메뉴 건너뛰기




Volumn 96, Issue 10, 2008, Pages 1678-1687

Security and privacy in distributed smart cameras

Author keywords

Privacy; Security; Smart cameras

Indexed keywords

CAMERAS; DATA PRIVACY; EMBEDDED SYSTEMS; SENSOR NETWORKS;

EID: 55549106767     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2008.928763     Document Type: Review
Times cited : (40)

References (34)
  • 1
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • I. F. Akyildiz et al., "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393-422, 2002.
    • (2002) Comput. Netw , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1
  • 2
    • 55549133691 scopus 로고    scopus 로고
    • K. Paul, Security as a new dimension in embedded system design, 2004.
    • K. Paul, "Security as a new dimension in embedded system design, 2004.
  • 3
    • 84955086579 scopus 로고    scopus 로고
    • Wireless sensor networks
    • C. Douligeris and C. Douligeris, Eds. New York: Wiley
    • A. G. Voyiatzis and D. N. Serpanos, "Wireless sensor networks," in Network Security, C. Douligeris and C. Douligeris, Eds. New York: Wiley, 2007, pp. 375-390.
    • (2007) Network Security , pp. 375-390
    • Voyiatzis, A.G.1    Serpanos, D.N.2
  • 4
    • 3242756924 scopus 로고    scopus 로고
    • Embedded system security
    • Jul
    • P. Koopman, "Embedded system security," Computer, vol. 37, no. 7, pp. 95-97, Jul. 2004.
    • (2004) Computer , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 5
    • 85014332650 scopus 로고    scopus 로고
    • Security in embedded systems: Design challenges
    • R. Srivaths et al., "Security in embedded systems: Design challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, 2004.
    • (2004) ACM Trans. Embed. Comput. Syst , vol.3 , Issue.3 , pp. 461-491
    • Srivaths, R.1
  • 7
    • 33845412854 scopus 로고    scopus 로고
    • Security for sensor networks
    • Baltimore, MD
    • J. Undercoffer et al, "Security for sensor networks," in Proc. CADIP Res. Symp., Baltimore, MD, 2002.
    • (2002) Proc. CADIP Res. Symp
    • Undercoffer, J.1
  • 8
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: The timing attack
    • E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, no. 3, pp. 95-97, 1996.
    • (1996) Computer , vol.29 , Issue.3 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 9
    • 33845800487 scopus 로고    scopus 로고
    • Architecture study for smart cameras
    • Munich, Germany
    • H. Broers et al., "Architecture study for smart cameras," in Proc. BOS Conf. Ind. Imag. Mach. Vision, Munich, Germany, 2005, pp. 39-49.
    • (2005) Proc. BOS Conf. Ind. Imag. Mach. Vision , pp. 39-49
    • Broers, H.1
  • 11
    • 0032204757 scopus 로고    scopus 로고
    • Mobile code security
    • Dec
    • A. D. Rubin and D. E. Geer, Jr, "Mobile code security," IEEE Internet Comput., vol. 2, no. 6, pp. 30-34, Dec. 1998.
    • (1998) IEEE Internet Comput , vol.2 , Issue.6 , pp. 30-34
    • Rubin, A.D.1    Geer Jr, D.E.2
  • 12
    • 0036715137 scopus 로고    scopus 로고
    • Smart cameras as embedded systems
    • W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, pp. 48-53, 2002.
    • (2002) Computer , vol.35 , Issue.9 , pp. 48-53
    • Wolf, W.1    Ozer, B.2    Lv, T.3
  • 13
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, 2003.
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 16
    • 0034316289 scopus 로고    scopus 로고
    • Digital rights management and watermarking of multimedia content for m-commerce applications
    • Nov
    • F. Hartung and F. Ramme, "Digital rights management and watermarking of multimedia content for m-commerce applications," IEEE Commun. Mag., vol. 38, no. 11, pp. 78-84, Nov. 2000.
    • (2000) IEEE Commun. Mag , vol.38 , Issue.11 , pp. 78-84
    • Hartung, F.1    Ramme, F.2
  • 17
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • 2nd quarter
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surv., vol. 8. 2nd quarter, 2006.
    • (2006) IEEE Commun. Surv , vol.8
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 18
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 19
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: Securing sensor networks with public key technology
    • Washington, DC, Oct. 25
    • R. Watro et al., "TinyPK: Securing sensor networks with public key technology," in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., Washington, DC, Oct. 25, 2004, pp. 59-64.
    • (2004) Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw , pp. 59-64
    • Watro, R.1
  • 20
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, CA, May 11-14
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 Symp. Security Privacy, Oakland, CA, May 11-14, 2003, pp. 197-213.
    • (2003) Proc. 2003 Symp. Security Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 22
    • 16644374371 scopus 로고    scopus 로고
    • D. Liu, P. Ning, and R. Li, Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Security (TISSEC), 8, no. 1, pp. 41-77, 2005.
    • D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Inf. Syst. Security (TISSEC), vol. 8, no. 1, pp. 41-77, 2005.
  • 24
    • 29844441128 scopus 로고    scopus 로고
    • Toward resilient security in wireless sensor networks
    • Urbana-Chanipaign, IL, May
    • H. Yang et al., "Toward resilient security in wireless sensor networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana-Chanipaign, IL, May 2005, pp. 34-45.
    • (2005) Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput , pp. 34-45
    • Yang, H.1
  • 25
    • 4544340566 scopus 로고    scopus 로고
    • Security support for in-network processing in wireless sensor networks
    • Fairfax, VA
    • J. Deng, R. Han, and S. Mishra, "Security support for in-network processing in wireless sensor networks," in Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw., Fairfax, VA, 2003, pp. 83-93.
    • (2003) Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw , pp. 83-93
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 26
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Washington, DC, Oct. 27-30
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM Conf. Comput. Commun. Security, Washington, DC, Oct. 27-30,2003, pp. 62-72.
    • (2003) Proc. 10th ACM Conf. Comput. Commun. Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 27
    • 1542376949 scopus 로고    scopus 로고
    • Analyzing and modeling encryption overhead for sensor network nodes
    • San Diego, CA, Sep. 19
    • P. Ganesan et al., "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, Sep. 19, 2003, pp.151-159.
    • (2003) Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat , pp. 151-159
    • Ganesan, P.1
  • 28
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • T. Park and K. G. Shin, "LiSP: A lightweight security protocol for wireless sensor networks," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 634-660, 2004.
    • (2004) ACM Trans. Embed. Comput. Syst , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 29
    • 18844368499 scopus 로고    scopus 로고
    • Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
    • San Jose, CA, Oct. 30-Nov. 1
    • R. Venugopalan et al., "Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis," in Proc. Int. Conf. Compilers, Architect. Synth. Embed. Syst., San Jose, CA, Oct. 30-Nov. 1, 2003, pp. 188-197.
    • (2003) Proc. Int. Conf. Compilers, Architect. Synth. Embed. Syst , pp. 188-197
    • Venugopalan, R.1
  • 30
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Maryland, Baltimore, Nov
    • C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. 2nd Int. Conf. Embed. Netw. Sensor Syst., Maryland, Baltimore, Nov. 2005, pp. 162-175.
    • (2005) Proc. 2nd Int. Conf. Embed. Netw. Sensor Syst , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 31
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig et al., "SPINS: Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Netw , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 32
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 33
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
    • (2003) Ad Hoc Netw , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.