메뉴 건너뛰기




Volumn , Issue , 2003, Pages 83-92

Security support for in-network processing in wireless sensor networks

Author keywords

In network processing; Security mechanisms; Sensor networks

Indexed keywords

ALGORITHMS; DATA COMMUNICATION SYSTEMS; GLOBAL POSITIONING SYSTEM; PROM; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SENSORS; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES;

EID: 4544340566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986870     Document Type: Conference Paper
Times cited : (84)

References (41)
  • 3
    • 4544270326 scopus 로고    scopus 로고
    • Adaptive and decentralized operator placement for in-network query processing
    • April
    • B.J.Bonfils, P. Bonnet, "Adaptive and Decentralized Operator Placement for In-Network Query Processing", IPSN'03, April, 2003.
    • (2003) IPSN'03
    • Bonfils, B.J.1    Bonnet, P.2
  • 4
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting Mobile Communications: The Insecurity of 802.11
    • N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", ACM MobiCom 2001, pp. 180-188.
    • ACM MobiCom 2001 , pp. 180-188
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 6
    • 4544220463 scopus 로고    scopus 로고
    • Cougar Project
    • Cougar Project: http://cougar.cs.cornell.edu
  • 17
    • 4243642312 scopus 로고
    • Constructing digital signatures from one-way function
    • SRI International, Oct
    • L. Lamport, "Constructing digital signatures from one-way function", technical report SRI-CSL-98, SRI International, Oct 1979.
    • (1979) Technical Report , vol.SRI-CSL-98
    • Lamport, L.1
  • 18
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password Authentication with Insecure Communication", Communication of the ACM, 24:11, Nov 1981.
    • (1981) Communication of the ACM , vol.24 , pp. 11
    • Lamport, L.1
  • 20
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • San Diego, California. February
    • D. Liu and P. Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks", The 10th Annual Network and Distributed System Security Symposium. San Diego, California. February 2003.
    • (2003) The 10th Annual Network and Distributed System Security Symposium
    • Liu, D.1    Ning, P.2
  • 21
    • 0141787007 scopus 로고    scopus 로고
    • Energy-aware secure multicast communication in ad-hoc networks using geographic location information
    • Hong Kong, China, April
    • L. Lazos, R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographic location information", ICASSP 2003, Hong Kong, China, April 2003.
    • (2003) ICASSP 2003
    • Lazos, L.1    Poovendran, R.2
  • 24
    • 0034504137 scopus 로고    scopus 로고
    • MetaCricket: A designer's kit for making computational devices
    • F. Martin, B. Mikhak, and B. Silverman, "MetaCricket: A designer's kit for making computational devices", IBM Systems Journal, vol. 39, 2000.
    • (2000) IBM Systems Journal , vol.39
    • Martin, F.1    Mikhak, B.2    Silverman, B.3
  • 27
    • 4544274431 scopus 로고    scopus 로고
    • NAI Lab Report, http://www.nai.com/nai_labs/ asp_set/crypto/ crypt_senseit.asp.
    • NAI Lab Report
  • 28
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM 21(12), December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 29
    • 4544290802 scopus 로고    scopus 로고
    • NS2 web site, http://www.isi.edu/nsnam/ns
    • NS2 Web Site
  • 31
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • To Appear Los Angeles, CA, Nov
    • B. Przydatek, D. Song and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks", To Appear in ACM SenSys'03, Los Angeles, CA, Nov, 2003.
    • (2003) ACM SenSys'03
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 34
    • 4544324229 scopus 로고    scopus 로고
    • TinyOS: http://www.cs.berkeley.edu/tos
  • 35
    • 4544221261 scopus 로고    scopus 로고
    • TinySec: http://www.cs.berkeley.edu/~nks/tinysec/
  • 36
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. Wood, J.A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 37
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, vol. 13, no.6, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2
  • 38
    • 0036929565 scopus 로고    scopus 로고
    • Secure multicast in wireless networks of mobile hosts: Protocols and issue
    • ACM/Baltzer Mobile networks and applications, December
    • D. Bruschi, E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issue," ACM/Baltzer Mobile networks and applications, special issue on Multipoint Communication in Wireless Mobile Networks, Vol.6, No.7, December 2002.
    • (2002) Multipoint Communication in Wireless Mobile Networks , vol.6 , Issue.7 SPEC. ISSUE
    • Bruschi, D.1    Rosti, E.2
  • 39
    • 0036949534 scopus 로고    scopus 로고
    • Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet
    • Oct.
    • P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet", ASPLOS-X conference, Oct. 2002.
    • (2002) ASPLOS-X Conference
    • Juang, P.1    Oki, H.2    Wang, Y.3    Martonosi, M.4    Peh, L.5    Rubenstein, D.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.