Seonho Choi, Hyeonsang Eom, and Edward Jung


  1. [1] C. Karlof and D. Wagner, Secure routing in wireless sensornetworks: Attacks and countermeasures, Proc. First IEEE Int.Workshop on Sensor Network Protocols and Applications, May2003.
  2. [2] R. di Pietro, L.V. Mancini, Y.W. Law, S. Etalle, and P. Havinga,A directed diffusion-based secure multicast scheme for wirelesssensor networks, First Int. Workshop on Wireless Security andPrivacy (WiSPr’03).
  3. [3] S. Park, A. Bhatia, and J.-H. Youn, Hop-count based locationdiscovery in ad hoc sensor networks, Proc. (424) WirelessNetworks and Emerging Technologies, 2004.
  4. [4] A. Perrig, R. Canetti, D. Song, and D. Tygar, Efficient andsecure source authentication for multicast, Proc. Network andDistributed System Security Symposium, 2001.
  5. [5] D. Liu and P. Ning, Multi-level u-TESLA: A broadcast au-thentication system for distributed sensor networks, TechnicalReport, TR-2003-08, North Carolina State University, Depart-ment of Computer Science, March 2003.
  6. [6] S. Choi, Denial-of-service resistant multicast authenticationprotocol with prediction hashing and one-way key chain, 2005IEEE International Workshop on Security and Pervasive Mul-timedia Environments (MultiSec 2005), 701–706.
  7. [7] S. Zhu, S. Xu, S. Setia1, and S. Jajodia, LHAP: A lightweighthop-by-hop authentication protocol for ad-hoc networks,23rd Int. Conf. on Distributed Computing Systems Workshops(ICDCSW’03), 749.
  8. [8] S. Yoon, C. Veerarittiphan, and M.L. Sichitiu, Tiny-Sync:Tight time synchronization for wireless sensor networks, ACMTransactions on Wireless Sensor Networks, 2007.
  9. [9] J. Greunen and J. Rabaey, Lightweight time synchronizationfor sensor networks, Proc. 2nd ACM Int. Conf. on WirelessSensor Networks and Applications, San Diego, CA, 2003,11–19.
  10. [10] J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attackin sensor networks: Analysis and defenses, Proc. IPSN 2004,Berkeley, CA, April 2004.

Important Links:

Go Back