메뉴 건너뛰기




Volumn 3934 LNCS, Issue , 2006, Pages 104-118

Tampering with motes: Real-world physical attacks on wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COST EFFECTIVENESS; MOBILE COMPUTING; NETWORK PROTOCOLS; SECURITY OF DATA; SENSORS;

EID: 33745855808     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734666_9     Document Type: Conference Paper
Times cited : (169)

References (33)
  • 3
    • 33745846472 scopus 로고    scopus 로고
    • AT45DB041B datasheet
    • Atmel Corp. AT45DB041B datasheet. Atmel document no. 3443, available at http://www.atmel.com/dyn/resources/prod_documents/doc3443.pdf.
    • Atmel Document No. 3443 , vol.3443
  • 4
    • 33745852818 scopus 로고    scopus 로고
    • ATmega128 datasheet
    • Atmel Corp. ATmega128 datasheet. Atmel document no. 2467, available at http://www.atme1.com/dyn/resources/prod_documents/doc2467.pdf.
    • Atmel Document No. 2467 , vol.2467
  • 5
  • 6
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • May
    • Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-213, May 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 7
    • 77955040714 scopus 로고    scopus 로고
    • Cliipcon AS. CC1000 datasheet. Available at http://www.chipcon.com/files/ CC1000_Data_Sheet_2_3. pdf.
    • CC1000 Datasheet
  • 8
    • 77954770221 scopus 로고    scopus 로고
    • Chipcon AS. CC2420 datasheet. Available at http://www.chipcon.com/files/CC2420_Data_Sheet_1_2.pdf.
    • CC2420 Datasheet
  • 9
    • 84876090772 scopus 로고    scopus 로고
    • Crossbow, Inc. MICA2 data sheet. Available at http://www.xbow.com/Products/ Product_pdf_files/Wireless_pdf/MICA2_Datasheet. pdf.
    • MICA2 Data Sheet
  • 10
    • 66549119394 scopus 로고    scopus 로고
    • Crossbow, Inc. MPR, MIB user's manual. Available at http://www.xbow.com/ Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf.
    • MPR, MIB User's Manual
  • 17
    • 33745813577 scopus 로고    scopus 로고
    • Microchip Technology. 24AA64/24LC64 datasheet. Available at http://ww1.microchip.com/downloads/en/DeviceDoc/21189K.pdf.
    • 24AA64/24LC64 Datasheet
  • 18
    • 33745837483 scopus 로고    scopus 로고
    • RF Monolithics. TR1001 datasheet. Available at http://www.rfm.com/products/data/tr1001.pdf.
    • TR1001 Datasheet
  • 19
    • 84901201715 scopus 로고    scopus 로고
    • moteiv Corp. Telos revision B datasheet. Available at http://www.moteiv.com/products/docs/telos-revb-datasheet.pdf.
    • Telos Revision B Datasheet
  • 20
    • 44049105799 scopus 로고    scopus 로고
    • moteiv Corp. Tmote Sky datasheet. Available at http://www.moteiv.com/products/docs/tmote-sky-datasheet.pdf.
    • Tmote Sky Datasheet
  • 21
    • 33745855913 scopus 로고    scopus 로고
    • http://mspgcc.sourceforge.net/.
  • 23
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Adrian Perrig, John Stankovic, and David Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 24
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • December
    • Elaine Shi and Adrian Perrig. Designing secure sensor networks. IEEE Wireless Communications, 11(6), December 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6
    • Shi, E.1    Perrig, A.2
  • 25
    • 27244445173 scopus 로고    scopus 로고
    • Semi-invasive attacks - A new approach to hardware security analysis
    • University of Cambridge, Computer Laboratory, April. Technical Report UCAM-CL-TR-630
    • Sergei P. Skorobogatov. Semi-invasive attacks - a new approach to hardware security analysis. Technical report, University of Cambridge, Computer Laboratory, April 2005. Technical Report UCAM-CL-TR-630.
    • (2005) Technical Report
    • Skorobogatov, S.P.1
  • 27
    • 33745865575 scopus 로고    scopus 로고
    • STMicroelectronics. M25P80 datasheet. Available at http://www.st.com/stonline/products/literature/ds/8495.pdf.
    • M25P80 Datasheet
  • 28
    • 33745850145 scopus 로고    scopus 로고
    • Features of the MSP430 bootstrap loader (rev. B)
    • Texas Instruments. Features of the MSP430 bootstrap loader (rev. B). TI Application note SLAA089B, available at http://www-s.ti.com/sc/psheets/slaa089b/slaa089b.pdf.
    • TI Application Note , vol.SLAA089B
  • 29
    • 33745827804 scopus 로고    scopus 로고
    • Texas Instruments. MSP430 F149 datasheet. Available at http://www-s.ti.com/sc/ds/msp430f149.pdf.
    • MSP430 F149 Datasheet
  • 30
    • 33745829093 scopus 로고    scopus 로고
    • Texas Instruments. MSP430 F1611 datasheet. Available at http://www-s.ti.com/sc/ds/msp430f1611.pdf.
    • MSP430 F1611 Datasheet
  • 31
    • 33745844082 scopus 로고    scopus 로고
    • MSP430x1xx family: User's guide
    • Texas Instruments. MSP430x1xx family: User's guide. TI Application note SLAU049E, available at http://www-s.ti.com/sc/psheets/slau049e/slau049e.pdf.
    • TI Application Note , vol.SLAU049E
  • 33
    • 80053424324 scopus 로고    scopus 로고
    • Intrusion detection and failure recovery in sensor nodes
    • LNCS, Heidelberg, Germany, September. Springer-Verlag
    • Harald Vogt, Matthias Ringwald, and Mario Strasser. Intrusion detection and failure recovery in sensor nodes. In Tagungsband INFORMATIK 2005, Workshop Proceedings, LNCS, Heidelberg, Germany, September 2005. Springer-Verlag.
    • (2005) Tagungsband INFORMATIK 2005, Workshop Proceedings
    • Vogt, H.1    Ringwald, M.2    Strasser, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.