• Sun Z, Ni T, Yang H, Liu K, Zhang Y, Gu T and Xu W. (2024). FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks. ACM Transactions on Sensor Networks. 20:3. (1-28). Online publication date: 31-May-2024.

    https://doi.org/10.1145/3641548

  • Carnevale L, Ficara A, Catalfamo G, Galletta A, Fazio M and Villari M. (2023). Secure and Energy Efficient Filtered Over-the-Air Internet of Things Setup in a Wireless Mesh Network for Firmware Freshness 2023 IEEE International Conference on Big Data (BigData). 10.1109/BigData59044.2023.10386600. 979-8-3503-2445-7. (3904-3913).

    https://ieeexplore.ieee.org/document/10386600/

  • Dushku E and Dragoni N. (2023). Secure Software Updates in IoT Devices. Encyclopedia of Cryptography, Security and Privacy. 10.1007/978-3-642-27739-9_1784-1. (1-4).

    https://link.springer.com/10.1007/978-3-642-27739-9_1784-1

  • Arakadakis K, Charalampidis P, Makrogiannakis A and Fragkiadakis A. (2021). Firmware Over-the-air Programming Techniques for IoT Networks - A Survey. ACM Computing Surveys. 54:9. (1-36). Online publication date: 31-Dec-2022.

    https://doi.org/10.1145/3472292

  • Nikbakht Bideh P and Gehrmann C. RoSym. Proceedings of the 4th Workshop on CPS & IoT Security and Privacy. (35-46).

    https://doi.org/10.1145/3560826.3563381

  • Xue N, Zhang J, Li Z, Hong X, Tang H and Huang X. (2022). SFIOT: Software-Defined Function for the IoT 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 10.1109/WoWMoM54355.2022.00018. 978-1-6654-0876-9. (20-30).

    https://ieeexplore.ieee.org/document/9842792/

  • Huynh-Van D, Le-Thi-Chau N, Ngo-Khanh K and Le-Trung Q. (2019). Towards an Integration of AES Cryptography into Deluge Dissemination Protocol for Securing IoTs Reconfiguration 2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF). 10.1109/RIVF.2019.8713757. 978-1-5386-9313-1. (1-6).

    https://ieeexplore.ieee.org/document/8713757/

  • Hossain M, Karim Y and Hasan R. SecuPAN. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. (307-318).

    https://doi.org/10.1145/3176258.3176326

  • Stefanizzi M, Mottola L, Mainetti L and Patrono L. (2017). COIN. IEEE Communications Magazine. 55:2. (20-26). Online publication date: 1-Feb-2017.

    https://doi.org/10.1109/MCOM.2017.1600656CM

  • Tan H, Hu W and Jha S. (2015). A remote attestation protocol with Trusted Platform Modules TPMs in wireless sensor networks.. Security and Communication Networks. 8:13. (2171-2188). Online publication date: 10-Sep-2015.

    https://doi.org/10.1002/sec.1162

  • Stecklina O, Kornemann S, Grehl F, Jung R, Kranz T, Leander G, Schweer D, Mollus K and Westhoff D. (2015). Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes 2015 15th International Conference on Innovations for Community Services (I4CS). 10.1109/I4CS.2015.7294492. 978-1-4673-7327-2. (1-8).

    http://ieeexplore.ieee.org/document/7294492/

  • Xie M, Bhanja U, Zhang G, Wei G and Ling Y. (2015). Social role-based secure large data objects dissemination in mobile sensing environment. Computer Communications. 65:C. (27-34). Online publication date: 1-Jul-2015.

    https://doi.org/10.1016/j.comcom.2015.02.007

  • Xie M, Bhanja U, Wei G, Ling Y, Hassan M and Alamri A. (2015). SecNRCC. Concurrency and Computation: Practice & Experience. 27:10. (2668-2680). Online publication date: 1-Jul-2015.

    https://doi.org/10.1002/cpe.3277

  • Nirmala M and Manjunath A. Framework for Secure Code Updates for Wireless Sensor Nodes. Proceedings of the 2015 12th International Conference on Information Technology - New Generations. (292-295).

