메뉴 건너뛰기




Volumn 8, Issue 1, 2008, Pages 1-24

Security in wireless sensor networks

Author keywords

Protocols; Security; Sensor networks

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; DATA TRANSFER; INTRUSION DETECTION; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 38149062124     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.422     Document Type: Article
Times cited : (84)

References (33)
  • 1
    • 38149113363 scopus 로고    scopus 로고
    • Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
    • National Research Council, National Academy Press: Washington, DC
    • National Research Council. Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers. 1 st (edn). National Academy Press: Washington, DC, 2001.
    • (2001) 1 st (edn)
  • 7
    • 3142515935 scopus 로고    scopus 로고
    • Security for sensor networks
    • Technical report, University of Maryland Baltimore County, Center for Architectures for Data-Driven Information Processing
    • Undercoffer J, Avancha S, Joshi A, Pinkston J. Security for sensor networks. Technical report, University of Maryland Baltimore County, Center for Architectures for Data-Driven Information Processing, 2002.
    • (2002)
    • Undercoffer, J.1    Avancha, S.2    Joshi, A.3    Pinkston, J.4
  • 8
    • 30344445246 scopus 로고    scopus 로고
    • Enhancing base station security in wireless sensor networks
    • 951-03, University of Colorado, Boulder
    • Deng J, Han R, Mishra S. Enhancing base station security in wireless sensor networks. Technical Report CU-CS 951-03, University of Colorado, Boulder, 2002.
    • (2002) Technical Report CU-CS
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 11
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • Technical Report 00-010, NAI Labs
    • Carman DW, Kruus PS, Matt BJ. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, 2000.
    • (2000)
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 12
    • 0003408437 scopus 로고    scopus 로고
    • Smart dust: Wireless networks of millimeter-scale sensor networks
    • Technical report, UC Berkeley
    • Pister KSJ, Kahn JM, Boser BE. Smart dust: wireless networks of millimeter-scale sensor networks. Technical report, UC Berkeley, 1999.
    • (1999)
    • Pister, K.S.J.1    Kahn, J.M.2    Boser, B.E.3
  • 17
    • 77949837968 scopus 로고    scopus 로고
    • Multi-level μtesla: A broadcast authentication system for distributed sensor networks
    • Technical Report TR-2003-08, North Carolina State University
    • Liu D, Ning P. Multi-level μtesla: a broadcast authentication system for distributed sensor networks. Technical Report TR-2003-08, North Carolina State University, 2003.
    • (2003)
    • Liu, D.1    Ning, P.2
  • 21
    • 38149009460 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensor networks
    • To appear
    • Roberto Di Pietro LVM, Jajodia S. Providing secrecy in key management protocols for large wireless sensor networks. Journal of Adhoc Networks, To appear.
    • Journal of Adhoc Networks
    • Roberto Di Pietro, L.V.M.1    Jajodia, S.2
  • 27
    • 38149081126 scopus 로고    scopus 로고
    • Challenge: Secure routing protocols, http://research.microsoft. com/projects/SWSecInstitute/five-minute/Perrig5.ppt
    • June, University of Washington, Microsoft Research, and Carnegie Mellon University Summer Institute
    • Perrig A. Challenge: secure routing protocols, http://research.microsoft. com/projects/SWSecInstitute/five-minute/Perrig5.ppt, June 2003. Presentation given at Software Security: University of Washington, Microsoft Research, and Carnegie Mellon University Summer Institute.
    • (2003) Presentation given at Software Security
    • Perrig, A.1
  • 28
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood AD, Stankovic JA. Denial of service in sensor networks. IEEE Computer 2002; 35(10): 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 29
    • 38149002794 scopus 로고    scopus 로고
    • License free ethernet radio modems-The only wireless ethernet modem designed for industrial environments
    • April
    • Mhoon D. License free ethernet radio modems-The only wireless ethernet modem designed for industrial environments. Industrial Computing Magazine, April 1999.
    • (1999) Industrial Computing Magazine
    • Mhoon, D.1
  • 30
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 32
    • 27544440245 scopus 로고    scopus 로고
    • INSENS: Secure and intrusion tolerant routing for wireless sensor networks
    • 939-02, University of Colorado, Boulder
    • Deng J, Han R, Mishra S. INSENS: secure and intrusion tolerant routing for wireless sensor networks. Technical Report CU-CS 939-02, University of Colorado, Boulder, 2002.
    • (2002) Technical Report CU-CS
    • Deng, J.1    Han, R.2    Mishra, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.