(1)RFID Security and Privacy
(a)Heydt-Benjamin, Thomas S., Bailey, Daniel V., Fu, Kevin, Juels, Ari and O'Hare, Tom,Vulnerabilities in First-Generation RFID-Enabled Credit Cards. Economic Perspectives, Vol. 33, No. 1, 2009.
(b)Low-Cost Untraceable Authentication Protocols for RFID, Yong Ki Lee, Lejla Batina, Dave Singeléand Ingrid Verbauwhede. ACM WiSec 2010.
(c)A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation, Yasunobu Nohara and Sozo Inoue. ACM WiSec 2010.
(d)Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions, Cai Shaoying (Singapore Management University), Yingjiu Li (Singapore Management University), Tieyan Li (Institute for Infocomm Research, Singapore), Robert Deng (Singapore Management University). ACm WiSec 2009.
(e)Radu-Ioan Paise and Serge Vaudenay. Mutual authentication in RFID: security and privacy. In Proceedings of the 2008 ACM symposium on Information, computer and communications security (ASIACCS '08).
(f)Marc Langheinrich. 2009. A survey of RFID privacy approaches. Personal Ubiquitous Comput. 13, 6 (August 2009), 413-421.
(2)Jamming and DoS attacks
(a)On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming , Bishal Thapa, Guevara Noubir, Rajmohan Rajaramanand and Bo Sheng. ACM WiSec 2011.
(b)Thwarting Inside Jamming Attacks on Wireless Broadcast Communications, Sisi Liu, Loukas Lazos and Marwan Krunz. ACM WiSec 2011.
(c)Reactive Jamming in Wireless Networks: How Realistic is the Threat?, Matthias Wilhelm, Ivan Martinovic, Jens Schmitt and Vincent Lenders. ACM WiSec 2011.
(d)Jamming for Good: A Fresh Approach to Authentic Communication in WSNs, Ivan Martinovic, Paul Pichota, Jens B. Schmitt (University of Kaiserslautern, Germany). ACM WiSec 2009.
(e)Mitigating Control-Channel Jamming Attacks in Multi-channel Ad Hoc Networks, Loukas Lazos, Sisi Liu, Marwan Krunz (University of Arizona, Tucson, US) ACM WiSec 2009.
(f)Jerry T. Chiang and Yih-Chun Hu. 2011. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19, 1 (February 2011), 286-298.
(3)Traffic and Behavior Analysis
(a)Inferring Users' Online Activities through Traffic Analysis, Fan Zhang, Wenbo He, Xue Liu and Patrick Bridges. ACM WiSec 2011.
(b)pBMDS: A Behavior-based Malware Detection System for Cellphone Devices, Liang Xie, Xinwen Zhang, Jean-Pierre Seifert and Sencun Zhu. ACM WiSec 2010.
(c)REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits, William Kozma, Loukas Lazos. ACM WiSec 2009.
(d)Raymond, D.R.; Marchany, R.C.; Brownfield, M.I.; Midkiff, S.F.; , "Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," Vehicular Technology, IEEE Transactions on , vol.58, no.1, pp.367-380, Jan. 2009.
(e)Yanfei Fan; Yixin Jiang; Haojin Zhu; Jiming Chen; Shen, X.S.; , "Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks," Wireless Communications, IEEE Transactions on , vol.10, no.3, pp.834-843, March 2011.
(f)Yong Sheng; Guanling Chen; Hongda Yin; Keren Tan; Deshpande, U.; Vance, B.; Kotz, D.; Campbell, A.; Mcdonald, C.; Henderson, T.; Wright, J.; , "Map: a scalable monitoring system for dependable 802.11 wireless networks," Wireless Communications, IEEE , vol.15, no.5, pp.10-18, October 2008
(4)Security in Vehicle Ad Hoc Networks
(a)ES-TeV: Efficient and Secure Threshold-based Event Validation for VANETs, Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi and Adrian Perrig. ACM WiSec 2011.
(b)A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks, Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2803-2814, Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu.
