메뉴 건너뛰기




Volumn 13, Issue 3, 2008, Pages 165-172

On handling insider attacks in wireless sensor networks

Author keywords

Insider attacks; Security; Wireless Sensor Networks

Indexed keywords

COMPUTER NETWORKS; COMPUTER SYSTEMS; HYBRID SENSORS; SENSOR NETWORKS; SENSORS;

EID: 55749099619     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.10.011     Document Type: Article
Times cited : (20)

References (44)
  • 2
    • 34547404724 scopus 로고    scopus 로고
    • Alarifi A, Du W. Diversify sensor nodes to improve resilience against node compromise. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
    • Alarifi A, Du W. Diversify sensor nodes to improve resilience against node compromise. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
  • 4
    • 48649094490 scopus 로고    scopus 로고
    • One-time sensors: a novel concept to mitigate node-capture attacks
    • Bicakci K., Gamage C., Crispo B., and Tanenbaum A.S. One-time sensors: a novel concept to mitigate node-capture attacks. ESAS (2005)
    • (2005) ESAS
    • Bicakci, K.1    Gamage, C.2    Crispo, B.3    Tanenbaum, A.S.4
  • 6
    • 77956574096 scopus 로고    scopus 로고
    • Brutch P, Ko C. Challenges in intrusion detection for wireless ad-hoc networks. In: SAINT Workshop; 2003.
    • Brutch P, Ko C. Challenges in intrusion detection for wireless ad-hoc networks. In: SAINT Workshop; 2003.
  • 9
    • 37849004592 scopus 로고    scopus 로고
    • Conti M, Pietro RD, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc; 2007.
    • Conti M, Pietro RD, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc; 2007.
  • 10
    • 4544298056 scopus 로고    scopus 로고
    • Deng J, Han R, Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: DSN; 2004.
    • Deng J, Han R, Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: DSN; 2004.
  • 11
    • 33845938314 scopus 로고    scopus 로고
    • Dini G, Savino IM. An efficient key revocation protocol for wireless sensor networks. In: WOWMOM: international symposium on world of wireless, mobile and multimedia networks; 2006.
    • Dini G, Savino IM. An efficient key revocation protocol for wireless sensor networks. In: WOWMOM: international symposium on world of wireless, mobile and multimedia networks; 2006.
  • 12
    • 3042783638 scopus 로고    scopus 로고
    • Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS: conference on computer and communications security; 2003.
    • Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS: conference on computer and communications security; 2003.
  • 13
    • 34247376029 scopus 로고    scopus 로고
    • Dutta PK, Hui JW, Chu DC, Culler DE. Securing the deluge network programming system. In: IPSN: international conference on information processing in sensor networks; 2006.
    • Dutta PK, Hui JW, Chu DC, Culler DE. Securing the deluge network programming system. In: IPSN: international conference on information processing in sensor networks; 2006.
  • 14
    • 0038341106 scopus 로고    scopus 로고
    • Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: CCS: conference on computer and communications security; 2002.
    • Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: CCS: conference on computer and communications security; 2002.
  • 15
    • 14844315770 scopus 로고    scopus 로고
    • Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. In: SASN: workshop on security of ad hoc and sensor networks; 2004.
    • Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. In: SASN: workshop on security of ad hoc and sensor networks; 2004.
  • 16
    • 55749109862 scopus 로고    scopus 로고
    • Ganeriwal S, Ravi S, Raghunathan A. Trusted platform based key establishment and management for sensor networks. Unpublished.
    • Ganeriwal S, Ravi S, Raghunathan A. Trusted platform based key establishment and management for sensor networks. Unpublished.
  • 17
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: the need for secure systems
    • Department of Computer Science, University of Colorado, Boulder
    • Hartung C., Balasalle J., and Han R. Node compromise in sensor networks: the need for secure systems. Technical report CU-CS-990-05 (January 2005), Department of Computer Science, University of Colorado, Boulder
    • (2005) Technical report CU-CS-990-05
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 18
    • 22744432612 scopus 로고    scopus 로고
    • Hui JW, Culler D. The dynamic behavior of a data dissemination protocol for network programming at scale. In: SenSys: international conference on embedded networked sensor systems; 2004.
    • Hui JW, Culler D. The dynamic behavior of a data dissemination protocol for network programming at scale. In: SenSys: international conference on embedded networked sensor systems; 2004.
  • 19
    • 84942426861 scopus 로고    scopus 로고
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: Workshop on sensor network protocols and applications; 2003.
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: Workshop on sensor network protocols and applications; 2003.
  • 20
    • 55749083383 scopus 로고    scopus 로고
    • Kim DS, Sadi MG, Park JS. A key revocation scheme for mobile sensor networks. In: Frontiers of high performance computing and networking ISPA Workshops; 2007.
    • Kim DS, Sadi MG, Park JS. A key revocation scheme for mobile sensor networks. In: Frontiers of high performance computing and networking ISPA Workshops; 2007.
  • 21
    • 55749113007 scopus 로고    scopus 로고
    • A practical inter-sensor broadcast authentication scheme
