Resilient Security Protocol for Combating Replay Attacks in Wireless Sensor Networks |
Zhang, Di
(전북대학교 전자공학부 영상정보신기술연구센터)
Heo, Ung (전북대학교 전자공학부 영상정보신기술연구센터) You, Kang-Soo (전주대학교 교양학부) Choi, Jae-Ho (전북대학교 전자공학부 영상정보신기술연구센터) |
1 | L. Eschenauer and V. D. Glicor, "A key-management scheme for distributed sensor network," Proc. of 9th ACM conference (CCS '02), pp.41-47, Washington, D.C., USA, 2002. DOI |
2 | H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," 2003 IEEE Symposium on Security and Privacy, Berkeley, pp.197-215, CA, 2003. |
3 | D. Liu, P. Ning and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Transactions on Information and System Security, Vol.8, No.1, pp.41-77, 2005(2). DOI |
4 | S. Zhu, S. Setia and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," 10th ACM Conference (CCS '03), pp.62-72, Washington D.C., USA, 2003(10). |
5 | A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," in Wireless Networks, pp.521-534, Kluwer Academic Publishers, Netherlands, 2002. |
6 | Http://www.xbow.com/Support/Support_pdf_files/getting_started_guide.pdf |
7 | Y. Zhou and Y. Fang, "Scalable Link-Layer Key Agreement in Sensor Networks," Proc. of MILCOM '06, pp.1-6, Washington, D.C., USA, 2006. DOI |
8 | S. De Oliveira, H. C. Wong and J. M. Nogueira, "NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks," Proc. of ICCCN'07, pp.803-808, Honolulu, Hawaii, USA, 2007. DOI |
9 | M. Vella and A. Mahdy, "Survey of wireless sensor network security," Proc. of SACNAS '08, pp.128-134, Salt Lake, Utah, USA, 2008. |
10 | D. Raymond and S. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, Vol.7, No.1, pp.74-81, 2008. DOI ScienceOn |