메뉴 건너뛰기




Volumn 28, Issue 8, 2007, Pages 113-122

Survey of wireless sensor network security techniques

Author keywords

DoS attack; Intrusion detection; Key management; Secure routing; Sensor networks

Indexed keywords

DOS ATTACK; KEY MANAGEMENT; SECURE ROUTING;

EID: 34648813419     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (33)

References (58)
  • 1
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • PERRIG A, et al. Security in wireless sensor networks [J]. Communications of the ACM, 2004, 47(6): 53-57.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1
  • 2
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • FEI H, NEERAJ K. Security considerations in ad hoc sensor networks [J]. Ad hoc Networks, 2005, 1(3): 69-89.
    • (2005) Ad hoc Networks , vol.1 , Issue.3 , pp. 69-89
    • Fei, H.1    Neeraj, K.2
  • 3
    • 34047195742 scopus 로고    scopus 로고
    • Cross-layer design for the security of wireless sensor networks intelligent control and automation
    • XIAO M B, et al. Cross-layer design for the security of wireless sensor networks intelligent control and automation [A]. WCICA 2006. The Sixth World Congress [C]. 2006.104-108.
    • (2006) WCICA 2006. The Sixth World Congress , pp. 104-108
    • Xiao, M.B.1
  • 4
    • 34648839013 scopus 로고    scopus 로고
    • On communication security in wireless Ad-hoc sensor network eleventh IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprises
    • Pittsburgh, Pennsylvania
    • SLIJEPCEVIC S, et al. On communication security in wireless Ad-hoc sensor network eleventh IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises [A] (WETICE'02) [C]. Pittsburgh, Pennsylvania, 2002. 10-12.
    • (2002) WETICE'02 , pp. 10-12
    • Slijepcevic, S.1
  • 13
    • 34648859668 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • Santa Clara, California
    • DAVID J M, et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [A]. First IEEE International Conference on Sensor and Ad hoc Communications and Networks [C]. Santa Clara, California, 2004.58-67.
    • (2004) First IEEE International Conference on Sensor and Ad hoc Communications and Networks , pp. 58-67
    • David, J.M.1
  • 17
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • WANG H, et al. Elliptic curve cryptography-based access control in sensor networks[J]. Int J Security and Networks, 2006, 1(3): 127-137.
    • (2006) Int J Security and Networks , vol.1 , Issue.3 , pp. 127-137
    • Wang, H.1
  • 18
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • PERRIG A, el al. SPINS: security protocols for sensor networks [J]. Wireless Networks Journal (WINE), 2002, 8(5): 521-534.
    • (2002) Wireless Networks Journal (WINE) , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 20
    • 33745178053 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Hong Kong
    • DU W, et al. A key management scheme for wireless sensor networks using deployment knowledge [A]. IEEE INFOCOM'04 [C]. Hong Kong, 2004.7-11.
    • (2004) IEEE INFOCOM'04 , pp. 7-11
    • Du, W.1
  • 21
    • 34648855330 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for relatively static sensor networks
    • VA, USA
    • LIU D, et al. Location-based pairwise key establishments for relatively static sensor networks [A]. ACM Workshop on Security of Ad hoc and Sensor Networks [C]. VA, USA, 2003.61-77.
    • (2003) ACM Workshop on Security of Ad hoc and Sensor Networks , pp. 61-77
    • Liu, D.1
  • 23
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington
    • LIU D, et al. Establishing pairwise keys in distributed sensor networks [A]. ACM Conference on Computer and Communications Security [C]. Washington, 2003.52-61.
    • (2003) ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1
  • 24
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California
    • CHAN H, et al. Random key predistribution schemes for sensor networks [A]. Proceedings of IEEE Symposium on Security and Privacy [C]. Berkeley, California, 2003.197-213.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1
  • 25
    • 23244467182 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • DU W, et al. A pairwise key predistribution scheme for wireless sensor networks[J]. The ACM Transactions on Information and System Security, 2005.1-10.