    https://doi.org/10.1109/ITNG.2015.53

  • Nirmala M and Manjunath A. SCUMG. Proceedings of the 2015 12th International Conference on Information Technology - New Generations. (249-254).

    https://doi.org/10.1109/ITNG.2015.46

  • Alam A, Eyers D and Huang Z. (2015). Helping secure robots in WSN environments by monitoring WSN software updates for intrusions 2015 6th International Conference on Automation, Robotics and Applications (ICARA 2015). 10.1109/ICARA.2015.7081151. 978-1-4799-6466-6. (223-229).

    http://ieeexplore.ieee.org/document/7081151/

  • Tsai K. (2016). Robust distributed reprogramming protocol of wireless sensor. International Journal of Distributed Sensor Networks. 2015. (4-4). Online publication date: 1-Jan-2015.

    https://doi.org/10.1155/2015/139874

  • Nirmala M and Manjunath A. (2015). Mobile agent based secure code update in wireless sensor networks 2015 International Conference on Information Networking (ICOIN). 10.1109/ICOIN.2015.7057860. 978-1-4799-8342-1. (75-80).

    http://ieeexplore.ieee.org/document/7057860/

  • Karame G and Li W. (2015). Secure Erasure and Code Update in Legacy Sensors. Trust and Trustworthy Computing. 10.1007/978-3-319-22846-4_17. (283-299).

    https://link.springer.com/10.1007/978-3-319-22846-4_17

  • Shim K. (2014). S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks. 10.1016/j.adhoc.2014.01.011. 19. (1-8). Online publication date: 1-Aug-2014.

    https://linkinghub.elsevier.com/retrieve/pii/S1570870514000225

  • Kumar V and Madria S. Efficient and Secure Code Dissemination in Sensor Clouds. Proceedings of the 2014 IEEE 15th International Conference on Mobile Data Management - Volume 01. (103-112).

    https://doi.org/10.1109/MDM.2014.19

  • Doroodgar F, Razzaque M and Isnin I. (2014). Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks. Sensors. 10.3390/s140305004. 14:3. (5004-5040).

    https://www.mdpi.com/1424-8220/14/3/5004

  • Chapin P, Skalka C, Smith S and Watson M. (2013). Scalaness/nesT. ACM SIGPLAN Notices. 49:3. (135-144). Online publication date: 5-Mar-2014.

    https://doi.org/10.1145/2637365.2517217

  • Casola V, De Benedictis A and Albanese M. (2014). A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. Integration of Reusable Systems. 10.1007/978-3-319-04717-1_14. (299-324).

    https://link.springer.com/10.1007/978-3-319-04717-1_14

  • He D, Chen C, Chan S, Bu J and Yang L. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Transactions on Industrial Electronics. 10.1109/TIE.2012.2218562. 60:11. (5348-5354).

    http://ieeexplore.ieee.org/document/6301694/

  • Chapin P, Skalka C, Smith S and Watson M. Scalaness/nesT. Proceedings of the 12th international conference on Generative programming: concepts & experiences. (135-144).

    https://doi.org/10.1145/2517208.2517217

  • Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H and Wehrle K. 6LoWPAN fragmentation attacks and mitigation mechanisms. Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. (55-66).

    https://doi.org/10.1145/2462096.2462107

  • Battista E, Casola V, Mazzeo A and Mazzocca N. (2013). SIREN. International Journal of Critical Computer-Based Systems. 4:4. (374-392). Online publication date: 1-Feb-2013.

    https://doi.org/10.1504/IJCCBS.2013.059053

  • Tan H, Ostry D, Zic J and Jha S. (2013). A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Computers and Security. 32:C. (36-55). Online publication date: 1-Feb-2013.

    https://doi.org/10.1016/j.cose.2012.09.012

  • Xiao-Hui K, Li L, Fei X and Qiang L. Efficient and Secure Dissemination of Code Updates in Sensor Networks. Proceedings of the 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control. (452-456).

    https://doi.org/10.1109/IMCCC.2012.112

  • Ramalingam K, Subramanian V, Uluagac A and Beyah R. (2012). SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks GLOBECOM 2012 - 2012 IEEE Global Communications Conference. 10.1109/GLOCOM.2012.6503181. 978-1-4673-0921-9. (616-621).

