DA - 2007// TI - A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks BT - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07) UR - https://doi.org/10.1145/1288107.1288119 DO - 10.1145/1288107.1288119 ID - Conti2007 ER - TY - CHAP AU - Parno, B. AU - Perrig, A. AU - Gligor, V. D. PY - 2005 DA - 2005// TI - Distributed detection of node replication attacks in sensor networks BT - Proceedings of the IEEE Symposium on Security and Privacy (S&P '05) ID - Parno2005 ER - TY - STD TI - Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA) BAA 07-46 LANdroids Broad Agency Announcement, 2007, http://www.darpa.mil/index.html UR - http://www.darpa.mil/index.html ID - ref7 ER - TY - JOUR AU - Perrig, A. AU - Stankovic, J. AU - Wagner, D. PY - 2004 DA - 2004// TI - Security in wireless sensor networks JO - Commununications of ACM VL - 47 UR - https://doi.org/10.1145/990680.990707 DO - 10.1145/990680.990707 ID - Perrig2004 ER - TY - CHAP AU - Capkun, S. AU - Hubaux, J. -. P. AU - Buttyán, L. PY - 2003 DA - 2003// TI - Mobility helps security in ad hoc networks BT - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '03) UR - https://doi.org/10.1145/778415.778422 DO - 10.1145/778415.778422 ID - Capkun2003 ER - TY - CHAP AU - Piro, C. AU - Shields, C. AU - Levine, B. N. PY - 2006 DA - 2006// TI - Detecting the sybil attack in mobile ad hoc networks BT - Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm '06) ID - Piro2006 ER - TY - CHAP AU - Broch, J. AU - Maltz, D. A. AU - Johnson, D. B. AU - Hu, Y. -. C. AU - Jetcheva, J. PY - 1998 DA - 1998// TI - A performance comparison of multi-hop wireless ad hoc network routing protocols BT - Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '98) UR - https://doi.org/10.1145/288235.288256 DO - 10.1145/288235.288256 ID - Broch1998 ER - TY - CHAP AU - Sharma, G. AU - Mazumdar, R. AU - Shroff, N. B. PY - 2006 DA - 2006// TI - Delay and capacity trade-offs in mobile ad hoc networks: a global perspective BT - Proceedings of the 25th Conference on Computer Communications (INFOCOM '06) ID - Sharma2006 ER - TY - CHAP AU - Becher, A. AU - Becher, E. AU - Benenson, Z. AU - Dornseif, M. PY - 2006 DA - 2006// TI - Tampering with motes: real-world physical attacks on wireless sensor networks BT - Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC '06) ID - Becher2006 ER - TY - CHAP AU - Grossglauser, M. AU - Vetterli, M. PY - 2003 DA - 2003// TI - Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion BT - Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03) ID - Grossglauser2003 ER - TY - CHAP AU - Luo, J. AU - Hubaux, J. -. P. PY - 2005 DA - 2005// TI - Joint mobility and routing for lifetime elongation in wireless sensor networks BT - Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05) ID - Luo2005 ER - TY - CHAP AU - fan Hsin, C. AU - Liu, M. PY - 2002 DA - 2002// TI - A distributed monitoring mechanism for wireless sensor networks BT - Proceedings of the Workshop on Wireless Security (WiSe '02) UR - https://doi.org/10.1145/570681.570688 DO - 10.1145/570681.570688 ID - fan Hsin2002 ER - TY - JOUR AU - fan Hsin, C. AU - Liu, M. PY - 2006 DA - 2006// TI - Self-monitoring of wireless sensor networks JO - Computer Communications VL - 29 UR - https://doi.org/10.1016/j.comcom.2004.12.031 DO - 10.1016/j.comcom.2004.12.031 ID - fan Hsin2006 ER - TY - CHAP AU - Hayashibara, N. AU - Cherif, A. AU - Katayama, T. PY - 2002 DA - 2002// TI - Failure detectors for large-scale distributed systems BT - Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02) ID - Hayashibara2002 ER - TY - JOUR AU - Ranganathan, S. AU - George, A. D. AU - Todd, R. W. AU - Chidester, M. C. PY - 2001 DA - 2001// TI - Gossip-style failure detection and distributed consensus for scalable heterogeneous clusters JO - Cluster Computing VL - 4 UR - https://doi.org/10.1023/A:1011494323443 DO - 10.1023/A:1011494323443 ID - Ranganathan2001 ER - TY - JOUR AU - Curtmola, R. AU - Kamara, S. PY - 2007 DA - 2007// TI - A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks JO - Electronic Notes in Theoretical Computer Science VL - 171 UR - https://doi.org/10.1016/j.entcs.2006.11.009 DO - 10.1016/j.entcs.2006.11.009 ID - Curtmola2007 ER - TY - CHAP AU - Huang, D. AU - Mehta, M. AU - Medhi, D. AU - Harn, L. PY - 2004 DA - 2004// TI - Location-aware key management scheme for wireless sensor networks BT - Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04) UR - https://doi.org/10.1145/1029102.1029110 DO - 10.1145/1029102.1029110 ID - Huang2004 ER - TY - JOUR AU - Tague, P. AU - Poovendran, R. PY - 2007 DA - 2007// TI - Modeling adaptive node capture attacks in multi-hop wireless networks JO - Ad Hoc Network VL - 5 UR - https://doi.org/10.1016/j.adhoc.2007.01.002 DO - 10.1016/j.adhoc.2007.01.002 ID - Tague2007 ER - TY - CHAP AU - Tague, P. AU - Slater, D. AU - Rogers, J. AU - Poovendran, R. PY - 2008 DA - 2008// TI - Vulnerability of network traffic under node capture attacks using circuit theoretic analysis BT - Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM '08) ID - Tague2008 ER - TY - CHAP AU - Conti, M. AU - Di Pietro, R. AU - Gabrielli, A. AU - Mancini, L. V. AU - Mei, A. PY - 2009 DA - 2009// TI - The quest for mobility models to analyse security in mobile ad hoc networks BT - Proceedings of the 7th International Conference on Wired/Wireless Internet Communications (WWIC '09) ID - Conti2009 ER - TY - CHAP AU - Conti, M. AU - Di Pietro, R. AU - Mancini, L. V. AU - Mei, A. PY - 2008 DA - 2008// TI - Emergent properties: detection of the node-capture attack in mobile wireless sensor networks BT - Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08) UR - https://doi.org/10.1145/1352533.1352568 DO - 10.1145/1352533.1352568 ID - Conti2008 ER - TY - CHAP AU - Daly, E. M. AU - Haahr, M. PY - 2007 DA - 2007// TI - Social network analysis for routing in disconnected delay-tolerant MANETs BT - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07) UR - https://doi.org/10.1145/1288107.1288113 DO - 10.1145/1288107.1288113 ID - Daly2007 ER - TY - CHAP AU - Sterbenz, J. P. G. AU - Krishnan, R. AU - Hain, R. R. PY - 2002 DA - 2002// TI - Survivable mobile wireless networks: issues, challenges, and research directions BT - Proceedings of the 1st ACM Workshop on Wireless Security (WiSe '02) UR - https://doi.org/10.1145/570681.570685 DO - 10.1145/570681.570685 ID - Sterbenz2002 ER - TY - JOUR AU - Di Pietro, R. AU - Mancini, L. AU - Soriente, C. AU - Spognardi, A. AU - Tsudik, G. PY - 2009 DA - 2009// TI - Data security in unattended sensor networks JO - IEEE Transactions on Computers VL - 58 UR - https://doi.org/10.1109/TC.2009.109 DO - 10.1109/TC.2009.109 ID - Di Pietro2009 ER - TY - JOUR AU - Di Pietro, R. AU - Mancini, L. AU - Soriente, C. AU - Spognardi, A. AU - Tsudik, G. PY - 2009 DA - 2009// TI - Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks JO - Ad Hoc Networks VL - 7 UR - https://doi.org/10.1016/j.adhoc.2009.04.002 DO - 10.1016/j.adhoc.2009.04.002 ID - Di Pietro2009 ER - TY - JOUR AU - Yoon, J. AU - Liu, M. AU - Noble, B. PY - 2003 DA - 2003// TI - Random waypoint considered harmful JO - Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies VL - 2 ID - Yoon2003 ER - TY - JOUR AU - Hyytiä, E. AU - Lassila, P. AU - Virtamo, J. PY - 2006 DA - 2006// TI - Spatial node distribution of the random waypoint mobility model with applications JO - IEEE Transactions on Mobile Computing VL - 5 UR - https://doi.org/10.1109/TMC.2006.86 DO - 10.1109/TMC.2006.86 ID - Hyytiä2006 ER - TY - JOUR AU - Sun, K. AU - Ning, P. AU - Wang, C. PY - 2005 DA - 2005// TI - Fault-tolerant cluster-wise clock synchronization for wireless sensor networks JO - IEEE Transactions on Dependable and Secure Computing VL - 2 UR - https://doi.org/10.1109/TDSC.2005.36 DO - 10.1109/TDSC.2005.36 ID - Sun2005 ER - TY - CHAP AU - Williams, B. AU - Camp, T. PY - 2002 DA - 2002// TI - Comparison of broadcasting techniques for mobile ad hoc networks BT - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02) UR - https://doi.org/10.1145/513800.513825 DO - 10.1145/513800.513825 ID - Williams2002 ER - TY - CHAP AU - Orecchia, L. AU - Panconesi, A. AU - Petrioli, C. AU - Vitaletti, A. PY - 2004 DA - 2004// TI - Localized techniques for broadcasting in wireless sensor networks BT - Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '04) ID - Orecchia2004 ER - TY - JOUR AU - Burns, B. AU - Brock, O. AU - Levine, B. N. PY - 2008 DA - 2008// TI - MORA routing and capacity building in disruption-tolerant networks JO - Ad Hoc Networks VL - 6 UR - https://doi.org/10.1016/j.adhoc.2007.05.002 DO - 10.1016/j.adhoc.2007.05.002 ID - Burns2008 ER - TY - JOUR AU - Liu, H. AU - Wan, P. -. J. AU - Liu, X. AU - Yao, F. PY - 2007 DA - 2007// TI - A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks JO - IEEE Transactions on Parallel and Distributed Systems VL - 18 UR - https://doi.org/10.1109/TPDS.2007.1023 DO - 10.1109/TPDS.2007.1023 ID - Liu2007 ER - TY - JOUR AU - Rahman, S. M. M. AU - Nasser, N. AU - Inomata, A. AU - Okamoto, T. AU - Mambo, M. AU - Okamoto, E. PY - 2008 DA - 2008// TI - Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks JO - Security and Communication Networks VL - 1 UR - https://doi.org/10.1002/sec.4 DO - 10.1002/sec.4 ID - Rahman2008 ER - TY - CHAP AU - Striki, M. AU - Baras, J. AU - Manousakis, K. PY - 2004 DA - 2004// TI - A robust, distributed TGDH-based scheme for secure group communications in MANET BT - Proceedings of the IEEE International Conference on Communications (ICC '04) ID - Striki2004 ER - TY - CHAP AU - Di Pietro, R. AU - Mancini, L. V. AU - Mei, A. PY - 2004 DA - 2004// TI - Efficient and resilient key discovery based on pseudo-random key pre-deployment BT - Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS '04) ID - Di Pietro2004 ER - TY - CHAP AU - Wander, A. AU - Gura, N. AU - Eberle, H. AU - Gupta, V. AU - Shantz, S. C. PY - 2005 DA - 2005// TI - Energy analysis of public-key cryptography for wireless sensor networks BT - Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '05) ID - Wander2005 ER - TY - JOUR AU - Bandyopadhyay, S. AU - Coyle, E. J. AU - Falck, T. PY - 2007 DA - 2007// TI - Stochastic properties of mobility models in mobile ad hoc networks JO - IEEE Transactions on Mobile Computing VL - 6 UR - https://doi.org/10.1109/TMC.2007.1014 DO - 10.1109/TMC.2007.1014 ID - Bandyopadhyay2007 ER - TY - JOUR AU - Chaintreau, A. AU - Hui, P. AU - Diot, C. AU - Gass, R. AU - Scott, J. PY - 2007 DA - 2007// TI - Impact of human mobility on opportunistic forwarding algorithms JO - IEEE Transactions on Mobile Computing VL - 6 UR - https://doi.org/10.1109/TMC.2007.1060 DO - 10.1109/TMC.2007.1060 ID - Chaintreau2007 ER -