메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Supporting secure communication and data collection in mobile sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; OPERATIONS RESEARCH; STATIC ANALYSIS;

EID: 39049087772     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2006.261     Document Type: Conference Paper
Times cited : (36)

References (37)
  • 1
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad hoc wireless networks
    • D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in ad hoc wireless networks. In NDSS, 2002.
    • (2002) NDSS
    • Balfanz, D.1    Smetters, D.2    Stewart, P.3    Wong, H.4
  • 2
    • 3042778324 scopus 로고    scopus 로고
    • Stochastic properties of the random waypoint mobility model
    • C. Bettstetter, H. Hartenstein, and X. P. Costa. Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5):555-567, 2004.
    • (2004) Wireless Networks , vol.10 , Issue.5 , pp. 555-567
    • Bettstetter, C.1    Hartenstein, H.2    Costa, X.P.3
  • 3
  • 4
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In INFOCOM, 2005.
    • (2005) INFOCOM
    • Chan, H.1    Perrig, A.2
  • 6
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
    • (2004) INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 7
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • W Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 8
    • 39049106180 scopus 로고    scopus 로고
    • Erdos and Renyi. On random graphs. In I. Publ. Math. Debrecen, 1959.
    • Erdos and Renyi. On random graphs. In I. Publ. Math. Debrecen, 1959.
  • 9
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenaer and V.D.Gligor. A key-management scheme for distributed sensor networks. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Eschenaer, L.1    Gligor, V.D.2
  • 10
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 12
    • 14844314204 scopus 로고    scopus 로고
    • Location-aware key manageent scheme for wireless sensor networks
    • D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key manageent scheme for wireless sensor networks. In ACM Workshop SASN, 2004.
    • (2004) ACM Workshop SASN
    • Huang, D.1    Mehta, M.2    Medhi, D.3    Harn, L.4
  • 13
    • 14844335004 scopus 로고    scopus 로고
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • J. Hwang and Y. Kim. Revisiting random key pre-distribution schemes for wireless sensor networks. In ACM Workshop SASN, 2004.
    • (2004) ACM Workshop SASN
    • Hwang, J.1    Kim, Y.2
  • 15
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In MobiCom, 2000.
    • (2000) MobiCom
    • Karp, B.1    Kung, H.T.2
  • 16
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In ICNP, 2001.
    • (2001) ICNP
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 17
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2
  • 18
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments of static sensor networks
    • D. Liu and P. Ning. Location-based pairwise key establishments of static sensor networks. In ACM Workshop SASN, 2003.
    • (2003) ACM Workshop SASN
    • Liu, D.1    Ning, P.2
  • 19
    • 1142291591 scopus 로고    scopus 로고
    • The design of an acquisitional query processor for sensor networks
    • S. Madden, M. Franklin, J. Hellerstein, and W Hong. The design of an acquisitional query processor for sensor networks. In ACM SIGMOD, 2003.
    • (2003) ACM SIGMOD
    • Madden, S.1    Franklin, M.2    Hellerstein, J.3    Hong, W.4
  • 20
    • 20344381294 scopus 로고    scopus 로고
    • A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
    • D. J. Malan, M. Welsh, and M. D. Smith. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In SECON, 2004.
    • (2004) SECON
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 21
    • 39049105693 scopus 로고    scopus 로고
    • UC Berkey The EECS department
    • UC Berkey The EECS department. Cotbots: The mobile mote-based robots, http://www-bsac.eecs.berkeley.edu/projects/cotbots/.
    • Cotbots: The mobile mote-based robots
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. In Comm. of the ACM, 1978.
    • (1978) Comm. of the ACM
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 3042557080 scopus 로고    scopus 로고
    • Robomote: A Tiny Mobile Robot Platform for Large-Scale Sensor Networks
    • G. T. Sibley, M. H. Rahimi, and G. S. Sukhatme. Robomote: A Tiny Mobile Robot Platform for Large-Scale Sensor Networks. In IEEE ICRA, 2002.
