메뉴 건너뛰기




Volumn 87, Issue 12, 2007, Pages 2882-2895

SecLEACH-On the security of clustered sensor networks

Author keywords

Hierarchical (cluster based) sensor networks; Secure data aggregation; Security

Indexed keywords

DATA REDUCTION; PROBLEM SOLVING; SECURITY OF DATA;

EID: 34547913472     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2007.05.016     Document Type: Article
Times cited : (97)

References (54)
  • 2
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • Pottie G.J., and Kaiser W.J. Wireless integrated network sensors. Comm. ACM 43 5 (2000) 51-58
    • (2000) Comm. ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier's AdHoc Networks J. 1(2-3): 293-315, 2003 (special issue on sensor network applications and protocols) Also appeared in 1st IEEE International Workshop on Sensor Network Protocols and Applications.
  • 4
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Comput. 35 10 (October 2002) 54-62
    • (2002) IEEE Comput. , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks, in: 9th ACM Conference on Computer and Communications Security (CCS'02), ACM New York, 2002, pp. 41-47.
  • 7
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy (S&P'03), May 2003, pp. 197-213.
  • 8
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: 10th ACM Conference on Computer and Communication Security, ACM Press, New York, 2003, pp. 62-72.
  • 9
    • 34547917139 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: 10th Annual Network and Distributed Systems Security Symposium (NDSS'03), 2003, pp. 263-276.
  • 10
    • 4544293215 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), ACM Press, New York, 2003, pp. 72-82.
  • 11
    • 1542286901 scopus 로고    scopus 로고
    • Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, in: 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA'03), ACM Press, New York, 2003, pp. 141-150.
  • 12
    • 84943553152 scopus 로고    scopus 로고
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach, in: 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, November 2003, pp. 326-335.
  • 14
    • 8344262333 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S.H.S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004.
  • 15
    • 14844335004 scopus 로고    scopus 로고
    • J. Hwang, Y. Kim, Revisiting random key pre-distribution schemes for wireless sensor networks, in: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, New York, 2004, pp. 43-52.
  • 16
    • 14844314204 scopus 로고    scopus 로고
    • D. Huang, M. Mehta, D. Medhi, L. Harn, Location-aware key management scheme for wireless sensor networks, in: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), ACM Press, New York, 2004, pp. 29-42.
  • 17
    • 34547896947 scopus 로고    scopus 로고
    • R. Kannan, L. Ray, A. Durresi, Efficient key pre-distribution schemes for sensor networks, in: 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS' 04), Heidelberg, Germany, August 2004.
  • 18
    • 35048867517 scopus 로고    scopus 로고
    • S.A. Çamtepe, B. Yener, Combinatorial design of key distribution mechanisms for wireless sensor networks. in: 9th European Symposium on Research Computer Security (ESORCS' 04), Lecture Notes in Computer Science, Sophia Antipolis, France, September 2004, pp. 293-308.
  • 19
    • 16644374371 scopus 로고    scopus 로고
    • D. Liu, P. Ning, R. Li, Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Security, 8 (1) (2005) 41-77, 2005. Also appeared in 10th ACM CCS '03.
  • 21
    • 25844435733 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, in: The 24th Conference of the IEEE Communications Society (INFOCOM'05), March 2005.
  • 22
    • 34547879585 scopus 로고    scopus 로고
    • R. Di Pietro, L.V. Mancini, A. Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, Wireless Networks 12(6) (2006). Also appeared in 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks 2004.
  • 24
    • 85034572933 scopus 로고    scopus 로고
    • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: IEEE Hawaii International Conference on System Sciences, January 2000, pp. 4-7.
  • 25
    • 4544285741 scopus 로고    scopus 로고
    • O. Younis, S. Fahmy, Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004, pp. 629-640.
  • 26
    • 34547923648 scopus 로고    scopus 로고
    • B. Schneier, Applied Cryptography, second ed., Wiley, New York, 1996.
  • 27
    • 0036738266 scopus 로고    scopus 로고
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, Wireless Networks 8 (5) (September 2002) 521-534, also appeared in MobiCom'01.
  • 28
    • 17544377081 scopus 로고    scopus 로고
    • J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister, System architecture directions for networked sensors, in: 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
  • 29
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, Tinysec: a link layer security architecture for wireless sensor networks, in: 2nd ACM SensSys, November 2004, pp. 162-175.
