TY - BOOK PY - 2011 DA - 2011// TI - IEEE 802.15.4™-2011 PB - IEEE CY - Piscataway ID - ref1 ER - TY - JOUR AU - Karapistoli, E. AU - Pavlidou, F. N. AU - Gragopoulos, I. AU - Tsetsinas, I. PY - 2010 DA - 2010// TI - An overview of the IEEE 802.15.4a Standard JO - Commun. Mag. IEEE VL - 48 UR - https://doi.org/10.1109/MCOM.2010.5394030 DO - 10.1109/MCOM.2010.5394030 ID - Karapistoli2010 ER - TY - CHAP AU - Sastry, N. AU - Wagner, D. PY - 2004 DA - 2004// TI - Security considerations for IEEE 802.15.4 networks BT - Paper presented at the 3rd ACM workshop on wireless security (WiSe) ID - Sastry2004 ER - TY - CHAP AU - Karlof, C. AU - Wagner, D. PY - 2003 DA - 2003// TI - Secure routing in wireless sensor networks: Attacks and countermeasures BT - Paper presented at the first IEEE international workshop on sensor network protocols and applications UR - https://doi.org/10.1109/SNPA.2003.1203362 DO - 10.1109/SNPA.2003.1203362 ID - Karlof2003 ER - TY - CHAP AU - Martins, D. AU - Guyennet, H. PY - 2010 DA - 2010// TI - Wireless sensor network attacks and security mechanisms—A short survey BT - Paper presented at 13th international conference on network-based information systems (NBiS) ID - Martins2010 ER - TY - CHAP AU - Xing, K. AU - Srinivasan, S. AU - Rivera, M. AU - Li, J. AU - Cheng, X. ED - Huang, S. C. H. ED - MacCallum, D. ED - Du, D. -. Z. PY - 2010 DA - 2010// TI - Attacks and countermeasures in sensor networks: A survey BT - Network Security PB - Springer CY - New York UR - https://doi.org/10.1007/978-0-387-73821-5_11 DO - 10.1007/978-0-387-73821-5_11 ID - Xing2010 ER - TY - CHAP AU - Ghose, S. AU - Bose, R. PY - 2011 DA - 2011// TI - Physical layer security in UWB networks BT - Paper presented at the IEEE international conference on microwaves, communications, antennas and electronics systems (COMCAS) ID - Ghose2011 ER - TY - CHAP AU - Ko, M. AU - Goeckel, D. PY - 2010 DA - 2010// TI - Wireless physical-layer security performance of UWB systems BT - Paper presented at the military communications conference (MILCOM) ID - Ko2010 ER - TY - BOOK AU - Camtepe, S. A. AU - Yener, B. AU - Camtepe, S. A. AU - Yener, B. PY - 2005 DA - 2005// TI - Key distribution mechanisms for wireless sensor networks: A survey PB - Technical report CY - Rensselaer Polytechnic Institute ID - Camtepe2005 ER - TY - JOUR AU - Shi, E. AU - Perrig, A. PY - 2004 DA - 2004// TI - Designing secure sensor networks JO - IEEE Wireless Commun. Mag VL - 11 UR - https://doi.org/10.1109/MWC.2004.1368895 DO - 10.1109/MWC.2004.1368895 ID - Shi2004 ER - TY - JOUR AU - Lazos, L. AU - Poovendran, R. PY - 2005 DA - 2005// TI - SeRLoc: Robust localization for wireless sensor networks JO - ACM Trans. Sensor Netw. (TOSN) VL - 1 UR - https://doi.org/10.1145/1077391.1077395 DO - 10.1145/1077391.1077395 ID - Lazos2005 ER - TY - JOUR AU - Roy, S. AU - Conti, M. AU - Setia, S. AU - Jajodia, S. PY - 2012 DA - 2012// TI - Secure data aggregation in wireless sensor networks JO - IEEE Trans. Inf. Forensics Secur VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2189568 DO - 10.1109/TIFS.2012.2189568 ID - Roy2012 ER - TY - CHAP AU - Flury, M. AU - Poturalski, M. AU - Papadimitratos, P. AU - Hubaux, J. P. AU - Le