메뉴 건너뛰기




Volumn 3, Issue 1, 2005, Pages 69-89

Security considerations in ad hoc sensor networks

Author keywords

Ad hoc networks; Security; Sensor networks

Indexed keywords

ALGORITHMS; ENERGY RESOURCES; INFORMATION DISSEMINATION; MICROELECTROMECHANICAL DEVICES; QUALITY OF SERVICE; ROUTERS; SECURITY OF DATA; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 10644250089     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2003.09.009     Document Type: Article
Times cited : (101)

References (67)
  • 2
    • 10644296110 scopus 로고    scopus 로고
    • Communications security architecture for army sensor networks
    • 30 September
    • D. Balenson et al., Communications security architecture for army sensor networks, NAI Labs T.R. #00-016, 30 September 2000.
    • (2000) NAI Labs T.R. #00-016 , vol.16
    • Balenson, D.1
  • 3
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • 1 June
    • D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor network security, NAI Labs T.R. #00-010, 1 June 2000.
    • (2000) NAI Labs T.R. #00-010 , vol.10
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 7
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan, P. Ginzboorg, Key agreement in ad hoc networks, Comp. Commun. 23 (2000) 1627-1637.
    • (2000) Comp. Commun. , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou, Z.J. Haas, Securing ad hoc networks, IEEE Network 13 (6) (1999) 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 9
    • 1842643245 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, IEEE ICNP, 2001.
    • (2001) IEEE ICNP
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 10
    • 0003902871 scopus 로고    scopus 로고
    • Addison-Wesley, Reading, MA
    • C. Perkins, Ad Hoc Networks, Addison-Wesley, Reading, MA, 2000.
    • (2000) Ad Hoc Networks
    • Perkins, C.1
  • 11
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A.D. Wood, J.A. Stankovic, Denial of service in sensor networks, IEEE Comp. 35 (10) (2002) 54-62.
    • (2002) IEEE Comp. , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 12
    • 10644292226 scopus 로고    scopus 로고
    • BluetoothTM security white paper
    • Bluetooth SIG Security Expert Group, April
    • C. Gehrmann, BluetoothTM Security White Paper, White paper, Bluetooth SIG Security Expert Group, April 2002.
    • (2002) White Paper
    • Gehrmann, C.1
  • 13
    • 1542267055 scopus 로고    scopus 로고
    • Assessing security-critical energy-efficient sensor networks
    • Department of Computer Science, University of Twente, July
    • Y.W. Law, S. Dulman, S. Etalle, P. Havinga, Assessing security-critical energy-efficient sensor networks, Department of Computer Science, University of Twente, Technical Report TR-CTIT-02-18, July 2002.
    • (2002) Technical Report , vol.TR-CTIT-02-18
    • Law, Y.W.1    Dulman, S.2    Etalle, S.3    Havinga, P.4
  • 15
    • 10644287069 scopus 로고    scopus 로고
    • Networking Laboratory, Helsinki University of Technology
    • Z. Yan, Security in ad hoc networks, Networking Laboratory, Helsinki University of Technology. Available from 〈http://citeseer.nj.nec.com/536945.html〉.
    • Security in Ad Hoc Networks
    • Yan, Z.1
  • 16
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attacks and selfishness in mobile ad hoc networks
    • January
    • P. Michiardi, R. Molva, Prevention of denial of service attacks and selfishness in mobile ad hoc networks, Research Report No RR-02-063, January 2002.
    • (2002) Research Report No RR-02-063 , vol.RR-02-063
    • Michiardi, P.1    Molva, R.2
  • 19
    • 10644289075 scopus 로고    scopus 로고
    • Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi, R. Molva, Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security Conference, 2002.
    • (2002) Communications and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 20
