- J. Zhang, T. Duong, and A. Marshal, “Key Generation From Wireless Channels: A Review,” IEEE Access 2016, vol. 4, pp. 614-626, 2016
- A. Sirisha, P. P. Priyanka, and P. Ratnakumari, “Design and Analysis of a Novel Extended Three-Tier Security Scheme for Efficient Data Transfer in Mobile Networks,” IJCA, vol. 6, no. 1, Feb. 2016.
- D. Ma and G. Tsudik, “Security and privacy in emerging wireless networks,” IEEE Wireless Communications, October 2010.
- M. LI and W. LOU, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications, 2010.
- X. Qin, M. Alghamdi, M. Nijim, and Z. Zong, “Improving Security of Real-Time Wireless Networks through Packet Scheduling,” IEEE TWC, vol. 7, no. 9, 2008.
- P. Jindal and B. Singh, “Study and Performance Evaluation of Security-Throughput Tradeoff with Link Adaptive Encryption Scheme,” IJSPTM, vol. 1, no. 5, October 2012.
- M. Shin and J. Ma, and A. Mishra, “Wireless Network Security and Interworking,” Proceedings of the IEEE, vol. 94, no. 2, 2006.
- H. Deng and W. Li, “Agrawal D. P., Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, October 2002.
- J. Jeong and Z. J. Haas, “An integrated security framework for Open wireless networking architecture,” IEEE Wireless Communications, 2007.
- X. Yang, “Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks,” IEEE, 2008.
- X. Yang, “Flow-Net Methodology for Accountability in Wireless Networks,” IEEE, 2009.
- W. LOU and K. REN, “Security, privacy, and accountability in wireless access networks,” IEEE Wireless Communications, 2009.
- X. Zhifeng and X. Yang, “A Quantitative Study of Accountability in Wireless Multi-hop Networks,” 39th International Conference on Parallel Processing, IEEE, 2010.
- B. Fu and Y. Xiao, “Accountability and Q-Accountable Logging in Wireless Netwoks,” Wireless Personal Communication, vol. 75, no. 3, pp. 1715-1746, Apr. 2014.
- K. Defrawy and C. Soriente, “PEUC-WiN: Privacy Enhancement by User Cooperation inWireless Networks,” IEEE, 2006.
- H. Wenbo, L. Xue, and N. Hoang, “PDA: Privacypreserving Data Aggregation in Wireless Sensor Networks,” IEEE INFOCOM 2007 proceedings, 2007.
- R. A. Shaikh, S. Lee, and A. Albeshri, “Security Completeness Problem in Wireless Sensor Networks,” Autosoft, DOI: 10,108/10798587.2014.970345, 2014.
- J. Ying, C. Shigang, and Z. Zhan, “A Novel Scheme for Protecting Receiver’s Location Privacy in Wireless Sensor Networks,” IEEE TWC, vol. 7, no. 10, 2008.
- Y. Jianbo and W. Guangjun, “Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks,” IEEE, 2008.
- F. Yanfei, “Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks,” IEEE TWC, vol. 10, no. 3, 2011.
- M. E. A. Mohamed Mahmoud and S. Xuemin (Sherman), “A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks,” IEEE TPDS, vol. 23, no. 10, 2012.
- W. Zhiguo, X. Kai, and L. Yunhao, “Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks,” Proceedings IEEE INFOCOM, 2012.
- A. Chandrashekhar and A. Sumit, “Security, Privacy and Accountability in Wireless Network,” IJERT, vol. 2, Issue 7, pp. 1-10, 2013.
- S. lazim and Q. I. Ali, “Design and implementation of an embedded intrusion detection system for wireless applications,” IET Inf. Secur., vol. 6, Issue 3, pp. 171-182, 2012.
- Y. Jie and C. Yingying, “Detection and Localization of Multiple Spoofing Attackers in Wireless Networks,” IEEE TPDS, vol. 24, 2013.
- A. Rasheed and N. Rabi, “The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks”, IEEE TPDS, vol. 23, no. 5, 2012.
- K.Q. Yan and S. C. Wang et al., “Hybrid Intrusion Detection System for Enhancing the Security of a Cluster-based Wireless Sensor Network,” IEEE, 2010.
- W. Weijia, H. Lei, and L. Yong, “Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks,” IEEE Communications Letters, vol. 14, no. 8, 2010.
- C. Mauro and D. Roberto, “Distributed Detection of Clone Attacks in Wireless Sensor Networks,” IEEE TDSC, vol. 8, no. 5, 2011.
- L. George, K. Byungsuk, and F. Anjum, “A Policy-based Approach to Wireless LAN Security Management,” IEEE, 2007.
- X. Debao, C. Chao, and C. Gaolin, “Intrusion Detection based Security Architecture for Wireless Sensor Networks,” Proceedings of ISCIT, 2005.
- L. Shu Yun and L. Meng-Hui, “Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network,” JUSPN, vol. 2, no. 1, pp. 39-47, 2011.
- D. Carman, B. Matt, and G. Cirincione, “Energy-efficient and Low-latency Key Management for Sensor Networks,” Proceedings of 23rd Army Science Conference, 2002.
- D. Carman, P. Kruus, and B. Matt, “Constraints and Approaches for Distributed Sensor Network Security,” NAI Labs: Technical Report #0-010, 2000.
- L. Eschenauer and D. Virgil, “A key-management scheme for distributed sensor networks,” Proceedings of the 9th ACM CCCS, Washington, DC, USA, 2002.
- T. Park and K.G. Shin, “LiSP: A Lightweight Security Protocol for Wireless Sensor Networks,” ACM TECS, vol. 3, no. 3, 2004.
- S. Zhu and S. Setia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed WSN Networks,” ACM TSON, vol. 2, Issue 4, pp. 500-528, Nov. 2006.
- L. Eschenauer and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” 9th ACM CCCS, New York: ACM Press, pp. 41-47, 2002.
- H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE SSP, May 2003.
- C. Blundo et al., “Perfectly-Secure Key Distribution for Dynamic Conferences,” CRYPTO Proc. 12th Annual Int’l.Cryptology Conf. Advances in Cryptology, London: Springer-Verlag, pp. 471-486, 1993.
- W. Du et al., “A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge,” Proc. IEEE INFOCOM, Hong Kong, pp. 586–597, 2004.
- R. R. Pozo, “Protecting Contextual Information in WSNs Source- and Receiver-Location Privacy Solutions,” submitted in fulfillment of the requirements for the Degree of Doctor in Computer Science, pp. 1-252, 2014.
- A. Pranusha and G. Murali, “A Hybrid Key Management Scheme for Secure Manet Communications,” IJRET, vol. 4, Issue 2, 2015.
- N. Kittur and M. Dharishini, “Review of Key Management Technique for Wireless Body Area Networks,” IRJET, vol. 2, Issue 4, pp. 82-86, July 2015.
- B. Alohali and K. Kifayat, “A Survey on Cryptography Key Management Schemes for Smart Grid,” JCSA, vol. 3, no. 3, pp. 27-39, 2015.
- P. Sivakumar, S. Saravanan, and M. Anandaraj, “A survey in Wireless Sensor Networks based on Key Management Schemes,” IJATCSE, vol. 4, no. 2, 2015.
- A. Arul and M. Merlin, “Efficient Message Authentication and Source Privacy in Wireless Sensor Networks,” IJCSITR ISSN 2348-120X, vol. 3, Issue 1, pp. 222-227, 2015.
|