Reading List
UNDER
CONSTRUCTION
Book: Levente Buttyan and
Jean-Pierre Hubaux, "Security and
Cooperation in Wireless Networks", Cambridge University Press,
ISBN 9780521873710
Wireless Network Surveys
- Akyilidz et al, Wireless
sensor networks:
a survey, Computer Networks, 2002.
- Blum, J.J. et al, Challenges
of inter-vehicle ad hoc networks, IEEE Transactions on Intelligent
Transportation Systems, Volume 5, Issue 4, Dec. 2004
- Akyildiz, I.F., Wang, X., and Wang, W., Wireless Mesh
Networks: A Survey, Computer Networks Journal (Elsevier), Vol.
47, pp. 445-487, March 2005.
Security Issues in Current and Emerging Wireless Networks
- Nikita Borisov, Ian Goldberg, and David Wagner, Intercepting
Mobile Communications: The Insecurity of 802.11, MOBICOM 2001.
- Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker, Security
flaws in 802.11 data link protocols, Communications of the ACM,
46(5), May 2003, Special Issue on Wireless networking security, pp.35-39
- Yau, Mitchell, Security
vulnerabilities in ad hoc networks, ISCTA'03
- Perrig, Stankovic, Wagner, Security
in Wireless Sensor Networks, CACM'04
- Ari Juels, RFID
Security & Privacy: A Research Survey, IEEE JSAC, Feb 2006.
- Maxim Raya and Jean-Pierre Hubaux, The
Security of Vehicular Ad Hoc Networks, In SASN'05, November 2005
- Bryan Parno and Adrian Perrig, Challenges
in Securing Vehicular Networks, Proceedings of the Fourth Workshop
on Hot Topics in Networks (HotNets-IV), November 14-15, 2005
- Naveen Sastry and David Wagner, Security
Considerations for IEEE 802.15.4 Networks, ACM WiSe 2004, October
1, 2004.
Trust & Adversary Models
Attacks on Naming & Addressing
- Newsome, James, Elaine Shi, Dawn Song, and Adrian Perrig, The
Sybil Attack in Sensor Networks: Analysis and Defenses, In the
Third International Symposium on Information Processing in Sensor
Networks (IPSN), April, 2004.
- Parno, Bryan, Adrian Perrig, and Virgil Gligor, Distributed
Detection of Node Replication Attacks in Sensor Networks, In
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA,
May, 2005.
Establishing Security Associations
- Stajano & Anderson, The Resurrecting
Duckling: Security Issues for ubiquitous computing
- Adrian Perrig, Robert Szewczyk, Victor Wen,
David Culler, and Doug Tygar, SPINS:
Security Protocols for Sensor Networks, In Wireless Networks
Journal (WINE), September 2002.
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia, LEAP+: Efficient
Security Mechanisms for Large-scale Distributed Sensor Networks,
ACM Trans. on Sensor Networks, November 2006
- Haowen Chan, Adrian Perrig and Dawn Song, Random
Key Predistribution Schemes for Sensor Networks, In Proceedings of
the IEEE Symposium on Security and Privacy 2003.
- Hubaux, Buttyan, Capkun, The Quest for Security
in Ad-hoc Networks, ACM Mobihoc, 2001
- Luo et al, URSA:
Ubiquitous and Robust Access Control for mobile ad hoc networks,
IEEE/ACM Transactions on Networking, Dec 2004.
Secure Routing Protocols for Ad hoc Networks
- Chris Karlof and David Wagner, Secure
Routing in Sensor Networks: Attacks and Countermeasures,
Ad Hoc Networks, vol 1, issues 2--3 (Special Issue on Sensor Network
Applications and Protocols), pp. 293-315, Elsevier, September
2003.
- Hu, Yih-Chun, Adrian Perrig, and Dave Johnson, Ariadne:
A Secure On-Demand Routing Protocol for Ad Hoc Networks, In
Wireless Networks Journal, 11(1), 2005.
- Hu, Yih-Chun, Adrian Perrig, and Dave Johnson, Efficient
Security Mechanisms for Routing Protocols, In Proceedings of the
Network and Distributed System Security Symposium (NDSS), San Diego,
California, February 2003.
- Hu, Yih-Chun, Adrian Perrig, and Dave Johnson, Wormhole
Attacks in Wireless Networks, In IEEE Journal on Selected Areas in
Communications (JSAC), 2005.
- Parno, Bryan, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure
Sensor Network Routing: A Clean-Slate Approach, In Proceedings of
the 2nd Conference on Future Networking Technologies (CoNEXT 2006) in
Lisboa, Portugal, December 4-7, 2006.
Secure Services & Applications
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, An
Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected
False Data in Sensor Networks, in ACM Transactions on Sensor
Networks (TOSN), Vol. 3, No. 3, article 14, August 2007.
- Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, TinySeRSync:
Secure and Resilient Time Synchronization in Wireless Sensor Networks, in
Proceedings of the 13th ACM Conference on Computer and
Communications Security (CCS '06), pages 264--277, Alexandria,
Virginia, October/November 2006.
- Chan, Haowen, Adrian Perrig, and Dawn Song, Secure
Hierarchical In-Network Aggregation in Sensor Networks,
In Proceedings of the 13th ACM Conference on Computer and
Communications Security (CCS 2006), Alexandria, Virginia, October 30 -
November 3, 2006.
- Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj and Mani
Srivastava, Secure
Location Verification With Hidden and Mobile Base Stations, in IEEE
Transactions on Mobile Computing, April 2008
Privacy
- David Molnar and David Wagner, Privacy
and Security in Library RFID: Issues, Practices, and Architectures,
ACM CCS 2004, October 26-28, 2004.
- Srdjan Capkun, Jean-Pierre Hubaux, Markus Jakobsson, Secure
and Privacy-Preserving Communication in Hybrid Ad Hoc Networks,
Technical report, ETH 2004