    http://ieeexplore.ieee.org/document/6503181/

  • Parthasarathy R, Shirazi B, Peterson N, Song W and Hurson A. (2012). Management and security of remote sensor networks in hazardous environments using over the air programming. Information Systems and e-Business Management. 10:4. (521-548). Online publication date: 1-Dec-2012.

    https://doi.org/10.1007/s10257-011-0176-2

  • He D, Chen C, Chan S and Bu J. SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Transactions on Industrial Electronics. 10.1109/TIE.2011.2178214. 59:11. (4155-4163).

    http://ieeexplore.ieee.org/document/6095622/

  • Brandolese C, Fornaciari W, Rucco L and Terraneo F. Enabling ultra-low power operation in high-end wireless sensor networks nodes. Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. (433-442).

    https://doi.org/10.1145/2380445.2380513

  • Ayday E and Fekri F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks. 10:7. (1278-1290). Online publication date: 1-Sep-2012.

    https://doi.org/10.1016/j.adhoc.2012.03.010

  • Aschenbruck N, Bauer J, Bieling J, Bothe A and Schwamborn M. (2012). Selective and Secure Over-The-Air Programming for Wireless Sensor Networks 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. 10.1109/ICCCN.2012.6289278. 978-1-4673-1544-9. (1-6).

    http://ieeexplore.ieee.org/document/6289278/

  • Aschenbruck N, Bauer J, Bieling J, Bothe A and Schwamborn M. (2012). Let's Move: Adding Arbitrary Mobility to WSN Testbeds 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. 10.1109/ICCCN.2012.6289190. 978-1-4673-1544-9. (1-7).

    http://ieeexplore.ieee.org/document/6289190/

  • He D, Chan S, Chen C and Bu J. (2012). Secure and efficient dynamic program update in wireless sensor networks. Security and Communication Networks. 5:7. (823-830). Online publication date: 1-Jul-2012.

    https://doi.org/10.1002/sec.377

  • Kandappu T, Sivaraman V and Boreli R. (2012). A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). 10.1109/SECON.2012.6275816. 978-1-4673-1905-8. (488-496).

    http://ieeexplore.ieee.org/document/6275816/

  • Urra O, Ilarri S, Trillo R and Mena E. Mobile Software Agents for Mobile Applications. Handbook of Research on Mobile Software Engineering. 10.4018/978-1-61520-655-1.ch039. (725-740).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-655-1.ch039

  • Wagner S, Krauß C and Eckert C. (2012). T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. Security and Privacy in Communication Networks. 10.1007/978-3-642-31909-9_32. (511-521).

    http://link.springer.com/10.1007/978-3-642-31909-9_32

  • Nirmala M, Majunath A and Yogesh B. (2012). Tiny SPU: Implementation and Analysis of Secure Program Update for Clustered Wireless Sensor Networks. Global Trends in Computing and Communication Systems. 10.1007/978-3-642-29219-4_80. (703-713).

    http://link.springer.com/10.1007/978-3-642-29219-4_80

  • Dini G and Savino I. (2011). LARK. ACM Transactions on Embedded Computing Systems. 10:4. (1-35). Online publication date: 1-Nov-2011.

    https://doi.org/10.1145/2043662.2043665

  • Zhang R and Zhang Y. LR-Seluge. Proceedings of the 2011 31st International Conference on Distributed Computing Systems. (497-506).

    https://doi.org/10.1109/ICDCS.2011.51

  • Jean E, Sedigh S, Hurson A and Shirazi B. (2011). Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems. Pervasive Computing and Networking. 10.1002/9781119970422.ch2. (09-26). Online publication date: 3-Jun-2011.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119970422.ch2

  • Krontiris I and Dimitriou T. (2011). Scatter – secure code authentication for efficient reprogramming in wireless sensor networks. International Journal of Sensor Networks. 10:1/2. (14-24). Online publication date: 1-Jun-2011.

