메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-8

An application-driven perspective on wireless sensor network security

Author keywords

Application driven perspective; Security; Sensor networks

Indexed keywords

APPLICATION DRIVEN PERSPECTIVE; POTENTIAL ATTACKER'S MOTIVATION; SECURITY CONTEXT; SECURITY THREATS;

EID: 34547322775     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1163673.1163675     Document Type: Conference Paper
Times cited : (30)

References (35)
  • 4
    • 0034291601 scopus 로고    scopus 로고
    • GPS-less Low-Cost Outdoor Localization for Very Small Devices. IEEE Personal Communication
    • N. Bulusu, J. Heidemann, and D. Estrin. GPS-less Low-Cost Outdoor Localization for Very Small Devices. IEEE Personal Communication, 2000.
    • (2000)
    • Bulusu, N.1    Heidemann, J.2    Estrin, D.3
  • 7
    • 73349099259 scopus 로고    scopus 로고
    • Countermeasures against traffic analysis attacks in wireless sensor networks
    • Technical report, CU-CS-987-04
    • J. Deng, R. Han, and S. Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. Technical report, CU-CS-987-04, 2004.
    • (2004)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 12
    • 27644599432 scopus 로고    scopus 로고
    • ARRIVE: Algorithm for Robust Routing in Volatile Environments
    • Technical Report UCB//CSD-03-1233, University of California, at Berkeley
    • C. Karlof, Y. Li, and J. Polastre. ARRIVE: Algorithm for Robust Routing in Volatile Environments. Technical Report UCB//CSD-03-1233, University of California, at Berkeley, 2003.
    • (2003)
    • Karlof, C.1    Li, Y.2    Polastre, J.3
  • 13
    • 32144459886 scopus 로고    scopus 로고
    • TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
    • C. Karlof, N. Sastry, and D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In ACM SenSys, 2004.
    • (2004) ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 14
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • C. Karlof and D. Wagner. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier's AdHoc Networks Journal, 1(2-3), 2003.
    • (2003) Elsevier's AdHoc Networks Journal , vol.1 , Issue.2-3
    • Karlof, C.1    Wagner, D.2
  • 15
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
    • L. Lazos and R. Poovendran. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. In the ACM Workshop on Wireless Security, 2003.
    • (2003) the ACM Workshop on Wireless Security
    • Lazos, L.1    Poovendran, R.2
  • 16
    • 33144467903 scopus 로고    scopus 로고
    • D. Liu, P. Ning, and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In IPSN '05, April 2005.
    • D. Liu, P. Ning, and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In IPSN '05, April 2005.
  • 19
    • 20344381294 scopus 로고    scopus 로고
    • A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
    • D. J. Malan, M. Welsh, and M. Smith. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In IEEE SECON, 2004.
    • (2004) IEEE SECON
    • Malan, D.J.1    Welsh, M.2    Smith, M.3
  • 20
    • 34547285929 scopus 로고    scopus 로고
    • R. Nagpal. Organizing a Global Coordinate System from Local Information on an Amorphous Computer. Technical Report A.I. Memo 1666, MIT A.I. Laboratory, August 1999.
    • R. Nagpal. Organizing a Global Coordinate System from Local Information on an Amorphous Computer. Technical Report A.I. Memo 1666, MIT A.I. Laboratory, August 1999.
  • 21
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil Attack in Sensor Networks: Analysis and Defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In IPSN '04, 2004.
    • (2004) IPSN '04
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 22
    • 0041973656 scopus 로고    scopus 로고
    • Ad Hoc Positioning System (APS) Using AoA
    • D. Niculescu and B. Nath. Ad Hoc Positioning System (APS) Using AoA. In INFOCOM '03, 2003.
    • (2003) INFOCOM '03
    • Niculescu, D.1    Nath, B.2
  • 30
    • 0034775930 scopus 로고    scopus 로고
    • Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
    • July
    • A. Savvides, C. C. Han, and M. B. Srivastava. Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors. In MOBICOM '01, July 2001.
    • (2001) MOBICOM '01
    • Savvides, A.1    Han, C.C.2    Srivastava, M.B.3
  • 31
    • 14844300164 scopus 로고    scopus 로고
    • Resilient Aggregation in Sensor Networks
    • Oct
    • D. Wagner. Resilient Aggregation in Sensor Networks. SASN'04, Oct. 2004.
    • (2004) SASN'04
    • Wagner, D.1
  • 33
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor-Networks
    • Sept
    • A. Wood and J. Stankovic. Denial of Service in Sensor-Networks. IEEE Computer, pages 54-62, Sept. 2002.
    • (2002) IEEE Computer , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 35
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data In Sensor Networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data In Sensor Networks. In IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.