Security considerations for IEEE 802.15.4 networks (2004)

by Naveen Sastry
Venue:In WiSe ’04: Proceedings of the 2004 ACM workshop on Wireless security
Citations:24 - 1 self

Documents Related by Co-Citation

724 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
321 Tinysec: A link layer security architecture for wireless sensor networks – Chris Karlof, Naveen Sastry, David Wagner
583 A Key-Management Scheme for Distributed Sensor Networks – Laurent Eschenauer, Virgil D. Gligor - 2002
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
447 Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – Chris Karlof, David Wagner - 2003
182 A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography – David J. Malan, Matt Welsh, Michael D. Smith - 2004
99 Tinypk: securing sensor networks with public key technology – Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus - 2004
541 Random key predistribution schemes for sensor networks – Haowen Chan, Adrian Perrig, Dawn Song - 2003
193 Security In Wireless Sensor Networks – Adrian Perrig, John Stankovic, David Wagner - 2004
1464 System architecture directions for networked sensors – Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister - 2000
1117 A Survey on Sensor Networks – Lan F. Akyildiz, Welljan Su, Yogesh Sankarasubramaniam, Erdal Cayirci - 2002
15 A dynamic user authentication scheme for wireless sensor networks – K Wong, Y Zheng, J Cao, S Wang - 2006
371 A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks – Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili - 2003
376 A Transmission Control Scheme for Media Access in Sensor Networks – Alec Woo, David E. Culler - 2001
12 Two-Factor User Authentication in Wireless Sensor Networks – M L Das - 2009
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
9 M.Eltoweissy, “Towards a New Paradigm for Securing Wireless Sensor Networks – K Jones, A Wadaa, S Olariu, L Wilson - 2003
168 Constraints and approaches for distributed sensor network security,” NAI Labs – D W Carman, P S Kruus, B J Matt - 2000
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997