1 |
G. Gaubatz, J. P. Kaps and B. Sunar, 'Public Key Cryptography in Sensor Networks-Revisited,' 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), LNCS 3313, pp. 2-18, August 2004
|
2 |
D. J. Malan, M. Welsh and M. D. Smith, 'A Public- Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography,' 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), October 2004
DOI
|
3 |
J. Ding, K. Sivalingam and B. Li, 'Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks,' Int. Journal on Ad Hoc & Sensor Wireless Networks, March 2005
|
4 |
H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' 2003 IEEE Symposium on Security and Privacy, pp. 197-213, 2003
|
5 |
F. Ye, H. Luo, J. Cheng, S. Lu and L. Zhang, 'A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks,' ACM/IEEE Mobicom, 2002
DOI
|
6 |
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. 'Directed Diffusion for Wireless Sensor Networking,' ACM/IEEE Transactions on Networking, 11(1), pp. 2-16, February 2002
DOI
ScienceOn
|
7 |
W. Du, J. Deng, Y. S. Han and P. Varshney, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' 10th ACM Conference on Computer and Communications Security (CCS), October 2003
DOI
|
8 |
D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks,' 10th ACM Conference on Computer and Communications Security (CCS), pp. 52-61, October 2003
DOI
|
9 |
S. Schmidt, H. Krahn, S. Fischer and D. Watjen, 'A Security Architecture for Mobile Wireless Sensor Networks,' ESAS, LNCS 3313, pp. 166-177, 2005
DOI
|
10 |
S. Avancha, J. Undercoffer, A. Joshi and J. Pinkston, 'Secure sensor networks for perimeter protection,' Computer Networks: The Inter-national Journal of Computer and Telecommuni-cations Networking, Vol. 43, Issue 4, pp. 421 - 435, November 2003
DOI
ScienceOn
|
11 |
박성현, '제3판 희귀분석,' 민영사, 1998년 9월
|
12 |
X. Chen and J. Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Networks,' MASS 2005
DOI
|
13 |
M. Tubaishat, J. Yin, B. Panja and S. Madria, 'A Secure Hierarchical Model for Sensor Networ,' SIGMOD Record, Vol. 33, No.1, pp. 7-13, March 2004
DOI
ScienceOn
|
14 |
H. Chan and A. Perrig, 'PIKE: Peer Inter-mediaries for Key Establishment,' IEEE INFOCOM, March 2005
DOI
|
15 |
S. Schmidt, H. Krahn, S. Fischer and D. Watjen, 'A Security Architecture for Mobile Wireless Sensor Networks,' 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), LNCS 3313, August 2004
|
16 |
Y. T. Hou, Y. Shi and H. D. Sherali, 'Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement,' MobiHoc, pp. 67-77, 2004
DOI
|
17 |
임채훈, '유비쿼터스 센서 네트워크 보안,' 한국통신학회지, 정보통신 Vol. 22, no. 8, August 2005
과학기술학회마을
|
18 |
F. Hu and X. Cao, 'Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Desig,.' International Conference on Information Technology: Coding and Computing, pp. 528-533, 2005
DOI
|
19 |
J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Networks,' ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83-93, 2003
DOI
|
20 |
M. Bohge and W. Trappe, 'An Authentication Framework for Hierarchical Ad-hoc Sensor Networks,' ACM Workshop on Wireless Security (WiSe), 2003
DOI
|
21 |
C. Karlof, N. Sastry and D. Wagner, 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,' 2nd ACM Conference on Embedded Networked Sensor Systems, Nov.2004
DOI
|
22 |
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks Journal (WINE), September 2002
DOI
ScienceOn
|