참고문헌
- M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002 http://www.sensorsmag.comiarticles/0402/40/main/shtml
- W. Heinzelman, A. Chandrakasan, H. Balakrishnan, 'Energy Efficient Communication protocol for Wireless Microsensor Networks,' Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. 2000
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002 https://doi.org/10.1109/MCOM.2002.1024422
- J. M. Kahn, R. H. Katz, and K. S. J. Pister, 'Next century challenges: Mobile networking for smart dust,' in Proceedings of the 5th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), 1999, pp. 483-492 https://doi.org/10.1145/313451.313558
- W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976 https://doi.org/10.1109/TIT.1976.1055638
- A. Perrig, R: Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'Spins: Security protocols 'for sensor networks,' in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199 https://doi.org/10.1145/381677.381696
- W. Fumy and P. Landrock, 'Principles of key management,' IEEE Journal of Selected Areas in Communications, vol. 11, pp. 785-793, June 1993 https://doi.org/10.1109/49.223881
- T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc) 2004
- B. C. Neuman and T. Tso, 'Kerberos: An authentication service for computer networks,' IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994 https://doi.org/10.1109/35.312841
- R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
- L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 18-22, 2002, pp. 41-47 https://doi.org/10.1145/586110.586117
- S. Basagni, K. Herrin, D. Bruschi, and E. Rosti 'Secure pebblenets,' In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, 2001, pp. 156-163 https://doi.org/10.1145/501436.501438
- 김복순, 조기환, 이행곤, 박병연, '센서 네트워크에서 랜덤 키 체인을 활용한 단대단 키 협의 방안', 한국통신학회 추계종합 학술발표논문집, 28, 2003. pp. 1-12
- H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, May, 2003, pp. 197-213
- L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, Nov. 2002, pp. 41-47 https://doi.org/10.1145/586110.586117
- S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
- Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks' In the proc. of l0th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, Feb. 2003 https://doi.org/10.1109/ICTEL.2003.1191669
- M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in CryptologyCRYPTO'89, pp. 324-334, 1989, LNCS Volume 435, Springer-verlag
- A. Khalili, et al., 'Toward Secure key Distribution in Truly Ad-Hoc Networks,' IEEE SAINT'03, pp. 342-346, Jan. 2003
- D. Boneh, et al., 'Identity-based Encryption from the Weil Pairing,' CRYPTO 2001, vol. 2139, pp. 213-229, Aug. 2001
- I. zHOU, ET AL., 'Securing Ad Hoc Networks,' IEEE Network Magazine, 13(6), Nov./Dec. 1999 https://doi.org/10.1109/65.806983
- L. Venkatraman et al., 'A Novel Authentication Schemes Ad Hoc Networks,' IEEE WCNC' 2000, vol.3, pp. 1268-1273, 2000 https://doi.org/10.1109/WCNC.2000.904814
- C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, 'On key distrubution and authentication in mobile radio networks,' Advances in Cryptology - euroCrypt'93, pp. 461-465, 1993, INCS Volume 765, Springer-verlag
- D. Carman, P. Kruus, and B. Matt, 'Constraints and approaches for distributed sensor network security,' Tech. Rep. 00-010, NAI Labs, September 2000. http://download.nai.com/produets/media/nai/zip/nailabs-report-00-010-final.zip
- Network simulator. Available in http://www.isi.edu/nsnam/ns, January 2003