메뉴 건너뛰기




Volumn 12, Issue 1, 2007, Pages 24-31

The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection

Author keywords

Critical Information Infrastructure Protection; Network Security; Wireless Sensor Networks

Indexed keywords

DISTRIBUTED PARAMETER CONTROL SYSTEMS; INFORMATION ANALYSIS; RELIABILITY; WIRELESS SENSOR NETWORKS;

EID: 34249727108     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.02.003     Document Type: Article
Times cited : (29)

References (43)
  • 1
    • 33845960072 scopus 로고    scopus 로고
    • Adar E, Wuchner A. Risk management for critical infrastructure protection challenges, best practices & tools. In: First intern. workshop on critical infrastructure protection; November 2005. p. 90-100.
  • 3
    • 34547404724 scopus 로고    scopus 로고
    • Alarifi A, Du W. Diversifying sensor nodes to improve resilience against node compromise. In: Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (SASN 2006), Alexandria, USA; October 2006.
  • 4
    • 34249692620 scopus 로고    scopus 로고
    • Alcaraz C, Roman R. Applying key infrastructures for sensor networks in CIP/CIIP scenarios. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
  • 5
    • 33745855808 scopus 로고    scopus 로고
    • Becher A, Benenson Z, Dornseif M. Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of the third international conference on security in pervasive computing (SPC 2006), York, UK; April 2006.
  • 6
    • 34249744773 scopus 로고    scopus 로고
    • Beckwith R, Teibel D, Bowen P. Report from the field: results from an agricultural wireless sensor network. In: Proceedings of the first IEEE workshop on embedded networked sensors (EmNetS-I 2004), Tampa, USA; November 2004.
  • 7
    • 66149139377 scopus 로고    scopus 로고
    • Bologna S, Di Costanzo G, Luiijf E, Setola R. An overview of R&D activities in Europe on critical information infrastructure protection (CIIP). In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
  • 8
    • 34249652533 scopus 로고    scopus 로고
    • Bopping D. CIIP in Australia. In: First CI2RCO critical information infrastructure protection conference, Rome; March 2006.
  • 9
  • 10
    • 34249673495 scopus 로고    scopus 로고
    • Commission of the European Communities. Communication from the Commission to the Council and the European parliament: critical infrastructure protection in the fight against Terrorism, COM (2004) 702 final, Brussels; 20 October 2004.
  • 11
    • 34249716882 scopus 로고    scopus 로고
    • Distributed intelligence, sensing and coordination in variable environments. CSIRO..
  • 12
    • 80052933495 scopus 로고    scopus 로고
    • D'Antonio S, Oliviero F, Setola R. High-speed intrusion detection in support of critical infrastructure protection. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
  • 13
    • 33845933166 scopus 로고    scopus 로고
    • Hammerli BM. CIIP task description and a proposal for a substitute of national C(I)IP policies. In: First international workshop on critical infrastructure protection; 2005. p. 51-61.
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Special Issue on sensor network applications and protocols p. 293-315
    • Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Special Issue on sensor network applications and protocols. Elsevier's Ad Hoc Networks Journal (September 2003) p. 293-315
    • (2003) Elsevier's Ad Hoc Networks Journal
    • Karlof, C.1    Wagner, D.2
  • 16
    • 26444574670 scopus 로고    scopus 로고
    • Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks. In: Second Intern. Conf. on Embedded Networked Sensor Systems; 2004. p. 162-75.
  • 17
    • 34249694798 scopus 로고    scopus 로고
    • Kenichi Soga. Underground M3, Smart infrastructure, .
  • 18
    • 34249713800 scopus 로고    scopus 로고
    • Liu A., Ning P. TinyECC: elliptic curve cryptography for sensor networks (Version 0.2), ; September 2006.
  • 19
    • 34249735994 scopus 로고    scopus 로고
    • Lopez J, Montenegro JA, Roman R. Securing critical information infrastructures. In: Proceedings of the second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU 2006), Lyon, France; June 2006.
  • 20
    • 34249677479 scopus 로고    scopus 로고
    • Manzo M, Roosta T, Sastry S. Time synchronization attacks in sensor networks. In: Proceedings of the third ACM workshop on security of ad hoc and sensor networks (SASN 2005), Alexandria, USA; November 2005.
  • 21
    • 33845447841 scopus 로고    scopus 로고
    • Martinez K, Padhy P, Elsaify A, Zou G, Riddoch A, Hart JK, Ong HLR. Deploying a sensor network in an extreme environment. In: Proceedings of sensor networks, ubiquitous and trustworthy computing (SUTC 2006), Taiwan; June 2006. p. 186-93.
  • 22
    • 34249734367 scopus 로고    scopus 로고
    • Minder D, Marrón PJ, Lachenmann A, Rothermel K. Experimental construction of a meeting model for smart office environments. In: Proceedings of the first workshop on real-world wireless sensor networks (REALWSN 2005), Stockholm, Sweden; June 2005.