    /doi/10.5555/2000356.2000358

  • Sivaraman V, Ostry D, Shaheen J, Hianto A and Jha S. (2011). Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking. 2011. (1-12). Online publication date: 1-Jan-2011.

    https://doi.org/10.1155/2011/695171

  • Law Y, Zhang Y, Jin J, Palaniswami M and Havinga P. (2011). Secure rateless deluge. EURASIP Journal on Wireless Communications and Networking. 2011. (1-22). Online publication date: 1-Jan-2011.

    https://doi.org/10.1155/2011/685219

  • Tan H, Zic J, Jha S and Ostry D. (2011). Secure Multihop Network Programming with Multiple One-Way Key Chains. IEEE Transactions on Mobile Computing. 10:1. (16-31). Online publication date: 1-Jan-2011.

    https://doi.org/10.1109/TMC.2010.140

  • Nirmala M and Manjunath A. (2011). Confidential Program update with dynamic key computation for clustered wireless sensor networks 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011). 10.1109/COMSNETS.2011.5716430. 978-1-4244-8952-7. (1-8).

    http://ieeexplore.ieee.org/document/5716430/

  • Nirmala M and Manjunath A. (2010). Secure program update using broadcast encryption for clustered wireless sensor networks 2010 Sixth International Conference on Wireless Communication and Sensor Networks (WCSN). 10.1109/WCSN.2010.5712303. 978-1-4244-9731-7. (1-6).

    http://ieeexplore.ieee.org/document/5712303/

  • Hu W, Tan H, Corke P, Shih W and Jha S. (2010). Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks. 7:1. (1-25). Online publication date: 1-Aug-2010.

    https://doi.org/10.1145/1806895.1806900

  • Wang W, Bu L and Li Y. (2010). Security analysis of a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters. 14:8. (782-784). Online publication date: 1-Aug-2010.

    https://doi.org/10.1109/LCOMM.2010.08.100406

  • Ali S, Sivaraman V, Dhamdhere A and Ostry D. (2010). Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks. 8:6. (668-679). Online publication date: 1-Aug-2010.

    https://doi.org/10.1016/j.adhoc.2010.01.003

  • Singh K and Muthukkumarasamy V. (2010). Key establishment protocols using environmental and physiological data in wireless sensor networks. International Journal of Sensor Networks. 8:1. (8-26). Online publication date: 1-Jul-2010.

    https://doi.org/10.1504/IJSNET.2010.034063

  • Hossain M and Raghunathan V. AEGIS. Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems. (258-272).

    https://doi.org/10.1007/978-3-642-13651-1_19

  • Dini G and Savino I. (2010). A Security Architecture for Reconfigurable Networked Embedded Systems. International Journal of Wireless Information Networks. 10.1007/s10776-010-0116-y. 17:1-2. (11-25). Online publication date: 1-Jun-2010.

    http://link.springer.com/10.1007/s10776-010-0116-y

  • De P, Liu Y and Das S. (2010). Energy-Efficient Reprogramming of a Swarm of Mobile Sensors. IEEE Transactions on Mobile Computing. 9:5. (703-718). Online publication date: 1-May-2010.

    https://doi.org/10.1109/TMC.2009.159

  • Zeng P, Choo K and Sun D. (2010). On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Transactions on Consumer Electronics. 56:2. (566-569). Online publication date: 1-May-2010.

    https://doi.org/10.1109/TCE.2010.5505971

  • Gu Q. Efficient code diversification for network reprogramming in sensor networks. Proceedings of the third ACM conference on Wireless network security. (145-150).

    https://doi.org/10.1145/1741866.1741890

  • Mitra S, Zheng Z, Guha S, Ghosh A, Dutta P, Krishna B, Plarre K, Kumar S and Sinha P. An affordable, long-lasting, and autonomous theft detection and tracking system. Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems. (351-352).

    https://doi.org/10.1145/1644038.1644096

  • Li W, Zhang Y, Yang J and Zheng J. (2009). Towards update-conscious compilation for energy-efficient code dissemination in WSNs. ACM Transactions on Architecture and Code Optimization. 6:4. (1-33). Online publication date: 1-Oct-2009.

