On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges

S Djahel, F Nait-Abdesselam… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's
packets in order to enable out of range communication. However, in hostile environments …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

Random key predistribution schemes for sensor networks

H Chan, A Perrig, D Song - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
Key establishment in sensor networks is a challenging problem because asymmetric key
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Packet leashes: a defense against wormhole attacks in wireless networks

YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

A survey on wireless sensor network security

J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

DJ Malan, M Welsh, MD Smith - 2004 First Annual IEEE …, 2004 - ieeexplore.ieee.org
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …

An on-demand secure routing protocol resilient to byzantine failures

B Awerbuch, D Holmer, C Nita-Rotaru… - Proceedings of the 1st …, 2002 - dl.acm.org
An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes
connected by wireless links where nodes not in directrange can communicate via …