Boudec, J. Y. PY - 2010 DA - 2010// TI - Effectiveness of distance-decreasing attacks against impulse radio ranging BT - Paper presented at the third ACM conference on wireless network security (WiSec) UR - https://doi.org/10.1145/1741866.1741887 DO - 10.1145/1741866.1741887 ID - Flury2010 ER - TY - JOUR AU - Tippenhauer, N. AU - Capkun, S. PY - 2010 DA - 2010// TI - ID-based secure distance bounding and localization JO - ESORICS VL - 5789 ID - Tippenhauer2010 ER - TY - JOUR AU - Wang, Y. AU - Ma, X. AU - Leus, G. PY - 2010 DA - 2010// TI - An UWB ranging-based localization strategy with internal attack immunity JO - ICUWB VL - 2 ID - Wang2010 ER - TY - JOUR AU - Zhang, Y. AU - Liu, W. AU - Fang, Y. AU - Wu, D. PY - 2006 DA - 2006// TI - Secure localization and authentication in ultra-wideband sensor networks JO - IEEE J. Select. Areas Commun VL - 24 UR - https://doi.org/10.1109/JSAC.2005.863855 DO - 10.1109/JSAC.2005.863855 ID - Zhang2006 ER - TY - CHAP AU - Jazyah, Y. H. AU - Hope, M. ED - Taniar, D. ED - Gervasi, O. ED - Murgante, B. ED - Pardede, E. ED - Apduhan, B. O. PY - 2010 DA - 2010// TI - A review of routing protocols for UWB MANETs BT - Proceedings of the 2010 International Conference on Computational Science and Its Applications, Part III PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-12179-1_21 DO - 10.1007/978-3-642-12179-1_21 ID - Jazyah2010 ER - TY - CHAP AU - Becher, A. AU - Benenson, Z. AU - Dornseif, M. ED - Clark, J. ED - Paige, R. ED - Polack, F. ED - Brooke, P. PY - 2006 DA - 2006// TI - Tampering with motes: Real-world physical attacks on wireless sensor networks BT - Security in Pervasive Computing, Lecture Notes in Computer Science, vol. 3934 PB - Springer CY - Berlin ID - Becher2006 ER - TY - CHAP AU - Farooqi, A. AU - Khan, F. ED - D, S. l. e. z. a. k. ED - Kim, T. ED - Chang, A. C. ED - Vasilakos, T. ED - Li, M. ED - Kouichi, S. a. k. u. r. a. i. PY - 2009 DA - 2009// TI - Intrusion detection systems for wireless sensor networks: A survey BT - Communication and Networking, vol. 56 PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-10844-0_29 DO - 10.1007/978-3-642-10844-0_29 ID - Farooqi2009 ER - TY - JOUR AU - Xie, M. AU - Han, S. AU - Tian, B. AU - Parvin, S. PY - 2011 DA - 2011// TI - Anomaly detection in wireless sensor networks: A survey JO - J Netw. Comput. Appl VL - 34 UR - https://doi.org/10.1016/j.jnca.2011.03.004 DO - 10.1016/j.jnca.2011.03.004 ID - Xie2011 ER - TY - JOUR AU - Chandola, V. AU - Banerjee, A. AU - Kumar, V. PY - 2009 DA - 2009// TI - Anomaly detection: A survey JO - ACM Comput. Surv VL - 41 UR - https://doi.org/10.1145/1541880.1541882 DO - 10.1145/1541880.1541882 ID - Chandola2009 ER - TY - CHAP AU - Sahinoglu, Z. AU - Gezici, S. PY - 2006 DA - 2006// TI - Ranging in the IEEE 802.15.4a Standard BT - Paper presented at the IEEE annual conference on wireless and microwave technology (WAMICON) ID - Sahinoglu2006 ER - TY - JOUR AU - Su, C. C. AU - Chang, K. M. AU - Kuo, Y. H. AU - Horng, M. F. PY - 2005 DA - 2005// TI - The new intrusion prevention and detection approaches for clustering-based sensor networks JO - WCNC VL - 4 ID - Su2005 ER - TY - CHAP AU - Rajasegarar, S. AU - Leckie, C. AU - Palaniswami, M. AU - Bezdek, J. PY - 2006 DA - 2006// TI - Distributed anomaly detection in wireless sensor networks BT - Paper presented at the 10th IEEE international conference on communication systems (ICCS) ID - Rajasegarar2006 ER - TY - CHAP AU - Subramaniam, S. AU - Palpanas, T. AU - Papadopoulos, D. AU - Kalogeraki, V. AU - Gunopulos, D. PY - 2006 DA - 2006// TI - Online outlier detection in sensor data using non-parametric models BT - Paper presented at the 32nd international conference on very large data bases (VLDB) ID - Subramaniam2006 ER - TY - JOUR AU - Wang, H. AU - Yuan, Z. AU - Wang, C. PY - 2009 DA - 2009// TI - Intrusion detection for wireless sensor networks based on multi-agent and refined clustering JO - CMC VL - 3 ID - Wang2009 ER - TY - BOOK AU - Zhang, Y. Y. AU - Yang, W. -. C. AU - Kim, K. -. B. AU - Park, M. -. S. PY - 2008 DA - 2008// TI - Inside attacker detection in hierarchical wireless sensor network ID - Zhang2008 ER - TY - BOOK AU - Rahul, K. AU - Liu, H. AU - Chen, H. H. PY - 2009 DA - 2009// TI - Reduced complexity intrusion detection in sensor networks using genetic algorithm ID - Rahul2009 ER - TY - BOOK AU - Rajasegarar, S. AU - Leckie, C. AU - Palaniswami, M. AU - Bezdek, J. PY - 2007 DA - 2007// TI - Quarter sphere based distributed anomaly detection in wireless sensor networks ID - Rajasegarar2007 ER - TY - BOOK AU - Atakli, I. M. AU - Hu, H. AU - Chen, Y. AU - Ku, W. S. AU - Su, Z. PY - 2008 DA - 2008// TI - Malicious node detection in wireless sensor networks using weighted trust evaluation ID - Atakli2008 ER - TY - BOOK AU - Krontiris, I. AU - Dimitriou, T. AU - Freiling, F. C. PY - 2007 DA - 2007// TI - Towards intrusion detection in wireless sensor networks ID - Krontiris2007 ER - TY - JOUR AU - Poturalski, M. AU - Flury, M. AU - Papadimitratos, P. AU - Hubaux, J. P. AU - Le Boudec, J. Y. PY - 2011 DA - 2011// TI - Distance bounding with IEEE 802.15.4a: Attacks and countermeasures JO - IEEE Trans. Wireless Commun VL - 10 UR - https://doi.org/10.1109/TWC.2011.020111.101219 DO - 10.1109/TWC.2011.020111.101219 ID - Poturalski2011 ER - TY - BOOK AU - Koltsidas, G. AU - Karapistoli, E. AU - Pavlidou, F. N. PY - 2008 DA - 2008// TI - An energy-aware self-organizing clustering algorithm for UWB wireless sensor networks ID - Koltsidas2008 ER - TY - BOOK AU - Bysani, L. AU - Turuk, A. PY - 2011 DA - 2011// TI - A survey on selective forwarding attack in wireless sensor networks ID - Bysani2011 ER - TY - BOOK AU - Krontiris, I. AU - Giannetsos, T. AU - Dimitriou, T. PY - 2008 DA - 2008// TI - Launching a sinkhole attack in wireless sensor networks: The intruder side ID - Krontiris2008 ER - TY - BOOK AU - Newsome, J. AU - Shi, E. AU - Song, D. AU - Perrig, A. PY - 2004 DA - 2004// TI - The Sybil attack in sensor networks: Analysis defenses ID - Newsome2004 ER - TY - JOUR AU - Gezici, S. AU - Tian, Z. AU - Giannakis, G. AU - Kobayashi, H. AU - Molisch, A. AU - Poor, H. AU - Sahinoglu, Z. PY - 2005 DA - 2005// TI - Localization via ultra-wideband radios: A look at positioning aspects for future sensor networks JO - Signal Process Mag. IEEE VL - 22 UR - https://doi.org/10.1109/MSP.2005.1458289 DO - 10.1109/MSP.2005.1458289 ID - Gezici2005 ER -