4
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Data Integrity Protocol for Sensor Networks

, , &
Pages 205-214 | Published online: 23 Feb 2007

References

  • Akyldiz , I.F. , Su , W. , Sankarasubramaniam , Y. and Cayirci , E. 2002 . Wireless Sensor Networks: A Survey . Computer Networks , 38 ( 4 ) March : 393 – 422 .
  • Estrin , D. and Govindan , R. Next Century Challenges: Scalable Coordination in Sensor Networks . Proceedings ACM/IEEE Conference Mobicom’99 . Aug. . pp. 263 – 270 .
  • H. Abelson , et al. May 2000 . Embedding the Internet: Amorphous Computing . in Communication of ACM , 43 ( 5 ) : 74 – 82 . [CROSSREF]
  • Borriello , G. and Want , R. May 2000 . Embedding the Internet: Embedded Computation Meets the World Wide Web . in Communications of ACM , 43 ( 5 ) : 59 – 66 . [CROSSREF]
  • Pottie , G. J. and Kaiser , W. J. May 2000 . Embedding the Internet: Wireless Integrated Network Sensors . in Communications of ACM , 43 ( 5 ) : 51 – 58 . [CROSSREF]
  • Sukhatme , G. S. and Malaric , M. J. May 2000 . Embedding the Internet: Embedding Robots into the Internet . in Communications of ACM , 43 ( 5 ) : 67 – 73 . [CROSSREF]
  • Wood , A. and Stankovic , J. 2002 . Denial of Service in Sensor Networks . IEEE Computer , Oct. : 54 – 62 .
  • Zhou , L. and Haas , Z. 1999 . Securing Ad-Hoc Networks . IEEE Network Magazine , 13 ( 6 ) : 24 – 30 .
  • NAI Lab, www.nai.com/nai_labs/asp_set/crypto/crypt_senseil.asp
  • A. Perrig, R. Szewezyk, V. Wen, A. Woo, “Security for SmartDust Sensor Network” http://www.cs.berkeley.edu/ vwen/classes/T2000/cs261/project/sensor_security.html
  • Stajano , F. and Anderson , R. J. 1999 . “ The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks ” . In Seventh International Security Protocols Workshop 172 – 194 .
  • Hubaux , J. , Buttyan , L. and Capkun , S. 2001 . “ The quest for security in mobile ad hoc networks ” . In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001)
  • Kong , J. , Zerfos , P. , Luo , H. , Lu , S. and Zhang , L. 2001 . “ Providing robust and obiquitous security support for mobile ad-hoc networks ” . In proceedings of ICNP 251 – 260 .
  • M. G. Zapata, “Secure ad-hoc on-demand distance vector (SAODV) routing,” in IETF MANET Mailing List, Message-ID: [email protected], Available at ftp://manet.itd.nrt.navy.mit/pub/manet/2001-10.mail (Accessed: Oct. 8, 2001 ).
  • Luo , H. , Zefros , P. , Kong , J. , Lu , S. and Zhang , L. 2002 . “ Self-securing ad hoc wireless networks ” . In proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 02)
  • Binkley , J. and Trost , W. 2001 . Authenticated ad hoc routing at the link layer for mobile systems . Wireless Networks , 7 ( 2 ) : 139 – 145 . [CROSSREF]
  • Dahill , B. , Levine , B. N. , Royer , E. and Shields , C. A secure routing protocol for ad-hoc networks, Electrical Engineering and Computer Science, University of Michigan . Tech. Rep. UM-CS-2001-037 . Aug. 2001 .
  • Kong , J. , Luo , H. , Xu , K. , Gu , D. L. , Gerla , M. and Lu , S. 2002 . “ Adaptive security for multi-layer ad-hoc networks ” . In Special Issue of Wireless Communications and Mobile Computing , Vol. 2 , 533 – 547 . Wiley Interscience Press .
  • Hu , Y.-C. , Johnson , D. B. and Petrig , A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks . in Proceedings of the 4th IEEE Workshop on Mobile Computing System: and Applications (WMCSA 2002) . June . pp. 3 – 13 .
  • Hu , Y.-C. , Perrig , A. and Johnson , D. B. Ariadne:“A secure on-demand routing protocol for ad hoc networks . Department of Computer Science, Rice University . Dec. 2001 . Technical Report TRCT-383
  • Basagni , S. , Herrin , K. , Rosti , E. and Bruschi , D. Secure pebb’enets . in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001) . Oct. . pp. 156 – 163 .
  • Papadimitratos , P. and Haas , Z. Jan. 2002 . “ Secure routing for mobile ad hoc networks ” . In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) Jan. ,
  • Marti , S. , Giuli , T. J. , Lai , K. and Baker , M. Mitigating routing misbehavior in mobile ad hoc networks . in Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking . pp. 255 – 265 .
  • Buchegger , S. and Boudec , J.-Y.L. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks . Proceedings of the Tenth Euromicro Workshop on Parallel Distributed, and Network-based Processing . Jan. . pp. 403 – 410 . Canary Islands, , Spain : IEEE Computer Society .
  • Kong , J. , Hong , Xiaoyan and Gerla , Mario . An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Net-works . UCLA Computer Science Department Technical Report 030020 .
  • Perrig , A. , Szewczyk , R. , Wen , V. , Culler , D. and Tygar , J. D. Spins: Security Protocols for Sensor Networks . Proceeding of Seventh International Conference on Mobile Computing and Networks . July .
  • Krishnamachari , B. , Estrin , D. and Wicker , S. June 2002 . “ Modeling Data-Centric Routing in Wireless Sensor Networks ” . In proceedings of Wireless Sensor Network Applications WSNA 2002
  • RFC 2104, “HMAC: Keyed-Hashing for Message Authentication,” http://www.ietf.org/rfc/rfc2104.tx
  • Liu , D. and Ning , P. Establishing Pairwise Keys in Distributed Sensor Networks . In proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 03) . Washington, D.C.. Oct. .
  • Wenliang , Du , Jing , Deng , Yunghsiang , S.Han and Varshney , Pramod K. A pairwise key pre-distribution scheme for wireless sensor networks . Proceedings of the Tenth ACM Conference on Computer and Communication Security . October 27-30 2003 , Washington, D.C.. October . USA
  • Zhu , S. , Setia , S. and Jajodia , S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks . In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS ’03) . Washington, D.C.. Oct. .
  • Bandyopadhyay , S. and Coyle , E. An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks . Proceedings of IEEE INFOCOM 2003 . Apr. .
  • Amis , A. D. , Prakash , R. , Vuong , T. H. P. and Huynh , D. T. Max-Min D-Cluster Formation in Wireless Ad Hoc Networks . Proceedings of IEEE INFOCOM 2000 . March .
  • Hongwei , Zhang and Anish , Arora . 2003 . GS3: Scalable Self-configuration and Self-healing in Wireless Sensor Networks . Computer Networks (Elsevier) , 43 ( 4 ) Nov. 15 : 459 – 480 . [CROSSREF]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.