    https://doi.org/10.1145/1596510.1596512

  • Zhang Y, Zhou X, Law Y and Palaniswami M. Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02. (263-266).

    https://doi.org/10.1109/IAS.2009.215

  • de la Parra C and Garcia-Macias J. A protocol for secure and energy-aware reprogramming in WSN. Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly. (292-297).

    https://doi.org/10.1145/1582379.1582443

  • Li W, Zhang Y and Childers B. MCP. Proceedings of the 5th IEEE International Conference on Distributed Computing in Sensor Systems. (259-272).

    https://doi.org/10.1007/978-3-642-02085-8_19

  • Zeng P, Cao Z, Choo K and Wang S. (2009). Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters. 13:6. (426-428). Online publication date: 1-Jun-2009.

    https://doi.org/10.1109/LCOMM.2009.082215

  • Zhang R, Zhang Y and Ren K. (2009). DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks 2009 Proceedings IEEE INFOCOM. 10.1109/INFCOM.2009.5062039. 978-1-4244-3512-8. (1251-1259).

    http://ieeexplore.ieee.org/document/5062039/

  • Tan H, Ostry D, Zic J and Jha S. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Proceedings of the second ACM conference on Wireless network security. (245-252).

    https://doi.org/10.1145/1514274.1514308

  • Ugus O, Westhoff D and Bohli J. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme. Proceedings of the second ACM conference on Wireless network security. (29-40).

    https://doi.org/10.1145/1514274.1514279

  • De P, Liu Y and Das S. (2009). An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. IEEE Transactions on Mobile Computing. 8:3. (413-425). Online publication date: 1-Mar-2009.

    https://doi.org/10.1109/TMC.2008.115

  • Hu W, Corke P, Shih W and Overs L. secFleck. Proceedings of the 6th European Conference on Wireless Sensor Networks. (296-311).

    https://doi.org/10.1007/978-3-642-00224-3_19

  • Kapadia A, Kotz D and Triandopoulos N. Opportunistic sensing. Proceedings of the First international conference on COMmunication Systems And NETworks. (127-136).

    /doi/10.5555/1702135.1702156

  • ZHANG Y, ZHOU X, JI Y, LAW Y and PALANISWAMI M. (2009). Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks. International Journal of Communications, Network and System Sciences. 10.4236/ijcns.2009.21008. 02:01. (64-72).

    http://www.scirp.org/journal/doi.aspx?DOI=10.4236/ijcns.2009.21008

  • Kapadia A, Kotz D and Triandopoulos N. (2009). Opportunistic sensing: Security challenges for the new paradigm 2009 First International Communication Systems and Networks and Workshops (COMSNETS). 10.1109/COMSNETS.2009.4808850. 978-1-4244-2912-7. (1-10).

    http://ieeexplore.ieee.org/document/4808850/

  • Parvin S. (2008). Publish/subscribe based reprogramming of sensor networks 2008 International Conference on Electrical and Computer Engineering. 10.1109/ICECE.2008.4769342. 978-1-4244-2014-8. (915-919).

    http://ieeexplore.ieee.org/document/4769342/

  • Francillon A and Castelluccia C. Code injection attacks on harvard-architecture devices. Proceedings of the 15th ACM conference on Computer and communications security. (15-26).

    https://doi.org/10.1145/1455770.1455775

  • Patel S and Sanyal P. (2008). Securing SCADA systems. Information Management & Computer Security. 10.1108/09685220810908804. 16:4. (398-414). Online publication date: 10-Oct-2008.

    http://www.emeraldinsight.com/doi/10.1108/09685220810908804

  • Zhang Y, Zhou X, Ji Y, Fang Z and Wang L. (2008). Secure and DoS-Resistant Network Reprogramming in Sensor Networks Based on CPK 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). 10.1109/WiCom.2008.918. 978-1-4244-2107-7. (1-5).

    http://ieeexplore.ieee.org/document/4678826/

  • Zhang Y, Xue D, Wu C and Chu H. (2008). Design and Implementation of a Wireless Sensor Network Node 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). 10.1109/WiCom.2008.906. 978-1-4244-2107-7. (1-4).

