Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...