메뉴 건너뛰기




Volumn 31, Issue 4, 2008, Pages 818-826

Defense against outside attacks in wireless sensor networks

Author keywords

Cellular automata; Node capturing; Outside Security; User authentication; Wireless sensor network

Indexed keywords

CELLULAR AUTOMATA; COMPUTATIONAL COMPLEXITY; DATA ACQUISITION; MILITARY ENGINEERING; USER INTERFACES; WIRELESS SENSOR NETWORKS;

EID: 39049146014     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.10.025     Document Type: Article
Times cited : (19)

References (33)
  • 2
    • 0036870095 scopus 로고    scopus 로고
    • Mica: a wireless platform for deeply embedded networks
    • Hill J., and Culler D. Mica: a wireless platform for deeply embedded networks. IEEE Micro. 22 (2002) 6
    • (2002) IEEE Micro. , vol.22 , pp. 6
    • Hill, J.1    Culler, D.2
  • 4
    • 39049171915 scopus 로고    scopus 로고
    • Z. Benenson, N. Gedicke, O. Raivio, Realizing robust user authentication in sensor networks, in: Proc. Workshop on Real-World Wireless Sensor Networks REALWSN-05, 2005.
    • Z. Benenson, N. Gedicke, O. Raivio, Realizing robust user authentication in sensor networks, in: Proc. Workshop on Real-World Wireless Sensor Networks REALWSN-05, 2005.
  • 5
    • 0034946938 scopus 로고    scopus 로고
    • R.A.Burne, A.L. Buczak, V.R. Jamalabad, I. Kadar, E.R. Eadan, Self-organizing cooperative sensor network for remote surveillance improved target tracking results, in: Proc. SPIE 4232, 2001, pp. 313-321.
    • R.A.Burne, A.L. Buczak, V.R. Jamalabad, I. Kadar, E.R. Eadan, Self-organizing cooperative sensor network for remote surveillance improved target tracking results, in: Proc. SPIE 4232, 2001, pp. 313-321.
  • 6
    • 33845507838 scopus 로고    scopus 로고
    • A. Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON-05, 2005, pp. 46-54.
    • A. Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON-05, 2005, pp. 46-54.
  • 7
    • 34748902207 scopus 로고    scopus 로고
    • A.R. Chowdhury, S. Tripathy, S. Nandi, Securing wireless sensor networks against spurious injections, in: Proc. IEEE Int. Conference on COMmunication System softWAre and MiddlewaRE COMSWARE07, 2007.
    • A.R. Chowdhury, S. Tripathy, S. Nandi, Securing wireless sensor networks against spurious injections, in: Proc. IEEE Int. Conference on COMmunication System softWAre and MiddlewaRE COMSWARE07, 2007.
  • 8
    • 33845492142 scopus 로고    scopus 로고
    • F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proc. IEEE SECON 2005, 2005, pp. 118-129.
    • F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proc. IEEE SECON 2005, 2005, pp. 118-129.
  • 9
    • 33745969132 scopus 로고    scopus 로고
    • J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, pp. 89-96.
    • J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, pp. 89-96.
  • 10
    • 3042783638 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. ACM Conference Computer Communication and Security, (CCS'03), 2003, pp. 42-51.
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. ACM Conference Computer Communication and Security, (CCS'03), 2003, pp. 42-51.
  • 11
    • 33745933645 scopus 로고    scopus 로고
    • T. Ito, H. Ohta, N. Matsuda, T. Yoneda, A key pre-distribution scheme for secure sensor networks using probability density function of node, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
    • T. Ito, H. Ohta, N. Matsuda, T. Yoneda, A key pre-distribution scheme for secure sensor networks using probability density function of node, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
  • 12
    • 84942426861 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proc. IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA'03), 2003, pp. 113-127.
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proc. IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA'03), 2003, pp. 113-127.
  • 13
    • 34547466172 scopus 로고    scopus 로고
    • M. Luk, A. Perrig, B. Whillock, Seven cardinal properties of sensor network broadcast authentication, in: Proc. ACM Conference on Security of Ad Hoc and Sensor Networks, (SASN 06), 2006, pp. 147-156.
    • M. Luk, A. Perrig, B. Whillock, Seven cardinal properties of sensor network broadcast authentication, in: Proc. ACM Conference on Security of Ad Hoc and Sensor Networks, (SASN 06), 2006, pp. 147-156.
  • 14
    • 33745931868 scopus 로고    scopus 로고
    • M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, pp. 107-116.
    • M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, pp. 107-116.
  • 15
    • 4344643901 scopus 로고    scopus 로고
    • Environmental sensor networks
    • Martinez K., Hart J.K., and Ong R. Environmental sensor networks. IEEE Comput. 37 8 (2004) 50-56