(c)A novel secure communication scheme in vehicular ad hoc networks, Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2827-2837, Neng-Wen Wang, Yueh-Min Huang, Wei-Ming Chen.
(d)Kamat, P., Baliga, A. and Trappe, W. (2008), Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security and Communication Networks, 1: 233–244.
(e)SPECS: Secure and privacy enhancing communications schemes for VANETs, Ad Hoc Networks, Volume 9, Issue 2, March 2011, Pages 189-203, T.W. Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li.
(f)Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation, Journal of Network and Computer Applications, Volume 34, Issue 6, November 2011, Pages 1942-1955, David Antolino Rivas, José M. Barceló-Ordinas, Manel Guerrero Zapata, Julián D. Morillo-Pozo.
(5)Remote Attestation of Wireless Devices
(a)Lightweight Remote Attestation based on Physical Functions, Ahmad-Reza Sadeghi, Steffen Schulz and Christian Wachsmann. ACM WiSec 2011.
(b)Self-healing Control Flow Protection in Sensor Applications, Christopher Ferguson, Qijun Gu, Hongchi Shi. ACM WiSec 2009.
(c)Kyungsub Song; Dongwon Seo; Haemin Park; Heejo Lee; Perrig, A.; , "OMAP: One-Way Memory Attestation Protocol for Smart Meters," Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on , vol., no., pp.111-118, 26-28 May 2011.
(d)Emanuele Cesena, Gianluca Ramunno, Roberto Sassu, Davide Vernizzi, and Antonio Lioy. 2011. On scalability of remote attestation. In Proceedings of the sixth ACM workshop on Scalable trusted computing (STC '11).
(e)Alam, M., Ali, T., Khan, S., Khan, S., Ali, M., Nauman, M., Hayat, A., Khurram Khan, M. and Alghathbar, K. (2011), Analysis of existing remote attestation techniques. Security and Communication Networks.
(f)Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. 2009. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In Proceedings of the 2009 ACM workshop on Scalable trusted computing (STC '09).
(6)Localization and Location Privacy
(a)Preventing Multi-query Attack in Location-based Services, Nilothpal Talukder and Sheikh Iqbal Ahamed. ACM WiSec 2010.
(b)Effectiveness of Distance-decreasing Attacks Against Impulse Radio Ranging, Manuel Flury, Marcin Poturalski, Panagiotis (Panos) Papadimitratos, Jean-Pierre Hubaux and Jean-Yves Le Boudec. ACM WiSec 2010.
(c)Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks, Qi Mi, John Stankovic and Radu Stoleru. ACM WiSec 2010.
(d)Secure and Precise Location Verification Using Distance Bounding and Simultaneous Multilateration, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu. ACM WiSec 2009.
(e)Li, Y.; Ren, J.; Wu, J.; , "Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks," Parallel and Distributed Systems, IEEE Transactions on , vol.PP, no.99, pp.1—10.
(f)Location privacy and resilience in wireless sensor networks querying, Computer Communications, Volume 34, Issue 3, 15 March 2011, Pages 515-523, Roberto Di Pietro, Alexandre Viejo
(7)Physical Layer Security
(a)Attacks on Physical-layer Identification, Boris Danev, Heinrich Luecken, Srdjan Capkun and Karim El Defrawy. ACM WiSec 2010.
(b)On the Reliability of Wireless Fingerprinting using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina and David Kotz. ACM WiSec 2010.
(c)Mathur, S.; Reznik, A.; Chunxuan Ye; Mukherjee, R.; Rahman, A.; Shah, Y.; Trappe, W.; Mandayam, N.; , "Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]," Wireless Communications, IEEE , vol.17, no.5, pp.63-70, October 2010.
(d)Wen, H.; Ho, P.-H.; Qi, C.; Gong, G.; , "Physical layer assisted authentication for distributed ad hoc wireless sensor networks," Information Security, IET , vol.4, no.4, pp.390-396, December 2010.
(e)Weichao Wang; Di Pu; Wyglinski, A.; , "Detecting Sybil nodes in wireless networks with physical layer network coding," Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on , vol., no., pp.21-30, June 28 2010-July 1 2010.