    http://ieeexplore.ieee.org/document/4678814/

  • Zhang Q, Wang J, Jin C and Zeng Q. (2008). Localization Algorithm for Wireless Sensor Network Based on Genetic Simulated Annealing Algorithm 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). 10.1109/WiCom.2008.850. 978-1-4244-2107-7. (1-5).

    http://ieeexplore.ieee.org/document/4678758/

  • Jang-Ping Sheu , Chia-Jen Chang , Chung-Yueh Sun and Wei-KaiHu . (2008). WSNTB: A testbed for heterogeneous wireless sensor networks 2008 First IEEE International Conference on Ubi-media Computing (U-Media 2008). 10.1109/UMEDIA.2008.4570913. 978-1-4244-1865-7. (338-343).

    http://ieeexplore.ieee.org/document/4570913/

  • Ayday E, Delgosha F and Fekri F. (2008). AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 10.1109/SAHCN.2008.62. 978-1-4244-1777-3. (460-468).

    http://ieeexplore.ieee.org/document/4557785/

  • Das M and Joshi A. Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle. IEEE Communications Letters. 10.1109/LCOMM.2008.080213. 12:6. (471-473).

    http://ieeexplore.ieee.org/document/4542786/

  • Ying Song , Wendong Xiao , Waluyo A, Xiang Chen and Jian Kang Wu . (2008). A service-specific middleware for flexible deployment of wireless body area network applications 2008 IEEE International Conference on Multimedia and Expo (ICME). 10.1109/ICME.2008.4607616. 978-1-4244-2570-9. (1041-1044).

    http://ieeexplore.ieee.org/document/4607616/

  • Nilsson D and Larson U. (2008). Secure Firmware Updates over the Air in Intelligent Vehicles ICC 2008 - 2008 IEEE International Conference on Communications Workshops. 10.1109/ICCW.2008.78. . (380-384).

    http://ieeexplore.ieee.org/document/4531926/

  • Liu A, Oh Y and Ning P. Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. Proceedings of the 7th international conference on Information processing in sensor networks. (561-562).

    https://doi.org/10.1109/IPSN.2008.13

  • Hyun S, Ning P, Liu A and Du W. Seluge. Proceedings of the 7th international conference on Information processing in sensor networks. (445-456).

    https://doi.org/10.1109/IPSN.2008.12

  • Sang L and Arora A. (2008). Spatial Signatures for Lightweight Security in Wireless Sensor Networks IEEE INFOCOM 2008 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2008.280. 978-1-4244-2026-1. (2137-2145).

    http://ieeexplore.ieee.org/document/4509875/

  • Tan H, Jha S, Ostry D, Zic J and Sivaraman V. Secure multi-hop network programming with multiple one-way key chains. Proceedings of the first ACM conference on Wireless network security. (183-193).

    https://doi.org/10.1145/1352533.1352564

  • Nilsson D, Roosta T, Lindqvist U and Valdes A. Key management and secure software updates in wireless process control environments. Proceedings of the first ACM conference on Wireless network security. (100-108).

    https://doi.org/10.1145/1352533.1352550

  • PLATON E and SEI Y. (2008). Security software engineering in wireless sensor networks. Progress in Informatics. 10.2201/NiiPi.2008.5.6:5. (49). Online publication date: 1-Mar-2008.

    http://www.nii.ac.jp/pi/n5/5_49.html

  • Sabbah E, Kang K, Abu‐Ghazaleh N, Majeed A and Liu K. (2007). An application‐driven approach to designing secure wireless sensor networks. Wireless Communications and Mobile Computing. 10.1002/wcm.583. 8:3. (369-384). Online publication date: 1-Mar-2008.

    https://onlinelibrary.wiley.com/doi/10.1002/wcm.583

  • Raymond D and Midkiff S. (2008). Denial-of-Service in Wireless Sensor Networks. IEEE Pervasive Computing. 7:1. (74-81). Online publication date: 1-Jan-2008.

    https://doi.org/10.1109/MPRV.2008.6

  • Tian J, Gao M, Liu Y and Zhou H. The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage Treatment. Proceedings of the 2007 International Conference on Computational Intelligence and Security. (1025-1029).

