An overview of security, privacy, auditing and key management in wireless networks


  1. J. Zhang, T. Duong, and A. Marshal, “Key Generation From Wireless Channels: A Review,” IEEE Access 2016, vol. 4, pp. 614-626, 2016
  2. A. Sirisha, P. P. Priyanka, and P. Ratnakumari, “Design and Analysis of a Novel Extended Three-Tier Security Scheme for Efficient Data Transfer in Mobile Networks,” IJCA, vol. 6, no. 1, Feb. 2016.
  3. D. Ma and G. Tsudik, “Security and privacy in emerging wireless networks,” IEEE Wireless Communications, October 2010.
  4. M. LI and W. LOU, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications, 2010.
  5. X. Qin, M. Alghamdi, M. Nijim, and Z. Zong, “Improving Security of Real-Time Wireless Networks through Packet Scheduling,” IEEE TWC, vol. 7, no. 9, 2008.
  6. P. Jindal and B. Singh, “Study and Performance Evaluation of Security-Throughput Tradeoff with Link Adaptive Encryption Scheme,” IJSPTM, vol. 1, no. 5, October 2012.
  7. M. Shin and J. Ma, and A. Mishra, “Wireless Network Security and Interworking,” Proceedings of the IEEE, vol. 94, no. 2, 2006.
  8. H. Deng and W. Li, “Agrawal D. P., Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, October 2002.
  9. J. Jeong and Z. J. Haas, “An integrated security framework for Open wireless networking architecture,” IEEE Wireless Communications, 2007.
  10. X. Yang, “Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks,” IEEE, 2008.
  11. X. Yang, “Flow-Net Methodology for Accountability in Wireless Networks,” IEEE, 2009.
  12. W. LOU and K. REN, “Security, privacy, and accountability in wireless access networks,” IEEE Wireless Communications, 2009.
  13. X. Zhifeng and X. Yang, “A Quantitative Study of Accountability in Wireless Multi-hop Networks,” 39th International Conference on Parallel Processing, IEEE, 2010.
  14. B. Fu and Y. Xiao, “Accountability and Q-Accountable Logging in Wireless Netwoks,” Wireless Personal Communication, vol. 75, no. 3, pp. 1715-1746, Apr. 2014.
  15. K. Defrawy and C. Soriente, “PEUC-WiN: Privacy Enhancement by User Cooperation inWireless Networks,” IEEE, 2006.
  16. H. Wenbo, L. Xue, and N. Hoang, “PDA: Privacypreserving Data Aggregation in Wireless Sensor Networks,” IEEE INFOCOM 2007 proceedings, 2007.
  17. R. A. Shaikh, S. Lee, and A. Albeshri, “Security Completeness Problem in Wireless Sensor Networks,” Autosoft, DOI: 10,108/10798587.2014.970345, 2014.
  18. J. Ying, C. Shigang, and Z. Zhan, “A Novel Scheme for Protecting Receiver’s Location Privacy in Wireless Sensor Networks,” IEEE TWC, vol. 7, no. 10, 2008.
  19. Y. Jianbo and W. Guangjun, “Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks,” IEEE, 2008.
  20. F. Yanfei, “Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks,” IEEE TWC, vol. 10, no. 3, 2011.
  21. M. E. A. Mohamed Mahmoud and S. Xuemin (Sherman), “A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks,” IEEE TPDS, vol. 23, no. 10, 2012.
  22. W. Zhiguo, X. Kai, and L. Yunhao, “Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks,” Proceedings IEEE INFOCOM, 2012.
  23. A. Chandrashekhar and A. Sumit, “Security, Privacy and Accountability in Wireless Network,” IJERT, vol. 2, Issue 7, pp. 1-10, 2013.
  24. S. lazim and Q. I. Ali, “Design and implementation of an embedded intrusion detection system for wireless applications,” IET Inf. Secur., vol. 6, Issue 3, pp. 171-182, 2012.
