On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges
S Djahel, F Nait-Abdesselam… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's
packets in order to enable out of range communication. However, in hostile environments …
packets in order to enable out of range communication. However, in hostile environments …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
Random key predistribution schemes for sensor networks
Key establishment in sensor networks is a challenging problem because asymmetric key
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …
Ariadne: A secure on-demand routing protocol for ad hoc networks
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Packet leashes: a defense against wormhole attacks in wireless networks
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …
ecological, and health-related areas. These applications often include the monitoring of …
A survey on wireless sensor network security
J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …
community due their wide range of applications. Due to distributed nature of these networks …
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
An on-demand secure routing protocol resilient to byzantine failures
B Awerbuch, D Holmer, C Nita-Rotaru… - Proceedings of the 1st …, 2002 - dl.acm.org
An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes
connected by wireless links where nodes not in directrange can communicate via …
connected by wireless links where nodes not in directrange can communicate via …