    • (2005) The ACM Transactions on Information and System Security , pp. 1-10
    • Du, W.1
  • 26
    • 33646918277 scopus 로고    scopus 로고
    • Dynamic key management in sensor networks
    • ELTOWEISSY M, et al. Dynamic key management in sensor networks[J]. Communications Magazine, IEEE, 44(4), 2006: 122-130.
    • (2006) Communications Magazine, IEEE , vol.44 , Issue.4 , pp. 122-130
    • Eltoweissy, M.1
  • 27
    • 33845540890 scopus 로고    scopus 로고
    • New key management scheme of wireless sensor networks based on key relation table
    • HUANG H P, WANG R C, SUN L J, et al. New key management scheme of wireless sensor networks based on key relation table [J]. Journal on Communications, 2006, 27(10): 13-18.
    • (2006) Journal on Communications , vol.27 , Issue.10 , pp. 13-18
    • Huang, H.P.1    Wang, R.C.2    Sun, L.J.3
  • 28
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • LIU D, et al. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks [A]. Proceedings of the 10th Annual Network and Distributed System Security Symposium [C]. 2003.263-276.
    • (2003) Proceedings of the 10th Annual Network and Distributed System Security Symposium , pp. 263-276
    • Liu, D.1
  • 30
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • Oakland, California
    • ZHU S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [A]. Proc IEEE Symposium on Security and Privacy [C]. Oakland, California, 2004.259-271.
    • (2004) Proc IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1
  • 31
    • 34247270218 scopus 로고    scopus 로고
    • Design of secure dynamic clustering algorithm using SNEP and μTESLA in Sensor network
    • JANG K W, et al. Design of secure dynamic clustering algorithm using SNEP and μTESLA in Sensor network [A]. Hybrid information Technology, 2006. international Conference [C]. 2006.97-102.
    • (2006) Hybrid information Technology, 2006. international Conference , pp. 97-102
    • Jang, K.W.1
  • 32
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level μTESLA: A broadcast authentication system for distributed sensor networks
    • LIU D, NING P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3(4): 800-836.
    • (2004) ACM Transactions on Embedded Computing Systems (TECS) , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 34
    • 34249307318 scopus 로고    scopus 로고
    • MMμ TESLA: Broadcast authentication protocil for multiple-based-statkm
    • SHEN Y L, PEI Q, MA J F. MMμ TESLA: broadcast authentication protocil for multiple-based-statkm [J]. Chinese Journal of Computers, 2007, 30(4): 539-546.
    • (2007) Chinese Journal of Computers , vol.30 , Issue.4 , pp. 539-546
    • Shen, Y.L.1    Pei, Q.2    Ma, J.F.3
  • 35
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • KARLOF C, et al. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad hoc Networks, 2003, (1): 293-315.
    • (2003) Ad hoc Networks , Issue.1 , pp. 293-315
    • Karlof, C.1
  • 39
    • 33746375987 scopus 로고    scopus 로고
    • SPREAD: A hybrid multipara scheme for secure and reliable data collection in wireless sensor networks
    • LOU W J, et al. SPREAD: a hybrid multipara scheme for secure and reliable data collection in wireless sensor networks [J]. Vehicular Technology, IEEE Transactions, 2006, 55(4): 1320-1330.
    • (2006) Vehicular Technology, IEEE Transactions , vol.55 , Issue.4 , pp. 1320-1330
    • Lou, W.J.1
  • 40
    • 0013043106 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor networks
    • GANESAN D, et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks [J]. Mobile, Computing and Communication Review, 2001, 5(4): 10-24.
    • (2001) Mobile, Computing and Communication Review , vol.5 , Issue.4 , pp. 10-24
    • Ganesan, D.1
  • 41
    • 84944414611 scopus 로고    scopus 로고
    • ReInForM: Reliable information forwarding using multiple paths in sensor networks
    • Los Alamitos
    • DEB B, et al. ReInForM: reliable information forwarding using multiple paths in sensor networks [A]. Proc 28th Annual IEEE Conf on Local Computer Networks (LCN) [C]. Los Alamitos, 2003.406-415.
    • (2003) Proc 28th Annual IEEE Conf on Local Computer Networks (LCN) , pp. 406-415
    • Deb, B.1
  • 42