  25. Y. Jie and C. Yingying, “Detection and Localization of Multiple Spoofing Attackers in Wireless Networks,” IEEE TPDS, vol. 24, 2013.
  26. A. Rasheed and N. Rabi, “The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks”, IEEE TPDS, vol. 23, no. 5, 2012.
  27. K.Q. Yan and S. C. Wang et al., “Hybrid Intrusion Detection System for Enhancing the Security of a Cluster-based Wireless Sensor Network,” IEEE, 2010.
  28. W. Weijia, H. Lei, and L. Yong, “Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks,” IEEE Communications Letters, vol. 14, no. 8, 2010.
  29. C. Mauro and D. Roberto, “Distributed Detection of Clone Attacks in Wireless Sensor Networks,” IEEE TDSC, vol. 8, no. 5, 2011.
  30. L. George, K. Byungsuk, and F. Anjum, “A Policy-based Approach to Wireless LAN Security Management,” IEEE, 2007.
  31. X. Debao, C. Chao, and C. Gaolin, “Intrusion Detection based Security Architecture for Wireless Sensor Networks,” Proceedings of ISCIT, 2005.
  32. L. Shu Yun and L. Meng-Hui, “Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network,” JUSPN, vol. 2, no. 1, pp. 39-47, 2011.
  33. D. Carman, B. Matt, and G. Cirincione, “Energy-efficient and Low-latency Key Management for Sensor Networks,” Proceedings of 23rd Army Science Conference, 2002.
  34. D. Carman, P. Kruus, and B. Matt, “Constraints and Approaches for Distributed Sensor Network Security,” NAI Labs: Technical Report #0-010, 2000.
  35. L. Eschenauer and D. Virgil, “A key-management scheme for distributed sensor networks,” Proceedings of the 9th ACM CCCS, Washington, DC, USA, 2002.
  36. T. Park and K.G. Shin, “LiSP: A Lightweight Security Protocol for Wireless Sensor Networks,” ACM TECS, vol. 3, no. 3, 2004.
  37. S. Zhu and S. Setia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed WSN Networks,” ACM TSON, vol. 2, Issue 4, pp. 500-528, Nov. 2006.
  38. L. Eschenauer and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” 9th ACM CCCS, New York: ACM Press, pp. 41-47, 2002.
  39. H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE SSP, May 2003.
  40. C. Blundo et al., “Perfectly-Secure Key Distribution for Dynamic Conferences,” CRYPTO Proc. 12th Annual Int’l.Cryptology Conf. Advances in Cryptology, London: Springer-Verlag, pp. 471-486, 1993.
  41. W. Du et al., “A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge,” Proc. IEEE INFOCOM, Hong Kong, pp. 586–597, 2004.
  42. R. R. Pozo, “Protecting Contextual Information in WSNs Source- and Receiver-Location Privacy Solutions,” submitted in fulfillment of the requirements for the Degree of Doctor in Computer Science, pp. 1-252, 2014.
  43. A. Pranusha and G. Murali, “A Hybrid Key Management Scheme for Secure Manet Communications,” IJRET, vol. 4, Issue 2, 2015.
  44. N. Kittur and M. Dharishini, “Review of Key Management Technique for Wireless Body Area Networks,” IRJET, vol. 2, Issue 4, pp. 82-86, July 2015.
  45. B. Alohali and K. Kifayat, “A Survey on Cryptography Key Management Schemes for Smart Grid,” JCSA, vol. 3, no. 3, pp. 27-39, 2015.
  46. P. Sivakumar, S. Saravanan, and M. Anandaraj, “A survey in Wireless Sensor Networks based on Key Management Schemes,” IJATCSE, vol. 4, no. 2, 2015.
  47. A. Arul and M. Merlin, “Efficient Message Authentication and Source Privacy in Wireless Sensor Networks,” IJCSITR ISSN 2348-120X, vol. 3, Issue 1, pp. 222-227, 2015.