메뉴 건너뛰기




Volumn , Issue , 2006, Pages

LEDS: Providing location-aware end-to-end data security in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA FILTERING; DENIAL OF SERVICE (DOS) ATTACKS; MULTIFUNCTIONAL KEY MANAGEMENT FRAMEWORK; REPORT DISRUPTION ATTACKS;

EID: 36248933437     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2006.303     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 1
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs Tech. Report #00-010
    • D. Carman, P. Kruus, B. Matt, "Constraints and approaches for distributed sensor network security," NAI Labs Tech. Report #00-010, 2000
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 2
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, Oct. 2002.
    • (2002) IEEE Computer
    • Wood, A.1    Stankovic, J.2
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Ad Hoc Networks, 1(2), 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2
    • Karlof, C.1    Wagner, D.2
  • 5
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," In Proc. of the 9th ACM CCS, Washington, 2002
    • (2002) Proc. of the 9th ACM CCS
    • Eschenauer, L.1    Gligor, V.2
  • 7
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Oct
    • H. Chan, A. Perrig, "Security and privacy in sensor networks," IEEE Computer, pp. 103-105, Oct 2003
    • (2003) IEEE Computer , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 8
    • 28444433009 scopus 로고    scopus 로고
    • Random Key Predistribution Schemes for Sensor Networks
    • H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," In Proc. of IEEE S&P, 2003
    • (2003) Proc. of IEEE S&P
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 3042822764 scopus 로고    scopus 로고
    • Establishing Pairwise Keys in Distributed Sensor Networks
    • Washington, Oct
    • D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," In Proc. of the 10th ACM CCS, Washington, Oct., 2003
    • (2003) Proc. of the 10th ACM CCS
    • Liu, D.1    Ning, P.2
  • 10
    • 3042783638 scopus 로고    scopus 로고
    • A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
    • Washington, Oct
    • W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," In Proc. of the 10th ACM CCS, Washington, Oct., 2003.
    • (2003) Proc. of the 10th ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 11
    • 8344262333 scopus 로고    scopus 로고
    • A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
    • Hongkong
    • W. Du, J. Deng, Y. Han, S. Chen and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," IEEE INFOCOM04, Hongkong, 2004.
    • (2004) IEEE INFOCOM04
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 12
    • 84943553152 scopus 로고    scopus 로고
    • Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach
    • Atlanta, Nov
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach," In Proc. of ICNP03, Atlanta, Nov., 2003.
    • (2003) Proc. of ICNP03
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 14
    • 58049185983 scopus 로고    scopus 로고
    • An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
    • Oakland, CA, May
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," IEEE S&P, Oakland, CA, May 2004.
    • (2004) IEEE S&P
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 15
    • 3543100577 scopus 로고    scopus 로고
    • Statiscal Enroute Filtering of Injected False Data in Sensor Networks
    • Mar
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statiscal Enroute Filtering of Injected False Data in Sensor Networks," IEEE Infocom, Mar. 2004.
    • (2004) IEEE Infocom
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 17
    • 39049140255 scopus 로고    scopus 로고
    • Location based security mechanisms in wireless sensor networks
    • to appear in
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location based security mechanisms in wireless sensor networks," to appear in IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks.
    • IEEE JSAC
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 18
    • 39049118419 scopus 로고    scopus 로고
    • TinyOS Operation System
    • "TinyOS Operation System," http://millennium.berkeley.edu.
  • 19
    • 41449098086 scopus 로고    scopus 로고
    • Exploring Message Authentication in Sensor Networks
    • Springer-Verlag, Aug
    • Harald Vogt, "Exploring Message Authentication in Sensor Networks'," Proceedings of ESAS 2004, Springer-Verlag, Aug. 2004.
    • (2004) Proceedings of ESAS
    • Vogt, H.1
  • 21
    • 8344222870 scopus 로고    scopus 로고
    • TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks
    • X. Cheng, A. Thaeler, G. Xue, D. Chen, "TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks," IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Cheng, X.1    Thaeler, A.2    Xue, G.3    Chen, D.4
  • 22
    • 11244273945 scopus 로고    scopus 로고
    • Localization for Mobile Sensor Networks
    • L. Hu, D. Evans, "Localization for Mobile Sensor Networks," In Proc. of ACM MOBICOM, 2004.
    • (2004) Proc. of ACM MOBICOM
    • Hu, L.1    Evans, D.2
  • 23
    • 39049157386 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • to appear in
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," to appear in IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications.
    • IEEE JSAC
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 24
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov
    • A. Shamir, How to Share a Secret, Communications of the ACM, 22(11):612-613, Nov 1979
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 14044255819 scopus 로고    scopus 로고
    • A Forwarding Scheme for Reliable and Energy-efficient Data Delivery in Cluster-based Sensor Networks
    • Feb
    • J. Jung, T. Park and C. Kim, "A Forwarding Scheme for Reliable and Energy-efficient Data Delivery in Cluster-based Sensor Networks," IEEE Communication Letters, Vol.9, No.2: 112-114, Feb. 2005.
    • (2005) IEEE Communication Letters , vol.9 , Issue.2 , pp. 112-114
    • Jung, J.1    Park, T.2    Kim, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.