Browse > Article

무선 센서 네트워크를 이용한 무인 경비 시스템에서의 정보보호 기술  

이성재 (순천향대학교 정보보호학과)
김대경 (순천향대학교 정보보호학과)
이재근 (순천향대학교 정보보호학과)
염흥열 (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Abrach, S.Bhatt, J.Charlson, H. Dui. Rose, A. Sheth, B. Shucker, J. Deng, R. Han, 'MANTIS: System Support for Multimodal Network of In- Situ Sensors', In Proc. of 2nd Workshop on Wireless Sensor Networks and Applications (WSNA' 03), San Diego, CA, Sep, 2003
2 http://www.citris.berkeley.edu/index.html
3 D. Harkins and D. Carrel. The internet key exchange(IKE). Request for Comments 2409, Information Sciences Institute, University of Southern California, November 1998
4 R. Gennaro and P. Rohatgi. 'How to sign digital streams. In Burt Kaliski, editor, Advances in Cryptology-Crypto '97, Pages 180-197, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Vol. 1294
5 A.Perrig, and J.T.D.S.R. Canetti, Briscoe. TESLA: Multicast source authentication transform. IRTF draft, draftirtf- smug-tesla-00.txt, November 2000
6 U.S National Institute of Standards and Technology (NIST). DES model of operation. Federal Information Processing Standards Publication 81(FIPS PUB 81)
7 R.L. Rivest.'The RC-5 Encryption algorithm. Proc. 1st Workshop on Fast Software Encryption, Pages 86-96,1995
8 Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270-299,1984
9 K. S. J. Pister, J, M Kahn, and B. E. Boser. Smart dust : Wireless networks of millimeter-scale sensor nodes, 1999
10 A. Perrig, R. Szewczyk, J.D.Tygar, Victorwen D. E. Culler : SPINS : 'Security Protocols for Sensor Networks, Wireless Networks' 8, 521.534, 2002
11 Steven Bellovin and Michael Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In First ACM Conference on Computer and Communications Security. CCS-1, Pages 244-250, 1993
12 B.j.Bonfils, P. Bonnet, 'Adaptive and Decentralized Operator Placement for In-Network Query Processing', IPSN'03, April, 2003, LNCS 2634
13 Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In 6th ACM Conference on Computer and Communications Security, November 1999
14 정보통신부, 'U-센서 네트워크 구축 기본계획' 2004.2.17
15 Diameter CMS Security Application, draft-i etf-aaa-diameter-cms-sec-04.txt, www.ietf.org/html.charters/aaa-charter. html
16 Donggang Liu, Peng Ning 'Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks' E-mail : dliu@unity.ncsu.edu
17 Mark Weiser. The Computer for the 21 Centry. Scientific American. Vol. 256. No.3. pp. 94-104. Sep. 1991
18 주학수, 권현조, 강달천, 윤재호, 박배효, 전길수, 이재일 : RFID/USN정보보호 위협
19 Adrian Perrig, Ran Canetti, Dawn Song and Doug Tygar. 'Efficient and secure source authentication for multicast. In Network and Distributed System security symposium, NDSS '01, February 2001
20 H. Han, A. Perrig, D. Song, 'Random Key Predistribution Schemes for Sensor Networks', Appears in IEEE Symposium on Security and Privacy 2003
21 조영섭, 조상래, 유인태, 진승헌, 정교일 : 유비 쿼터스 컴퓨팅과 보안 요구사항 분석, 정보보호학회지, 2004. 2