메뉴 건너뛰기




Volumn , Issue , 2004, Pages 162-175

TinySec: A link layer security architecture for wireless sensor networks

Author keywords

Link Layer Security; Sensor Network Security

Indexed keywords

DESIGN VULNERABILITIES; LINK LAYER SECURITY; SENSOR NETWORK SECURITY; BANDWIDTH OVERHEADS; CRYPTOGRAPHIC PRIMITIVES; DISTRIBUTED SENSOR NETWORKS; LESSONS LEARNED; LINK LAYER PROTOCOL; PACKET OVERHEAD; RADIO PLATFORMS; RESOURCE CONSTRAINT; RESOURCE REQUIREMENTS; SECURITY PROTOCOLS; SOFTWARE-BASED; SWEET SPOT; TINYSEC;

EID: 26444574670     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1201)

References (47)
  • 1
    • 84861263302 scopus 로고    scopus 로고
    • Crossbow technology inc. http://www.xbow.com.
  • 2
    • 84861263300 scopus 로고    scopus 로고
    • Moteiv. http://www.moteiv.com/.
  • 3
    • 84861263301 scopus 로고    scopus 로고
    • OpenSSL. http://www.openssl.org.
  • 4
    • 33746084746 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • November
    • Security architecture for the Internet Protocol. RFC 2401, November 1998.
    • (1998) RFC , vol.2401
  • 5
    • 84861271403 scopus 로고    scopus 로고
    • Smart buildings admit their faults
    • UC Berkeley, November
    • Smart buildings admit their faults. Lab Notes: Research from the College of Engineering, UC Berkeley, http://www.coe.berkeley.edu/labnotes/1101smartbuildings.html, November 2001.
    • (2001) Lab Notes: Research from the College of Engineering
  • 6
    • 84964559052 scopus 로고    scopus 로고
    • Wireless medium access control and physical layer specifications for low-rate wireless personal area networks
    • 802.15.4-2003, May ISBN 0-7381-3677-5
    • Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5.
    • (2003) IEEE Standard
  • 7
    • 35248861711 scopus 로고    scopus 로고
    • Instant ciphertext-only cryptanalysis of GSM encrypted communication
    • Advances in Cryptology -CRYPTO 2003
    • Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis of GSM encrypted communication. In Advances in Cryptology -CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 9
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • December
    • Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, December 2000.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 13
    • 0037766154 scopus 로고    scopus 로고
    • Security flaws in 802.11 data link protocols
    • May Special Issue on Wireless Security
    • Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. Security flaws in 802.11 data link protocols. Communications of the ACM, 46(5):35-39, May 2003. Special Issue on Wireless Security.
    • (2003) Communications of the ACM , vol.46 , Issue.5 , pp. 35-39
    • Cam-Winget, N.1    Housley, R.2    Wagner, D.3    Walker, J.4
  • 15
    • 67349176399 scopus 로고    scopus 로고
    • Automated cryptanalysis of XOR plaintext strings
    • April
    • E. Dawson and L. Nielsen. Automated cryptanalysis of XOR plaintext strings. Cryptologia, (2):165-181, April 1996.
    • (1996) Cryptologia , Issue.2 , pp. 165-181
    • Dawson, E.1    Nielsen, L.2
  • 18
    • 27644505653 scopus 로고    scopus 로고
    • Lightweight key management in wireless sensor networks by leveraging initial trust
    • SRI International, April
    • Bruno Dutertre, Steven Cheung, and Joshua Levy. Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04-02, SRI International, April 2004.
    • (2004) Technical Report , vol.SRI-SDL-04-02
    • Dutertre, B.1    Cheung, S.2    Levy, J.3
  • 24
    • 17144394279 scopus 로고    scopus 로고
    • The worldwide wardrive: The myths, the misconceptions, the truth, the future
    • August
    • Chris Hurley. The worldwide wardrive: The myths, the misconceptions, the truth, the future. In Defcon 11, August 2003.
    • (2003) Defcon 11
    • Hurley, C.1
  • 25
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth. in
    • Springer-Verlag, LNCS 2020
    • Markus Jakobsson and Susanne Wetzel. Security weaknesses in Bluetooth. In CT-RSA 2001, pages 176-191. Springer-Verlag, 2001. LNCS 2020.
    • (2001) CT-RSA 2001 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 26
    • 27644599432 scopus 로고    scopus 로고
    • ARRIVE: Algorithm for robust routing in volatile environments
    • University of California at Berkeley, May
    • Chris Karlof, Yaping Li, and Joe Polastre. ARRIVE: Algorithm for robust routing in volatile environments. Technical Report UCB/CSD-03-1233, University of California at Berkeley, May 2002.
    • (2002) Technical Report , vol.UCB-CSD-03-1233
    • Karlof, C.1    Li, Y.2    Polastre, J.3
  • 27
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • Advances in Cryptology - CRYPTO 2001, Springer-Verlag Heidelberg, January
    • Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science. Springer-Verlag Heidelberg, January 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139
    • Krawczyk, H.1
  • 37
    • 27644537050 scopus 로고    scopus 로고
    • personal communication
    • Peter Shipley, 2003. personal communication.
    • (2003)
    • Shipley, P.1
  • 40
    • 84947308909 scopus 로고
    • The landmark hierarchy: A new hierarchy for routing in very large networks
    • P.F. Tsuchiya. The landmark hierarchy: a new hierarchy for routing in very large networks. ACM Computer Communication Review, 18(4):35-42, 1988.
    • (1988) ACM Computer Communication Review , vol.18 , Issue.4 , pp. 35-42
    • Tsuchiya, P.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.