  • 23
    • 34249704139 scopus 로고    scopus 로고
    • Moteiv Corporation, ; 2007.
  • 24
    • 19944369062 scopus 로고    scopus 로고
    • Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
    • Park T., and Shin K.G. Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing 4 3 (May-June 2005) 297-309
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.3 , pp. 297-309
    • Park, T.1    Shin, K.G.2
  • 25
    • 34249654693 scopus 로고    scopus 로고
    • Particle Computer GmbH. ; 2007.
  • 26
    • 47649126396 scopus 로고    scopus 로고
    • Ramanathan N, Balzano L, Estrin D, Hansen M, Harmon T, Jay J, Kaiser WJ, Sukhatme G. Designing wireless sensor networks as a shared resource for sustainable development. In: Proceedings of the international conference on information and communication technologies and development (ICTD 2006), Berkeley, USA; May 2006.
  • 27
    • 12344298391 scopus 로고    scopus 로고
    • Rinaldi SM. Modeling and simulating critical infrastructures and their interdependences. In: 37th Hawaiian International Conference on system Sciences; 2004.
  • 28
    • 20844461569 scopus 로고    scopus 로고
    • Security meter: a practical decision-tree model to quantify risk
    • Sahinoglu M. Security meter: a practical decision-tree model to quantify risk. IEEE Security & Privacy 3 3 (2005) 18-24
    • (2005) IEEE Security & Privacy , vol.3 , Issue.3 , pp. 18-24
    • Sahinoglu, M.1
  • 29
    • 38349028310 scopus 로고    scopus 로고
    • Sang Y, Shen H, Inoguchi Y, Tan Y, Xiong N. Secure data aggregation in wireless sensor networks: a survey. In: Proceedings of the seventh international conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), Taipei, Taiwan; December 2006.
  • 30
    • 34249678743 scopus 로고    scopus 로고
    • Scatterweb GmbH. ; 2007.
  • 31
    • 34249680357 scopus 로고    scopus 로고
    • Schmitz W. Modelling and simulation for analysis of critical infrastructures, In: First GI Workshop on CIP, within Annual Meeting Informatik; 2003.
  • 32
    • 34249746932 scopus 로고    scopus 로고
    • Intel Corporation
    • Sensor Nets/RFID (2006), Intel Corporation. http://www.intel.com/research/exploratory/wireless_sensors.htm
    • (2006) Sensor Nets/RFID
  • 33
    • 33744988588 scopus 로고    scopus 로고
    • Sharp C, Schaffert S, Woo A, Sastry N, Karlof C, Sastry S, Culler D. Design and implementation of a sensor network system for vehicle tracking and autonomous interception. In: Proceedings of the second European workshop on wireless sensor networks (EWSN 2005), Istanbul, Turkey; January 2005. p. 93-107.
  • 34
    • 34249726250 scopus 로고    scopus 로고
    • SMEPP. Secure middleware for embedded peer-to-peer systems (FP6-2005-IST-5), .
  • 35
    • 34249677992 scopus 로고    scopus 로고
    • Sun Microsystems Inc., ; 2007.
  • 36
    • 34249697138 scopus 로고    scopus 로고
    • The CodeBlue Project. Harvard University, ; 2006.
  • 37
    • 34249649746 scopus 로고    scopus 로고
    • University of Southern California. Networked aquatic microbial observing system (NAMOS), .
  • 38
    • 34249724606 scopus 로고    scopus 로고
    • U.S. Government, 2004. US National Plan for Research and Development in Support for CIP. April 8, 2005. [retrieved from: ].
  • 39
    • 84873800450 scopus 로고    scopus 로고
    • Verissimo P, Neves NF, Correia M. CRUTIAL: The blueprint of a reference critical information infrastructure architecture. In: Proceedings of the first international workshop on critical information infrastructures security (CRITIS 2006), Samos, Greece; August-September 2006.
  • 40
    • 34249674554 scopus 로고    scopus 로고
    • Wireless Measurement Systems. Crossbow Technology, Inc., ; 2007.
  • 41
    • 33645115901 scopus 로고    scopus 로고
    • Deploying a wireless sensor network on an active volcano
    • Special Issue on Data-Driven Applications in Sensor Networks
    • Werner-Allen G., Lorincz K., Ruiz M., Marcillo O., Johnson J., Lees J., and Welsh M. Deploying a wireless sensor network on an active volcano. Special Issue on Data-Driven Applications in Sensor Networks. IEEE Internet Computing (March/April 2006)
    • (2006) IEEE Internet Computing
    • Werner-Allen, G.1    Lorincz, K.2    Ruiz, M.3    Marcillo, O.4    Johnson, J.5    Lees, J.6    Welsh, M.7
  • 42
    • 33746791187 scopus 로고    scopus 로고
    • Wokoma I, Shum L, Sacks L, Marshall IW. A biologically-inspired clustering algorithm dependent on spatial data on sensor networks. In: Proceedings of the second annual European workshop on wireless sensor networks (EWSN 2005), Istanbul, Turkey; January-February 2005.
  • 43
    • 15944404585 scopus 로고    scopus 로고
    • Wolthusen S. Modeling critical infrastructure requirements. In: Fifth IEEE SMC Information Assurance Workshop, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.