Browse > Article

유비쿼터스 센서 네트워크 보안  

Im, Chae-Hun (세종대학교 인터넷학과)
Publication Information
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R.Anderson, H.Chan and A. Perrig, Key infecition: Smart trust for smart dust, 12th IEEE International Conference on Network Protocols (ICNP), Oct. 2004
2 P.Ganessan, R.Venugopalan, P.Peddabachagari, A.Dean, F.Muller and M.Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, WSNA' 03, September 19, 2003, San Diego, California, USA
3 Y.W.Law, S.Dulman, S.Etalle and P. Havinga, Assessing security-critical energy-efficient sensor networks, 18th IFIP International Information Security Conference, May 2003
4 D.Liu and P.Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, NDSS' 03,2003
5 D.Malan, M.Welsh and M.D.Smith, A Public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, IEEE SECON2004
6 A.Mishra, K.Nadkarni, and A.Patcha, Intrusion detection in wireless ad hoc networks, IEEE Wireless Communications, February 2004, pp.48-60
7 A.Perrig, J.Stankovic and D. Wagner, Security in wireless sensor networks, Commun. Of ACM, 47(5),June 2004, pp.5357
8 B.Przydatek, D.Song and A.Perrig, SIA:secure information aggregation in sensor networks, SenSys' 03, Nov.2003
9 J.P.WaIters, Z.Liang, W.Shi and V.Chaudhary, Wireless sensor network security: a survey, http//www. cs. wayne.edu/>weisong/pa pers/walters05-wsn-securitysurvey.pdf
10 P-W. Yau and C.J.Mitchell, Reputation systems for routing security for mobile ad hoc networks, Sym.TIC' 03, Oct.2003
11 D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
12 P.Gorder, Sizing up smart dusts, Computing in Science & Engineering, 5(6), Nov.-Dec. 2003, pp.6-9   DOI   ScienceOn
13 J.Hill and D.E.CuiIer, Mica: a wireless platform for deeply embedded networks, IEEE Micro, Nov.-Dec. 2002, pp. 12-24
14 M.Tubaishat and S.Madria, Sensor networks: An overview, IEEE Potentials, April/May 2003, pp. 20-23
15 D.Wagner, Resilient aggregation in sensor networks, Proc, of 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN'04), pp. 78-87, ACM Press, 2004
16 Hill, M.Horton, R.Kling and L.Krishnamurthy, The platforms enabling wireless sensor networks, Communications of the ACM, Vol.47, No.6,June 2004, pp.41-46   DOI   ScienceOn
17 A.Perrig, R.Canetti, D.Song and D.Tygar, Efficient and secure authentication for multicast, NDSS' 01, Feb.2001
18 S.Marti, T.J.Giuli, K.Lai and M.Baker, Mitigating routing behavior in mobile ad hoc networks, Annual Internation Conference on Mobile Computing and Networking, Aug.2000
19 R.Watro, D.Kong, S.Cuti, C.Gardiner, C.Lynn and P.Kruus, TinyPK : Securing networks with public key technology, SASN '04, pp. 59-64, ACM Press, 2004
20 H.Chan, A.Perrig, and D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Research in Security and Privacy. 2003, pp. 197-213
21 D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
22 C.Hartung, J.Balasalle and R.Han, Node compromise in sensor networks: The need for secure systems, Technical Report CUCS-988-04, Dept. of Computer Science, University of Colorado at Boulder, 2004
23 J.Polastre, R.Szewczyk and D.Culler, Telos: enabling ultra-low power wireless research, Application notes 002, www.moteiv.com
24 W.Du, J.Deng, Y.Han and P.K.Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, CCS' 03, October 27-30, 2003, Washington, DC.
25 I.F.Akyiliz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A survey on sensor networks, IEEE Communications Magazine, August 2002, pp. 102-114
26 H.Chan and A.Perrig, Security and privacy in sensor networks, IEEE Computer, Octber 2003, pp.103-105
27 L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, ACM CCS 2002, Nov.2002
28 C.Karlof and D.Wagner, Secure routing in wireless sensor networks: Attacks and contemeasures, Ad Hoc Networks, vol. 1, issues 2-3 (Special Issue on Sensor Network Applications and Protocols), Elsevier, Sep, 2003, pp.293-315
29 Y.W.Law and J.M.Doumen and P.H.Hartel, Benchmarking block ciphers for wireless sensor networks (Extended abstract), 1st IEEE Int, Conf, on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, Florida, Oct. 2004
30 G.Gaubatz, J.Kaps and B.Sunar, Public key cryptography in sensor networks-revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004
31 C.Karlof, N.Sastary and D.Wagner, Tinysec: A link layer security architecture for wireless sensor networks, ACM SenSys 2004, Nov. 3-5,2004
32 A.Perrig, R.Szewczyk, J.D. Tygar, V.Wen and D.Culler, SPINS: Security protocols for sensor networks, Wireless Networks 8, Kluwer Academy Publishers, 2002, pp.521534   DOI   ScienceOn
33 A. D. Wooel and J.A.Stankovic, Denial of service in sensor networks, IEEE Computer, October 2002, pp. 54-62
34 F.Hu, J.Ziobro, J.Tillett and N.Sharma, Secure wireless sensor networks: Problems and solutions,J. of SCI, to appear, 2004
35 S.Zhu, S.Setia, and S.J.Ajodia, LEAP: Efficient security mechanisms for large-scale distributed sensor networks, ACM CCS 2003, pp. 62-72.
36 S.Basagni, K.Herrin, D.Bruschi and E.Rosti, Secure pebblenets, MobiHOC 2001, pp. 156-163