메뉴 건너뛰기




Volumn 30, Issue 1, 2006, Pages 153-165

A secure alternate path routing in sensor networks

Author keywords

Secure routing; Sensor network security

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; INFORMATION RETRIEVAL; INFORMATION SCIENCE; ROBUSTNESS (CONTROL SYSTEMS);

EID: 33751183522     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.08.006     Document Type: Article
Times cited : (42)

References (33)
  • 1
    • 17744386714 scopus 로고    scopus 로고
    • R. Anderson, H. Chan, A. Perrig, Key infection: smart trust for smart dust, IEEE International Conference on Network Protocols (ICNP 2004), 2004.
  • 2
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
  • 3
    • 84944414611 scopus 로고    scopus 로고
    • B. Deb, S. Bhatnagar, B. Nath, ReInForM: reliable information forwarding using multiple paths in sensor networks, IEEE International Conference on Local Computer Networks (LCN 2003), October 2003, pp. 406-415.
  • 4
    • 35248846963 scopus 로고    scopus 로고
    • J. Deng, R. Han, S. Mishra, A performance evaluation of intrusion-tolerant routing in wireless sensor networks, Second International Workshop on Information Processing in Sensor Networks (IPSN 03), April 2003, pp. 349-364.
  • 5
    • 33751166205 scopus 로고    scopus 로고
    • J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks, IEEE International Conference on Dependable Systems and Networks (DSN), 2004, pp. 594-603.
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, ACM Conference on Computer and Communication Security (CCS), November 2002, pp. 41-47.
  • 7
    • 33751174786 scopus 로고    scopus 로고
    • K. Fall, K. Varadhan (Eds.), NS notes and documentation, The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, July 1999. Available from: .
  • 8
    • 33751181698 scopus 로고    scopus 로고
    • D. Ganesan, R. Govindan, S. Shenker, D. Estrin, Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Mobile Computing and Communications Review (MC2R), vol. 1, 2002, pp. 11-25.
  • 9
    • 33751186735 scopus 로고    scopus 로고
    • C. Hartung, J. Balasalle, R. Han, Node compromise in sensor networks: the need for secure systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, January 2005.
  • 10
    • 84961572484 scopus 로고    scopus 로고
    • Y.-C. Hu, D. B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks, IEEE Workshop on Mobile Computing Systems and Applications, June 2002, pp. 3-13.
  • 11
    • 33751186944 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Efficient security mechanisms for routing protocols, NDSS 2003, February 2003, pp. 57-73.
  • 12
    • 0041973497 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless ad-hoc networks, IEEE Computer and Communications Societies (INFOCOM 2003), March 2003, pp. 1976-1986.
  • 13
    • 33751173461 scopus 로고    scopus 로고
    • D. Johnson, D.A. Maltz, J. Broch, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft), Mobile Ad-hoc Network (MANET) Working Group, IETF, October1999.
  • 14
    • 84942426861 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113-127.
  • 15
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004, pp. 162-175.
  • 16
    • 33751173023 scopus 로고    scopus 로고
    • S.-B. Lee, Y.-H. Choi, ARMS: An authenticated routing message in sensor networks, Secure Mobile Ad-hoc Networks and Sensors Workshop (MADNES'05), Lecture Notes in Computer Science, Springer, September 2005.
  • 17
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 52-61.
  • 18
    • 85000276942 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Multi-Level u-TESLA: a broadcast authentication system for distributed sensor networks, ACM Transactions in Embedded Computing Systems (TECS), vol. 3 (4), 2004, pp. 800-836.
  • 19
    • 85177502874 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
  • 20
    • 84920380941 scopus 로고    scopus 로고
    • R. Merkle, Protocols for public key cryptosystems, IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122-136.
  • 21
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, E. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, IEEE Conference on Information Processing in Sensor Networks (IPSN), April 2004, pp. 259-268.
  • 22
    • 27544460282 scopus 로고    scopus 로고
    • B. Parno, A. Perrig, V. Gligor, Distributed detection of node replication attacks in sensor networks, IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
  • 23
    • 85031307530 scopus 로고    scopus 로고
    • C.E. Perkins, P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, August 1994, pp. 234-244.
  • 24
    • 0033690336 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, IEEE Symposium on Security and Privacy, May 2000, pp. 56-73.
  • 25
    • 33751179239 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, D. Song, J.D. Tygar, Efficient and secure source authentication for multicast, Network and Distributed System Security Symposium, NDSS01, February 2001, pp. 35-46.
  • 26
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Special Issue on Wireless Sensor Networks
    • Perriig A., Stankovic J., and Wagner D. Security in wireless sensor networks. Communications of the ACM 47 6 (2004) 53-57 Special Issue on Wireless Sensor Networks
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perriig, A.1    Stankovic, J.2    Wagner, D.3
  • 27
    • 85177178924 scopus 로고    scopus 로고
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: Security Protocols for Sensor Networks, International Conference on Mobile Computing and Networking (MobiCom 2001), 2001, pp. 189-199.
  • 28
    • 33751164880 scopus 로고    scopus 로고
    • R. Rivest, The MD5 message-digest algorithm, RFC 1321, Internet Engineering Task Force, 1992.
  • 29
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks, wireless communications
    • Shi E., and Perrig A. Designing secure sensor networks, wireless communications. IEEE 11 6 (2004) 38-43
    • (2004) IEEE , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 30
    • 0036986435 scopus 로고    scopus 로고
    • J. Staddon, D. Balfanz, G. Durfee, Efficient tracing of failed nodes in sensor networks, ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), ACM Press, 2002, pp. 122-130.
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 32
    • 29844441128 scopus 로고    scopus 로고
    • Toward resilient security in wireless sensor networks
    • Yang H., Ye F., Yuan Y., Lu S., and Arbough W. Toward resilient security in wireless sensor networks. ACM MobiHoc'05 (2005) 34-45
    • (2005) ACM MobiHoc'05 , pp. 34-45
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4    Arbough, W.5
  • 33
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, ACM Conference on Computer and Communications Security (CCS'03), October 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.