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attacks and selfishness in mobile ad hoc networks
    • Institut Eurécom, France
    • P. Michiardi, R. Molva, Prevention of denial of service attacks and selfishness in mobile ad hoc networks, Research Report RR-02-063, Institut Eurécom, France, 2002.
    • (2002) Research Report , vol.RR-02-063
    • Michiardi, P.1    Molva, R.2
  • 23
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
    • Department of Communication Systems, Swiss Federal Institute of Technology
    • L. Buttyáan, J.-P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
    • (2001) Technical Report , vol.DSC-2001-001
    • Buttyáan, L.1    Hubaux, J.-P.2
  • 26
    • 0035009294 scopus 로고    scopus 로고
    • Distributed topology control for power efficient operation in multihop wireless ad hoc networks
    • R. Wattenhofer, L. Li, P. Bahl, Y.M. Wang, Distributed topology control for power efficient operation in multihop wireless ad hoc networks, in: Proceedings of IEEE Infocom, 2001.
    • (2001) Proceedings of IEEE Infocom
    • Wattenhofer, R.1    Li, L.2    Bahl, P.3    Wang, Y.M.4
  • 27
    • 0032667849 scopus 로고    scopus 로고
    • Determining the optimal configuration for the zone routing protocol
    • Special issue on Wireless Ad Hoc Networks
    • M. Pearlman, Z. Haas, Determining the optimal configuration for the zone routing protocol, IEEE J. Select. Area. Commun., Special issue on Wireless Ad Hoc Networks 17 (8) (1999) 1395-1414.
    • (1999) IEEE J. Select. Area. Commun. , vol.17 , Issue.8 , pp. 1395-1414
    • Pearlman, M.1    Haas, Z.2
  • 29
    • 0021198082 scopus 로고
    • The design and simulation of a mobile radio network with distributed control
    • D.J. Baker, A. Ephremides, J.A. Flynn, The design and simulation of a mobile radio network with distributed control, IEEE J. Select. Area. Commun. SAC-2 (1) (1984) 226-237.
    • (1984) IEEE J. Select. Area. Commun. , vol.SAC-2 , Issue.1 , pp. 226-237
    • Baker, D.J.1    Ephremides, A.2    Flynn, J.A.3
  • 30
    • 0024701852 scopus 로고
    • A trade-off between space and efficiency for routing tables
    • July
    • D. Peleg, E. Upfal, A trade-off between space and efficiency for routing tables, J. ACM 36 (3) (1989) 510-530, July.
    • (1989) J. ACM , vol.36 , Issue.3 , pp. 510-530
    • Peleg, D.1    Upfal, E.2
  • 32
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • UCLA Computer Science Department
    • H. Luo, S. Lu, Ubiquitous and robust authentication services for ad hoc wireless networks, Technical Report 200030, UCLA Computer Science Department, 2000.
    • (2000) Technical Report 200030
    • Luo, H.1    Lu, S.2
  • 36
    • 10644278482 scopus 로고    scopus 로고
    • EYES project
    • University of Twente, The Netherlands
    • EYES project, Security in wireless sensor networks, University of Twente, The Netherlands. Available from 〈http://wwwes.cs.utwente.nl/24cqet/adhoc.html〉.
    • Security in Wireless Sensor Networks
  • 37
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, USA, November
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, CCS'02, Washington, DC, USA, November 2002.
    • (2002) CCS'02
    • Eschenauer, L.1    Gligor, V.D.2
  • 38
    • 4043173834 scopus 로고    scopus 로고
    • A taxonomy for routing protocols in mobile ad hoc networks
    • Swedish Institute of Computer Science, October
    • L. Feeney, A taxonomy for routing protocols in mobile ad hoc networks, Technical Report T99/07, Swedish Institute of Computer Science, October 1999.
    • (1999) Technical Report , vol.T99-07
    • Feeney, L.1
  • 39
    • 10644253282 scopus 로고    scopus 로고
    • Ad hoc ondemand distance vector routing
    • University of California, Santa Barbara, Ad Hoc OnDemand Distance Vector Routing. Home page. Available from 〈http://moment.cs.ucsb.edu/AODV/aodv.html〉.
    • Home Page
  • 40