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • ZHANG Y C, et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks [J]. Selected Areas in Communications, IEEE Journal, 2006, 24(2): 247-260.
    • (2006) Selected Areas in Communications, IEEE Journal , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.C.1
  • 43
    • 25844521520 scopus 로고    scopus 로고
    • Localized fault-tolerant event boundary detection in sensor networks
    • DING M, et al. Localized fault-tolerant event boundary detection in sensor networks [A]. IEEE INFOCOM [C]. 2005.902-913.
    • (2005) IEEE INFOCOM , pp. 902-913
    • Ding, M.1
  • 46
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • WOOD A D, et al. Denial of service in sensor networks [J]. IEEE Computer, 2002, 35(10): 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1
  • 47
    • 27544432072 scopus 로고    scopus 로고
    • Detection of denial-of-message attacks on sensor network broadcasts
    • Oakland
    • MCCUNE J, et al. Detection of denial-of-message attacks on sensor network broadcasts [A]. Proc of the IEEE Symposium on Security and Privacy [C]. Oakland, 2005.64-78.
    • (2005) Proc of the IEEE Symposium on Security and Privacy , pp. 64-78
    • Mccune, J.1
  • 48
    • 33745969132 scopus 로고    scopus 로고
    • Defending against path-based DoS attacks in wireless sensor networks
    • Alexandria, Virginia
    • DENG J, et al. Defending against path-based DoS attacks in wireless sensor networks [A]. Proceedings of the 10th ACM Conference on Computer and Communications [C]. Alexandria, Virginia, 2005. 89-96.
    • (2005) Proceedings of the 10th ACM Conference on Computer and Communications , pp. 89-96
    • Deng, J.1
  • 50
    • 33750897362 scopus 로고    scopus 로고
    • An architecture for flexible access to sensor networks
    • Cologne
    • DUNKELS A, et al. An architecture for flexible access to sensor networks [A]. DIN'05 [C]. Cologne, 2005. 48-52.
    • (2005) DIN'05 , pp. 48-52
    • Dunkels, A.1
  • 51
    • 33746862074 scopus 로고    scopus 로고
    • An algorithmic framework for robust access control in wireless sensor networks
    • Istanbul
    • BENENSON Z, et al. An algorithmic framework for robust access control in wireless sensor networks [A]. 2nd European Workshop on Wireless Sensor Networks (EWSN) [C]. Istanbul, 2005. 158-165.
    • (2005) 2nd European Workshop on Wireless Sensor Networks (EWSN) , pp. 158-165
    • Benenson, Z.1
  • 52
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Illinois
    • ZHANG W, et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks [A]. Proc IEEE Symposium on Security and Privacy [C]. Illinois, 2005.378-389.
    • (2005) Proc IEEE Symposium on Security and Privacy , pp. 378-389
    • Zhang, W.1
  • 54
    • 33746507111 scopus 로고    scopus 로고
    • E-μTESLA: An efficient broadcast authentication protocol for wireless sensor network
    • WANG L M, MA J F, et al, E-μTESLA: an efficient broadcast authentication protocol for wireless sensor network [J]. Journal of Computational Information Systems, 2005, 1(3): 433-438.
    • (2005) Journal of Computational Information Systems , vol.1 , Issue.3 , pp. 433-438
    • Wang, L.M.1    Ma, J.F.2
  • 56
    • 27944456428 scopus 로고    scopus 로고
    • Survey on wireless sensors network
    • MA Z C, SUN Y N, MEI T. Survey on wireless sensors network [J]. Journal on Communications, 2004, 25(4): 114-124.
    • (2004) Journal on Communications , vol.25 , Issue.4 , pp. 114-124
    • Ma, Z.C.1    Sun, Y.N.2    Mei, T.3
  • 57
    • 33750598206 scopus 로고    scopus 로고
    • Domain-based key management for wireless sensor networks
    • LIU Z H, MA J F, HUANG Q P. Domain-based key management for wireless sensor networks [J]. Chinese Journal of Computers, 2006, 29(9): 1608-1616.
    • (2006) Chinese Journal of Computers , vol.29 , Issue.9 , pp. 1608-1616
    • Liu, Z.H.1    Ma, J.F.2    Huang, Q.P.3
  • 58
    • 33750213386 scopus 로고    scopus 로고
    • Degree of fault-tolerance and intrusion-tolerance for topologies of wireless sensor networks
    • WANG L M, MA J F, WANG C. Degree of fault-tolerance and intrusion-tolerance for topologies of wireless sensor networks[J]. Acta Electronica Sinica, 2006, 34(8): 1446-1451.
    • (2006) Acta Electronica Sinica , vol.34 , Issue.8 , pp. 1446-1451
    • Wang, L.M.1    Ma, J.F.2    Wang, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.