Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network
![]() |
Kim, Eun-Kyung
(이화여자대학교 컴퓨터정보통신학과)
Seo, Jae-Won (이화여자대학교 컴퓨터정보통신학과) Chae, Ki-Joon (이화여자대학교 컴퓨터정보통신학과) Choi, Doo-Ho (한국전자통신연구원 RFID/USN보안안연구팀) Oh, Kyung-Hee (한국전자통신연구원 RFID/USN보안안연구팀) |
1 | ITU-T Recommendation Y.1541, "Network performance objectives for IP-based services," February, 2006 |
2 | 박승철, "광대역 접속망에서 SIP QoS 지원방안," 정보과학회논문지, 정보통신 제34권 제 1호, 2007년 2월 과학기술학회마을 |
3 | ETSI TISPAN NGN Document, ETSI TS 183 017: "Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control: DIAMETER protocol for session based policy set up information exchange between the Application Function (AF) and the Service Policy Decision Function (SPDF);Protocol specification", in WG 3 |
4 | 김신효, 강유성, 정병호, 정교일, “u-센서 네트워크 보안 기술 동향”, 전자통신동향분석, 제20권 제1호, pp. 93-99, 2005. 2 과학기술학회마을 DOI ScienceOn |
5 | 3GPP TS 29.208 V6.7.0 (Release 6), "End-to-end Quality of Service (QoS) signaling flow," June 2007 |
6 | JDiameter, "https://jdiameter.dev.java.net" |
7 | 이동규, 송성한, 김양중, 정일영, "NGN 기반의 엑세스 망에서 자원제어 시스템 구현," 대한전자공학회 하계종합학술대회 논문집 I, 제30권 제1호, pp.167-168, 2007년 7월 |
8 | ITU-T Draft Document, "Draft Recommendation Y.RACF (Y.2111) Release2 (Version 0.4.0)," Beijing, 10-21 September 2007 |
9 | TaeMan Han, TaeHyun Kwon, YoungWook Cha, SangHa Kim, "Management Information Model And High-Speed Resource Control Mechanism For Next Generation Network," CSN, 2007 |
10 | ITU-T Draft Document,"Draft Recommendation Y.2012 (formally Y.NGN-FRA)[Draft Version0.8]," Geneva, 17-28 July 2006 |
11 | Amit Manjhi, Suman Nath, Phillip B. Gibbons, “Tributaries and Deltas : efficient and robust aggregation in sensor network streams”, SIGMOD 2005, pp.287-298, Jun. 2005 DOI |
12 | Fei hu, Jason Tillett, Jim Ziobro, neeraj K. Sharma, “An Energy-efficient Approach to Securing Tree-zone-based Sensor Networks,” GLOBECOM 2003, vol 3, pp.1430-1434, Dec. 2003 DOI |
13 | J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000 |
14 | R. Blom “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT 84, LNCS 209, pp.335–338, Apr. 1985 |
15 | Seema Bandyopadhyay, Edward J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks”, INFOCOM 2003, Vol.3, pp.1713-1723, Mar. 2003 |
16 | Stefan Schmidt, Holger Krahn, Stefan Fischer, and Dietmar W¨atjen, “A Security Architecture for Mobile Wireless Sensor Networks,” European Workshop on Security in Ad-Hoc and Sensor Networks 2004, Aug. 2004 |
17 | W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” Conference on Computer and Communications Security 2003, pp.42-51, Oct. 2003 DOI |
18 | L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Conference on Computer and Communications Security 2002, pp.41-47, 2002 DOI |
19 | Mahdi Lotfinezhad, Ben Liang, “Energy efficient clustering in sensor networks with mobile agents”, Wireless Communications and Networking Conference 2005, Vol.3, pp.1872-1877, Mar. 2005 DOI |
20 | J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000 |
21 | Jamil Ibriq, imad Mahgoub, “Cluster-based routing in wireless sensor networks : issues and challenges”, SPECTS 2004, pp.759-766, Jul. 2004 |
22 | Ruay-shiung Chang, Chia-jou Kuoan, “An Energy efficient routing mechanism for wireless sensor networks”, International conference on Advanced Information Networking and Applications(AINA) 2006, Vol.2 pp.308-312, Apr. 2006 |
![]() |