    • 10644254146 scopus 로고    scopus 로고
    • Monarch project: Mobile networking architectures
    • Rice University, Rice University Monarch Project: Mobile Networking Architectures. Home page. Available from 〈http://www.monarch.cs.rice.edu〉.
    • Home Page
  • 44
    • 0027693935 scopus 로고
    • Diversity coding for selfhealing and fault tolerant communication networks
    • E. Ayanoglu, I. Chih-Lin, R. Gitlin, J. Mazo, Diversity coding for selfhealing and fault tolerant communication networks, IEEE Trans. Commun. 41 (11) (1993) 1677-1688.
    • (1993) IEEE Trans. Commun. , vol.41 , Issue.11 , pp. 1677-1688
    • Ayanoglu, E.1    Chih-Lin, I.2    Gitlin, R.3    Mazo, J.4
  • 46
    • 0004118152 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Department of Computer Science, Rice University
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, Technical Report TR01-383, Department of Computer Science, Rice University, 2001.
    • (2001) Technical Report , vol.TR01-383
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 47
    • 10644232749 scopus 로고    scopus 로고
    • A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks
    • Network Associates Laboratories, September
    • B. Matt, A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks, Technical Report 02-034, Network Associates Laboratories, September 2002.
    • (2002) Technical Report , vol.2 , Issue.34
    • Matt, B.1
  • 52
    • 0035009259 scopus 로고    scopus 로고
    • A clustering scheme for hierarchical control in multi-hop wireless networks
    • S. Banerjee, S. Khuller, A clustering scheme for hierarchical control in multi-hop wireless networks, IEEE Infocom 2001.
    • (2001) IEEE Infocom
    • Banerjee, S.1    Khuller, S.2
  • 54
    • 85035363269 scopus 로고    scopus 로고
    • Adaptive protocols for information dissemination in wireless sensor networks
    • Seattle, WA
    • W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, in: Proceedings of the ACM MobiCom'99, Seattle, WA, 1999, pp. 174-185.
    • (1999) Proceedings of the ACM MobiCom'99 , pp. 174-185
    • Heinzelman, W.R.1    Kulik, J.2    Balakrishnan, H.3
  • 55
    • 0034291065 scopus 로고    scopus 로고
    • Protocols for self-organization of a wireless sensor network
    • K. Sohrabi, J. Gao, V. Ailawadhi, G.J. Pottie, Protocols for self-organization of a wireless sensor network, IEEE Person. Commun. 7 (5) (2000) 16-27.
    • (2000) IEEE Person. Commun. , vol.7 , Issue.5 , pp. 16-27
    • Sohrabi, K.1    Gao, J.2    Ailawadhi, V.3    Pottie, G.J.4
  • 56
    • 0003048077 scopus 로고
    • The S/KEY one-time password system
    • N.M. Haller, The S/KEY one-time password system, in: ISOC, 1994.
    • (1994) ISOC
    • Haller, N.M.1
  • 57
    • 4544290017 scopus 로고    scopus 로고
    • Secure selective exclusion in ad-hoc wireless network
    • M.A. Ghonaimy, T. Mahmoud, E.-H. Heba, K. Asian (Eds.), Kluwer Academic Publishers, Boston
    • R. Pietro, L.V. Mancini, S. Jajodia, Secure selective exclusion in ad-hoc wireless network, in: M.A. Ghonaimy, T. Mahmoud, E.-H. Heba, K. Asian (Eds.), Security in Infomation Society: Visions and Perspectives, Kluwer Academic Publishers, Boston, 2002, pp. 423-434.
    • (2002) Security in Infomation Society: Visions and Perspectives , pp. 423-434
    • Pietro, R.1    Mancini, L.V.2    Jajodia, S.3
  • 59
    • 10644231488 scopus 로고    scopus 로고
    • NAI Lab. Available from 〈http://www.nai.com/nai_labs/-asp_set/crypto/crypt_senseit.asp〉.
  • 63
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21 (2) (1978) 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 67
    • 3042667172 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Department of Computer Science, Rice University, June
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
    • (2002) Technical Report , vol.TR01-384
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.