    • (2004) IEEE Comput. , vol.37 , Issue.8 , pp. 50-56
    • Martinez, K.1    Hart, J.K.2    Ong, R.3
  • 16
    • 20344401315 scopus 로고    scopus 로고
    • K. Martinez, R. Ong, J. Hart, Glacsweb: a sensor network for hostile environments, in: Proc. IEEE SECON 2004, 2004, pp. 81-87.
    • K. Martinez, R. Ong, J. Hart, Glacsweb: a sensor network for hostile environments, in: Proc. IEEE SECON 2004, 2004, pp. 81-87.
  • 17
    • 39049124906 scopus 로고    scopus 로고
    • P. Pal Chaudhuri, D.R. Chowdhury, S. Nandi, S. Chatterjee, 1997. Additive Cellular Automata Theory and Applications 1. IEEE Computer Society Press.
    • P. Pal Chaudhuri, D.R. Chowdhury, S. Nandi, S. Chatterjee, 1997. Additive Cellular Automata Theory and Applications 1. IEEE Computer Society Press.
  • 18
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig A., Stankovic J., and Wagner D. Security in wireless sensor networks. Commun. ACM 47 6 (2004) 53-57
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 20
    • 0036986465 scopus 로고    scopus 로고
    • J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless sensor networks for habitat monitoring, in: Proc. ACM Workshop on Wireless Sensor Networks and Applications, 2002.
    • J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless sensor networks for habitat monitoring, in: Proc. ACM Workshop on Wireless Sensor Networks and Applications, 2002.
  • 21
    • 24944540791 scopus 로고    scopus 로고
    • R. Roman, J. Zhou, J. Lopez, On the security of wireless sensor networks, in: Proc. Int. Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, 2005, pp. 681-690.
    • R. Roman, J. Zhou, J. Lopez, On the security of wireless sensor networks, in: Proc. Int. Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, 2005, pp. 681-690.
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems. A mathematical theory of cryptography
    • Shannon C.E. Communication theory of secrecy systems. A mathematical theory of cryptography. Bell Syst. Techn. J. 28 (1948) 656-715
    • (1948) Bell Syst. Techn. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 23
    • 33845500536 scopus 로고    scopus 로고
    • M. Shehab, E. Bertino, A. Ghafoor, Efficient hierarchical key generation and key diffusion for sensor networks, Proc. IEEE SECON 2005, 2005, pp. 76-84.
    • M. Shehab, E. Bertino, A. Ghafoor, Efficient hierarchical key generation and key diffusion for sensor networks, Proc. IEEE SECON 2005, 2005, pp. 76-84.
  • 24
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • Shi E., and Perrig A. Designing secure sensor networks. IEEE Wireless Commun. (2004) 38-43
    • (2004) IEEE Wireless Commun. , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 27
    • 39049158040 scopus 로고    scopus 로고
    • S. Tripathy, S. Nandi, A. Mitra, A secured response algorithm with query authentication for wireless sensor networks, in: Proc. Int. Asian Mobile Computing Conference (AMOC07), 2007, pp. 220-225.
    • S. Tripathy, S. Nandi, A. Mitra, A secured response algorithm with query authentication for wireless sensor networks, in: Proc. Int. Asian Mobile Computing Conference (AMOC07), 2007, pp. 220-225.
  • 28
    • 84905828907 scopus 로고    scopus 로고
    • A. Wacker, M. Knoll, T. Heiber, K. Rothermel, A new approach for establishing pairwise keys for securing wireless sensor networks, in: Proc. ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), 2005, pp. 27-38.
    • A. Wacker, M. Knoll, T. Heiber, K. Rothermel, A new approach for establishing pairwise keys for securing wireless sensor networks, in: Proc. ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), 2005, pp. 27-38.
  • 29
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Comput. 35 (2002) 54-62
    • (2002) IEEE Comput. , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 31
    • 33845458336 scopus 로고    scopus 로고
    • K.-H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authenticatin scheme for wireless sensor networks, in: Proc IEEE Int. Conf. Sensor networks, ubiquitous and trustworthy computing (SUTC-06) Computer society press, 2006.
    • K.-H.M. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authenticatin scheme for wireless sensor networks, in: Proc IEEE Int. Conf. Sensor networks, ubiquitous and trustworthy computing (SUTC-06) Computer society press, 2006.
  • 32
    • 33845479472 scopus 로고    scopus 로고
    • W. Yu, K.J. Ray Liu, Secure cooperative mobile ad hoc networks against injecting traffic attacks, in: Proc. IEEE SECON-2005, 2005, pp. 55-64.
    • W. Yu, K.J. Ray Liu, Secure cooperative mobile ad hoc networks against injecting traffic attacks, in: Proc. IEEE SECON-2005, 2005, pp. 55-64.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.