    https://doi.org/10.1109/CIS.2007.227

  • Reviewers. Proceedings of the 28th IEEE International Real-Time Systems Symposium. (xv-xvi).

    https://doi.org/10.1109/RTSS.2007.42

  • Shaheen J, Ostry D, Sivaraman V and Jha S. (2007). Confidential and Secure Broadcast in Wireless Sensor Networks 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. 10.1109/PIMRC.2007.4394560. 978-1-4244-1143-6. (1-5).

    http://ieeexplore.ieee.org/document/4394560/

  • Park K, Lee J, Kwon T and Song J. Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing. (653-662).

    /doi/10.5555/2391319.2391388

  • Park K, Lee J, Kwon T and Song J. Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing. (653-662).

    https://doi.org/10.1007/978-3-540-73549-6_64

  • Kim D, Gandhi R and Narasimhan P. Exploring Symmetric Cryptography for Secure Network Reprogramming. Proceedings of the 27th International Conference on Distributed Computing Systems Workshops.

    https://doi.org/10.1109/ICDCSW.2007.37

  • Li W, Zhang Y, Yang J and Zheng J. UCC. Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation. (383-393).

    https://doi.org/10.1145/1250734.1250778

  • Li W, Zhang Y, Yang J and Zheng J. (2007). UCC. ACM SIGPLAN Notices. 42:6. (383-393). Online publication date: 10-Jun-2007.

    https://doi.org/10.1145/1273442.1250778

  • Pai S, Kuryloski P, Yip H, Yennamandra S, Wicker S, Boehner K and Gay G. Networks of Sensors in Public Spaces. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02. (396-402).

    https://doi.org/10.1109/AINAW.2007.265

  • Francillon A and Castelluccia C. (2007). TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt). 10.1109/WIOPT.2007.4480051. 978-1-4244-0960-0. (1-7).

    http://ieeexplore.ieee.org/document/4480051/

  • Wang L and Kulkarni S. (2007). Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries 2007 IEEE International Parallel and Distributed Processing Symposium. 10.1109/IPDPS.2007.370351. 1-4244-0909-8. (1-8).

    http://ieeexplore.ieee.org/document/4228079/

  • Wang C, Mueller F, Engelmann C and Scott S. (2007). A Job Pause Service under LAM/MPI+BLCR for Transparent Fault Tolerance 2007 IEEE International Parallel and Distributed Processing Symposium. 10.1109/IPDPS.2007.370307. 1-4244-0909-8. (1-10).

    http://ieeexplore.ieee.org/document/4228035/

  • Iwanicki K and van Steen M. (2007). Towards a Versatile Problem Diagnosis Infrastructure for LargeWireless Sensor Networks. On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. 10.1007/978-3-540-76890-6_10. (845-855).

    http://link.springer.com/10.1007/978-3-540-76890-6_10

  • ISHIGURO M, TEI K, FUKAZAWA Y and HONIDEN S. A Sensor Middleware for Lightweight Relocatable Sensing Programs. Proceedings of the International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce.

    https://doi.org/10.1109/CIMCA.2006.27

  • Seshadri A, Luk M, Perrig A, van Doorn L and Khosla P. SCUBA. Proceedings of the 5th ACM workshop on Wireless security. (85-94).

    https://doi.org/10.1145/1161289.1161306

  • Cao Z, Zhou X, Xu M, Chen Z, Hu J and Tang L. (2006). Enhancing Base Station Security Against DoS Attacks in Wireless Sensor Networks 2006 International Conference on Wireless Communications, Networking and Mobile Computing. 10.1109/WiCOM.2006.248. 1-4244-0517-3. (1-4).

    http://ieeexplore.ieee.org/document/4149425/

  • Lanigan P, Gandhi R and Narasimhan P. Sluice. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems.

    https://doi.org/10.1109/ICDCS.2006.77

  • Deng J, Han R and Mishra S. Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the 5th international conference on Information processing in sensor networks. (292-300).

    https://doi.org/10.1145/1127777.1127822