    • (2002) IEEE ICRA
    • Sibley, G.T.1    Rahimi, M.H.2    Sukhatme, G.S.3
  • 25
    • 39049118016 scopus 로고    scopus 로고
    • I. C. Technology. MICA2: Wireless Measurement System. http://www.xbow.com/Product/pdf/files/wireless_pdf/6020-0042-0_MICA2.pd%f.
    • I. C. Technology. MICA2: Wireless Measurement System. http://www.xbow.com/Product/pdf/files/wireless_pdf/6020-0042-0_MICA2.pd%f.
  • 27
    • 17444417505 scopus 로고    scopus 로고
    • Efficient collection of sensor data in remote fields using mobile collectors
    • Y. Tirta, Z. Li, Y Lu, and S. Bagchi. Efficient collection of sensor data in remote fields using mobile collectors. In ICCCN, 2004.
    • (2004) ICCCN
    • Tirta, Y.1    Li, Z.2    Lu, Y.3    Bagchi, S.4
  • 28
    • 29844441128 scopus 로고    scopus 로고
    • Toward resilient security in wireless sensor networks
    • H. Yang, F. Ye, Y Yuan, S. Lu, and W Arbaugh. Toward resilient security in wireless sensor networks. In MobiHoc, 2005.
    • (2005) MobiHoc
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4    Arbaugh, W.5
  • 29
    • 0036949025 scopus 로고    scopus 로고
    • A two-tier data dissemination model for large-scale wireless sensor networks
    • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang. A two-tier data dissemination model for large-scale wireless sensor networks. In MobiCom, 2002.
    • (2002) MobiCom
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang, L.5
  • 30
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In INFOCOM, 2004.
    • (2004) INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 31
    • 84943517831 scopus 로고    scopus 로고
    • Data Dissemination with Ring-Based Index for Wireless Sensor Networks
    • W Zhang, G. Cao, and T. L. Porta. Data Dissemination with Ring-Based Index for Wireless Sensor Networks. In ICNP, 2003.
    • (2003) ICNP
    • Zhang, W.1    Cao, G.2    Porta, T.L.3
  • 32
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • W Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MobiHoc, 2005.
    • (2005) MobiHoc
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 33
    • 39049118984 scopus 로고    scopus 로고
    • L. Zhou, J. Ni, and C.V.Ravishankar. Supporting secure communication and data collection in mobile sensor networks. Technical report, Dept. of Computer Science and Engineering, UC, Riverside, June 2005.
    • L. Zhou, J. Ni, and C.V.Ravishankar. Supporting secure communication and data collection in mobile sensor networks. Technical report, Dept. of Computer Science and Engineering, UC, Riverside, June 2005.
  • 34
    • 33646400365 scopus 로고    scopus 로고
    • Efficient Key Establishment for Group-Based Wireless Sensor Deployments
    • L. Zhou, J. Ni, and C. Ravishankar. Efficient Key Establishment for Group-Based Wireless Sensor Deployments. In ACM Workshop WiSe, 2005.
    • (2005) ACM Workshop WiSe
    • Zhou, L.1    Ni, J.2    Ravishankar, C.3
  • 35
    • 33847249032 scopus 로고    scopus 로고
    • (SHORT PAPER) GKE: Efficient Group-based Key Establishment for Large Sensor Networks
    • L. Zhou, J. Ni, and C. Ravishankar. (SHORT PAPER) GKE: Efficient Group-based Key Establishment for Large Sensor Networks. In SecureComm, 2005.
    • (2005) SecureComm
    • Zhou, L.1    Ni, J.2    Ravishankar, C.3
  • 36
    • 39049083059 scopus 로고    scopus 로고
    • A Fault Localized Scheme for False Report Filtering in Sensor Networks
    • L. Zhou and C. Ravishankar. A Fault Localized Scheme for False Report Filtering in Sensor Networks. In IEEE ICPS, 2005.
    • (2005) IEEE ICPS
    • Zhou, L.1    Ravishankar, C.2
  • 37
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.