  • 30
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 31
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Capkun S., Buttyan L., and Hubaux J.P. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2 1 (January-March 2003) 17
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 17
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 32
    • 0035789229 scopus 로고    scopus 로고
    • J.-P. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in: 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM Press, New York, 2001, pp. 146-155.
  • 33
    • 1542317847 scopus 로고    scopus 로고
    • Biss: building secure routing out of an incomplete set of security associations
    • ACM Press, New York
    • Capkun S., and Hubaux J.-P. Biss: building secure routing out of an incomplete set of security associations. ACM Workshop on Wireless Security (WISE'03) (2003), ACM Press, New York 21-29
    • (2003) ACM Workshop on Wireless Security (WISE'03) , pp. 21-29
    • Capkun, S.1    Hubaux, J.-P.2
  • 34
    • 0034590150 scopus 로고    scopus 로고
    • L. Venkatraman. D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: IEEE Wireless Communications and Networking Conference, 2002, pp. 1268-1273.
  • 36
    • 0034546898 scopus 로고    scopus 로고
    • in: 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York pp. 275-283
    • Zhang Y., and Lee W. Intrusion detection in wireless ad-hoc networks (2000), in: 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York pp. 275-283
    • (2000) Intrusion detection in wireless ad-hoc networks
    • Zhang, Y.1    Lee, W.2
  • 37
    • 3543100577 scopus 로고    scopus 로고
    • F. Yea, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004.
  • 38
    • 85015402934 scopus 로고    scopus 로고
    • V. Miller, Uses of elliptic curves in cryptography, advances in cryptology, in: Crypto'85, Lecture Notes in Computer Science, vol. 218, Berlin, Springer, 1986, pp. 417-426.
  • 39
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Math. Comput. 48 (1987) 203-209
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 41
    • 20344381294 scopus 로고    scopus 로고
    • D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, in: 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'04), Santa Clara, California, October 2004.
  • 42
    • 33745834406 scopus 로고    scopus 로고
    • E.-O. Blaß, M. Zitterbart, Towards acceptable public-key encryption in sensor networks, in: The 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS, May 2005.
  • 43
    • 29844457287 scopus 로고    scopus 로고
    • W. Du, R. Wang, P. Ning, An efficient scheme for authenticating public keys in sensor networks, in: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), New York, NY, USA, ACM Press, New York, 2005, pp. 58-67.
  • 44
    • 0345755816 scopus 로고    scopus 로고
    • J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive Security for Multi-layer Ad-hoc Networks, Wiley New York, Wireless Commun. Mobile Comput. 2 (5) (2002) 533-547 (special issue).
  • 45
    • 1542317846 scopus 로고    scopus 로고
    • M. Bohge, W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, in: 2003 ACM Workshop on Wireless Security, 2003, pp. 79-87.
  • 46
    • 85177498148 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Mobile Computing and Networking, 2000, pp. 255-265.
  • 47
    • 3543056512 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: IEEE Symposium on Security and Privacy, 2004. pp. 259-271.
  • 48
    • 34547912820 scopus 로고    scopus 로고
    • B. Przydatek, D. Song, A. Perrig, SIA: secure information aggregation in sensor networks, in: ACM SenSys 2003, November 2003.
  • 49
    • 0041973497 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless sensor networks, in: Conference of the IEEE Communications Society (INFOCOM'03), 2003.
  • 50
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, R. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), April 2004.
  • 52
    • 0000153536 scopus 로고
    • Distance to nearest neighbor as a measure of spatial relationships in populations
    • Clark P.J., and Evans F.C. Distance to nearest neighbor as a measure of spatial relationships in populations. Ecology 35 4 (1954) 445-453
    • (1954) Ecology , vol.35 , Issue.4 , pp. 445-453
    • Clark, P.J.1    Evans, F.C.2
  • 53
    • 34547865311 scopus 로고    scopus 로고
    • K.P. Donnelly, Simulations to determine the variance and edge effect of total nearest neighbour distance, in: I. Hodder (Ed.) Simulation Studies in Archaeology, 1978.
  • 54
    • 24644489093 scopus 로고    scopus 로고
    • L.B. Oliveira, H.C. Wong, A.A.F. Loureiro, LHA-SP: Secure protocols for hierarchical wireless sensor networks, in: Ninth International Symposium on Integrated Network Management (IM'05), IFIP/IEEE, May 2005, Nice, France, pp. 31-44.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.