메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 1043-1048

Security in Wireless Sensor Networks: Issues and challenges

Author keywords

Attack; Challenge; Holistic; Security; Sensor

Indexed keywords

MILITARY APPLICATIONS; SENSOR DATA FUSION; TELECOMMUNICATION; TELECOMMUNICATION NETWORKS;

EID: 33750319005     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icact.2006.206151     Document Type: Conference Paper
Times cited : (382)

References (43)
  • 1
    • 11144302585 scopus 로고    scopus 로고
    • Wireless sensor networks
    • June
    • Culler, D. E and Hong, W., "Wireless Sensor Networks", Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
    • (2004) Communication of the ACM , vol.47 , Issue.6 , pp. 30-33
    • Culler, D.E.1    Hong, W.2
  • 4
    • 84881272457 scopus 로고    scopus 로고
    • A framework for providing E-services to the rural areas using wireless ad hoc and sensor networks
    • to appear in
    • Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., "A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks", to appear in IEEE ICNEWS 2006.
    • IEEE ICNEWS 2006
    • Pathan, A.-S.K.1    Islam, H.K.2    Sayeed, S.A.3    Ahmed, F.4    Hong, C.S.5
  • 6
  • 9
    • 0004083621 scopus 로고    scopus 로고
    • Master's Thesis, Electrical Engineering and Computer Science Department, UC Berkeley
    • Hollar, S, "COTS Dust", Master's Thesis, Electrical Engineering and Computer Science Department, UC Berkeley, 2000.
    • (2000) COTS Dust
    • Hollar, S.1
  • 11
    • 85055811894 scopus 로고
    • A cautionary note on image downgrading in computer security applications
    • San Antonio, December
    • Kurak, C and McHugh, J, "A Cautionary Note on Image Downgrading in Computer Security Applications", Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, 1992, pp. 153-159.
    • (1992) Proceedings of the 8th Computer Security Applications Conference , pp. 153-159
    • Kurak, C.1    McHugh, J.2
  • 15
    • 0842332423 scopus 로고    scopus 로고
    • Channel synthesized modulation employing singular vector for secured access on physical layer
    • 1-5 December
    • Orihashi, M., Nakagawa, Y., Murakami, Y., and Kobayashi, K., "Channel synthesized modulation employing singular vector for secured access on physical layer", IEEE GLOBECOM 2003, Volume 3, 1-5 December, 2003, pp. 1226-1230.
    • (2003) IEEE GLOBECOM 2003 , vol.3 , pp. 1226-1230
    • Orihashi, M.1    Nakagawa, Y.2    Murakami, Y.3    Kobayashi, K.4
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov.-Deo.
    • Zhou, L. and Haas, Z. J., "Securing ad hoc networks", IEEE Network, Volume 13, Issue 6, Nov.-Deo. 1999, pp. 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 17
    • 0041629620 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks a motivational approach
    • Strulo, B., Farr, J., and Smith, A., "Securing Mobile Ad hoc Networks A Motivational Approach", BT Technology Journal, Volume 21, Issue 3, 2003, pp. 81 - 89.
    • (2003) BT Technology Journal , vol.21 , Issue.3 , pp. 81-89
    • Strulo, B.1    Farr, J.2    Smith, A.3
  • 18
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • February
    • Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, Volume 11, Issue 1, February 2004, pp. 38-47.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 19
    • 15844426139 scopus 로고    scopus 로고
    • An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting
    • Karachi, 31 July
    • Pathan, A-S. K., Alam, M., Monowar, M., and Rabbi, F., "An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting", Proc. IEEE E-Tech, Karachi, 31 July, 2004, pp. 97-100.
    • (2004) Proc. IEEE E-Tech , pp. 97-100
    • Pathan, A.-S.K.1    Alam, M.2    Monowar, M.3    Rabbi, F.4
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • Wood, A. D. and Stankovic, J. A., "Denial of Service in Sensor Networks", Computer, Volume 35, Issue 10, Oct. 2002 pp. 54 - 62.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 33
    • 17144429277 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • April
    • Ye, F., Luo, H., Lu, S, and Zhang, L, "Statistical en-route filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Volume 23, Issue 4, April 2005, pp. 839 - 850.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.4 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 40
    • 84926294459 scopus 로고    scopus 로고
    • Routing security in sensor network: Hello flood attack and defense
    • 2-4 January, Dhaka
    • Hamid, M. A., Rashid, M-O., and Hong, C. S., "Routing Security in Sensor Network: Hello Flood Attack and Defense", to appear in IEEE ICNEWS 2006, 2-4 January, Dhaka.
    • IEEE ICNEWS 2006
    • Hamid, M.A.1    Rashid, M.-O.2    Hong, C.S.3
  • 41
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California, May 11-14
    • Chan, H, Perrig, A., and Song, D., "Random key predistribution schemes for sensor networks", In IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 42
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • 18-22 November
    • Eschenauer, L. and Gligor, V. D., "A key-management scheme for distributed sensor networks", Proc. ACM CCS'02, 18-22 November 2002, pp. 41-47.
    • (2002) Proc. ACM CCS'02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 43
    • 33750932934 scopus 로고    scopus 로고
    • Using REWARD to detect team black-hole attacks in wireless sensor networks
    • 20-21 June, Stockholm, Sweden
    • Karakehayov, Z., "Using REWARD to detect team black-hole attacks in wireless sensor networks", in Workshop on Real-World Wireless Sensor Networks (REALWSN'05), 20-21 June, 2005, Stockholm, Sweden.
    • (2005) Workshop on Real-World Wireless Sensor Networks (REALWSN'05)
    • Karakehayov, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.