메뉴 건너뛰기




Volumn 17, Issue 12, 2006, Pages 2577-2588

Search on security in sensor networks

Author keywords

Authentication; Energy aware; Key management; Security; Sensor network

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; FAULT TOLERANT COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SENSORS;

EID: 33846161991     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos172577     Document Type: Article
Times cited : (15)

References (33)
  • 1
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • Chong CY, Kumar SP. Sensor networks: Evolution, opportunities, and challenges. Proc. of the IEEE, 2003, 91(8): 1247-1256.
    • (2003) Proc. of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.Y.1    Kumar, S.P.2
  • 3
    • 0142060789 scopus 로고    scopus 로고
    • Wireless sensor networks
    • Chinese source
    • Ren FY, Huang HN, Lin C. Wireless sensor networks. Journal of Software, 2003, 14(7): 1282-1291 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1282.htm.
    • (2003) Journal of Software , vol.14 , Issue.7 , pp. 1282-1291
    • Ren, F.Y.1    Huang, H.N.2    Lin, C.3
  • 5
    • 33846154012 scopus 로고    scopus 로고
    • The official website of the ZigBee alliances
    • The official website of the ZigBee alliances. http://www.zigbee.org.
  • 6
    • 3142684688 scopus 로고    scopus 로고
    • Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks
    • Doumit S, Agrawal DP. Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks. MILCOM 2003-IEEE Military Communications Conf., 2003, 22(1): 609-614.
    • (2003) MILCOM 2003-IEEE Military Communications Conf. , vol.22 , Issue.1 , pp. 609-614
    • Doumit, S.1    Agrawal, D.P.2
  • 12
    • 31344462815 scopus 로고    scopus 로고
    • Block ciphers and stream ciphers: The state of the art
    • Biryukov A. Block ciphers and stream ciphers: The state of the art. http://www.esat.kuleuven.ac.be/-abiryuko/lecturenotes.pdf.
    • Biryukov, A.1
  • 13
    • 12444271857 scopus 로고    scopus 로고
    • Energy efficient data encryption algorithms
    • Chen X, Woo T. Energy efficient data encryption algorithms. 2002. http://www.vlsi.uwaterloo.ca/thwoo/ece750report.pdf.
    • (2002)
    • Chen, X.1    Woo, T.2
  • 14
    • 35548943337 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography
    • Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography. http://airclic.eecs.harvard.edu/publications/secon04.pdf.
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 15
    • 84934298201 scopus 로고    scopus 로고
    • Technology MICA2: Wireless measurement system
    • Crossbow I. Technology MICA2: Wireless measurement system. http://www.xbow.com/ Products/Product_pdf_files/Wireless_pdf/6020-0042-04_A_MICA2.pdf.
    • Crossbow, I.1
  • 17
    • 33846137573 scopus 로고    scopus 로고
    • Advanced research on distributed sensor network security
    • NAI Laboratory
    • NAI Laboratory. Advanced research on distributed sensor network security. http://www.networkassociates.com/ us/_tier0/nailabs/_media/documents/dsns.pdf.
  • 19
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A light-weight security protocol for wireless sensor networks
    • Park TJ, Arbor A, Shim IB. LiSP: A light-weight security protocol for wireless sensor networks. ACM Trans. on Embedded Computing Systems, 2004, 3(3): 634-660.
    • (2004) ACM Trans. on Embedded Computing Systems , vol.3 , Issue.3 , pp. 634-660
    • Park, T.J.1    Arbor, A.2    Shim, I.B.3
  • 24
    • 56349114567 scopus 로고    scopus 로고
    • Location-Based pairwise key establishments for static sensor networks
    • Liu DG, Ning P. Location-Based pairwise key establishments for static sensor networks. http://discovery.csc.ncsu.edu/-pning/pubs/sasn03.pdf.
    • Liu, D.G.1    Ning, P.2
  • 26
    • 33846147588 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. http://www.cse.psu.edu/-wezhang/papers/paper-infocom05.pdf.
    • Zhang, W.1    Cao, G.2
  • 29
    • 33846133142 scopus 로고    scopus 로고
    • Energy-Efficient security protocol for wireless sensor networks
    • Cam H, Ozdemir S, Muthuavinashiappan D, Nair P. Energy-Efficient security protocol for wireless sensor networks. http://www.eas.asu.edu/-hasancam/ publications/security_sensor-2003.pdf.
    • Cam, H.1    Ozdemir, S.2    Muthuavinashiappan, D.3    Nair, P.4
  • 30
    • 30344445246 scopus 로고    scopus 로고
    • Enhancing base station security in wireless sensor networks
    • Deng J, Han R, Mishra S. Enhancing base station security in wireless sensor networks. http://www.cs.colorado.edu/department/ publications/reports/docs/CU-CS-951-03.pdf.
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood AD, Stankovic JA. Denial of service in sensor networks. IEEE Computer, 2002, 35(10): 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.