메뉴 건너뛰기




Volumn 7, Issue 5, 2008, Pages 585-598

LEDS: Providing location-aware end-to-end data security in wireless sensor networks

Author keywords

Data security; DoS attack; End to end; False data injection attack; Wireless sensor network

Indexed keywords

DENIAL OF SERVICE (DOS) ATTACK; FALSE DATA INJECTION ATTACK;

EID: 41449098948     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2007.70753     Document Type: Article
Times cited : (136)

References (38)
  • 1
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and Approaches for Distributed Sensor Network Security,
    • Technical Report 00010, NAI Labs
    • D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Network Security," Technical Report 00010, NAI Labs, 2000.
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 2
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," Computer, Oct. 2002.
    • (2002) Computer
    • Wood, A.1    Stankovic, J.2
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, no. 2, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2
    • Karlof, C.1    Wagner, D.2
  • 5
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Dec
    • E. Shi and A. Perrig, "Designing Secure Sensor Networks," Wireless Comm. Magazine, vol. 11, no. 6, Dec. 2004.
    • (2004) Wireless Comm. Magazine , vol.11 , Issue.6
    • Shi, E.1    Perrig, A.2
  • 7
    • 0142103313 scopus 로고    scopus 로고
    • Security and Privacy in Sensor Networks
    • Oct
    • H. Chan and A. Perrig, "Security and Privacy in Sensor Networks," Computer, pp. 103-105, Oct. 2003.
    • (2003) Computer , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 12
    • 23244467182 scopus 로고    scopus 로고
    • A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
    • May
    • W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
    • (2005) ACM Trans. Information and System Security , vol.8 , Issue.2 , pp. 228-258
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 13
    • 32844459414 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE Trans. Dependable and Secure Computing, 3, no. 2, pp. 62-77, Jan.-Mar. 2006.
    • W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 2, pp. 62-77, Jan.-Mar. 2006.
  • 15
    • 41449118287 scopus 로고    scopus 로고
    • PIKE: Peer Intermediaries for Key Establishment
    • Mar
    • H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment," Proc. IEEE INFOCOM, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM
    • Chan, H.1    Perrig, A.2
  • 16
    • 33144454801 scopus 로고    scopus 로고
    • S. Capkun and J.P. Hubaux, Secure Positioning in Wireless Networks, IEEE J. Selected Areas in Comm., Feb. 2006.
    • S. Capkun and J.P. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., Feb. 2006.
  • 17
    • 25844439422 scopus 로고    scopus 로고
    • Secure Positioning of Wireless Devices with Application to Sensor Networks
    • Mar
    • S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM
    • Capkun, S.1    Hubaux, J.2
  • 18
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
    • May
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 19
    • 3543100577 scopus 로고    scopus 로고
    • Statistical En-Route Filtering of Injected False Data in Sensor Networks
    • Mar
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, Mar. 2004.
    • (2004) Proc. IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 20
    • 2442529460 scopus 로고    scopus 로고
    • Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM/Baltzer J
    • Mar
    • F. Ye, S. Lu, and L. Zhang, Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM/Baltzer J. Wireless Networks, Mar. 2005.
    • (2005) Wireless Networks
    • Ye, F.1    Lu, S.2    Zhang, L.3
  • 22
    • 41449087752 scopus 로고    scopus 로고
    • TinyOS Operation System
    • TinyOS Operation System, http://millennium.berkeley.edu, 2005.
    • (2005)
  • 25
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 27
    • 14044255819 scopus 로고    scopus 로고
    • A Forwarding Scheme for Reliable and Energy-Efficient Data Delivery in Cluster-Based Sensor Networks
    • Feb
    • J. Jung, T. Park, and C. Kim, "A Forwarding Scheme for Reliable and Energy-Efficient Data Delivery in Cluster-Based Sensor Networks," IEEE Comm. Letters, vol. 9, no. 2, pp. 112-114, Feb. 2005.
    • (2005) IEEE Comm. Letters , vol.9 , Issue.2 , pp. 112-114
    • Jung, J.1    Park, T.2    Kim, C.3
  • 28
    • 29844438193 scopus 로고    scopus 로고
    • Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
    • May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, May 2005.
    • (2005) Proc. ACM MobiHoc
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 29
    • 25844473466 scopus 로고    scopus 로고
    • Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
    • W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Zhang, W.1    Cao, G.2
  • 30
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
    • Feb
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
    • (2006) IEEE J. Selected Areas in Comm , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 31
    • 33947309703 scopus 로고    scopus 로고
    • Secure Localization and Authentication in Ultra-Wideband Sensor Networks
    • Apr
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure Localization and Authentication in Ultra-Wideband Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 4, pp. 829-835, Apr. 2006.
    • (2006) IEEE J. Selected Areas in Comm , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 34
    • 41449087351 scopus 로고    scopus 로고
    • CENS Research
    • CENS Research: Systems Infrastructure, http://research.cens.ucla. edu/areas/2006/Systems_Infrastructure/default.htm, 2008.
    • (2008) Systems Infrastructure
  • 35
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
    • Apr
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 36
    • 33646834914 scopus 로고    scopus 로고
    • A New Approach for Random Key Pre-Distribution in Large Scale Wireless Sensor Networks
    • K. Ren, K. Zeng, and W. Lou, "A New Approach for Random Key Pre-Distribution in Large Scale Wireless Sensor Networks," Wiley J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.
    • (2006) Wiley J. Wireless Comm. and Mobile Computing , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 37
    • 38349177828 scopus 로고    scopus 로고
    • Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
    • Jan
    • K. Ren, K. Zeng, and W. Lou, "Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 7, no. 1, Jan. 2008.
    • (2008) IEEE Trans. Wireless Comm , vol.7 , Issue.1
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 38
    • 36248988077 scopus 로고    scopus 로고
    • On Broadcast Authentication in Wireless Sensor Networks
    • Nov
    • K. Ren, W. Lou, K. Zeng, and P. Moran, "On Broadcast Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
    • (2007) IEEE Trans. Wireless Comm , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.