    • Kim J.W., Kim Y.H., Lee H., and Lee D.H. A practical inter-sensor broadcast authentication scheme. HCI 5 (2007)
    • (2007) HCI , vol.5
    • Kim, J.W.1    Kim, Y.H.2    Lee, H.3    Lee, D.H.4
  • 22
    • 55749101585 scopus 로고    scopus 로고
    • Krauß C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: European workshop on security and privacy in ad hoc and sensor networks (ESAS); 2007.
    • Krauß C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: European workshop on security and privacy in ad hoc and sensor networks (ESAS); 2007.
  • 23
    • 56749170948 scopus 로고    scopus 로고
    • Krauß C, Schneider M, Eckert C. Defending against false-endorsement-based DoS attacks in wireless sensor networks. In: WiSec: conference on Wireless Network Security; 2008.
    • Krauß C, Schneider M, Eckert C. Defending against false-endorsement-based DoS attacks in wireless sensor networks. In: WiSec: conference on Wireless Network Security; 2008.
  • 25
    • 33751183522 scopus 로고    scopus 로고
    • A secure alternate path routing in sensor networks
    • Lee S.-B., and Choi Y.-H. A secure alternate path routing in sensor networks. Computer Communications 30 1 (2006) 153-165
    • (2006) Computer Communications , vol.30 , Issue.1 , pp. 153-165
    • Lee, S.-B.1    Choi, Y.-H.2
  • 26
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel μTESLA: broadcast authentication for distributed sensor networks
    • Liu D., and Ning P. Multilevel μTESLA: broadcast authentication for distributed sensor networks. Transactions on Embedded Computing Systems 3 4 (2004) 800-836
    • (2004) Transactions on Embedded Computing Systems , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 27
    • 34547466172 scopus 로고    scopus 로고
    • Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
    • Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication. In: SASN: workshop on security of ad hoc and sensor networks; 2006.
  • 28
    • 55749111384 scopus 로고    scopus 로고
    • Maeng Y, Mohaisen A, Nyang D. Secret key revocation in sensor networks. In: International conference ubiquitous intelligence and computing (UIC); 2007.
    • Maeng Y, Mohaisen A, Nyang D. Secret key revocation in sensor networks. In: International conference ubiquitous intelligence and computing (UIC); 2007.
  • 29
    • 85177500160 scopus 로고    scopus 로고
    • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom: international conference on mobile computing and networking; 2000.
    • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom: international conference on mobile computing and networking; 2000.
  • 30
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    • Ning P., Liu A., and Du W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Transactions on Sensor Networks 4 1 (2008) 1-35
    • (2008) ACM Transactions on Sensor Networks , vol.4 , Issue.1 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 31
    • 27544460282 scopus 로고    scopus 로고
    • Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 2005.
    • Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 2005.
  • 33
    • 18844457825 scopus 로고    scopus 로고
    • Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. In: SenSys: international conference on embedded networked sensor systems; 2003.
    • Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. In: SenSys: international conference on embedded networked sensor systems; 2003.
  • 34
    • 0017983255 scopus 로고
    • Reliability issues in computing system design
    • Randell B., Lee P., and Treleaven P.C. Reliability issues in computing system design. ACM Computing Surveys 10 2 (1978) 123-165
    • (1978) ACM Computing Surveys , vol.10 , Issue.2 , pp. 123-165
    • Randell, B.1    Lee, P.2    Treleaven, P.C.3
  • 36
    • 33749041485 scopus 로고    scopus 로고
    • Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. In: IEEE consumer communications and networking conference (CCNC); 2006.
    • Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. In: IEEE consumer communications and networking conference (CCNC); 2006.
  • 37
    • 3042738543 scopus 로고    scopus 로고
    • Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: SoftWare-based ATTestation for embedded devices. In: IEEE symposium on security and privacy; 2004.
    • Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: SoftWare-based ATTestation for embedded devices. In: IEEE symposium on security and privacy; 2004.
  • 38
    • 34247361254 scopus 로고    scopus 로고
    • Seshadri A, Luk M, Perrig A, van Doorn L, Khosla P. SCUBA: secure code update by attestation in sensor networks. In: WiSe: workshop on wireless security; 2006.
    • Seshadri A, Luk M, Perrig A, van Doorn L, Khosla P. SCUBA: secure code update by attestation in sensor networks. In: WiSe: workshop on wireless security; 2006.
  • 39
    • 55749096383 scopus 로고    scopus 로고
    • Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report, Available from: ; 2006.
    • Trusted Computing Group. Trusted Platform Module (TPM) specifications. Technical report, Available from: ; 2006.
  • 40
    • 85084160265 scopus 로고    scopus 로고
    • Wu T, Malkin M, Boneh D. Building intrusion tolerant applications. In: SSYM: conference on USENIX security symposium; 1999.
    • Wu T, Malkin M, Boneh D. Building intrusion tolerant applications. In: SSYM: conference on USENIX security symposium; 1999.
  • 41
    • 3543100577 scopus 로고    scopus 로고
    • Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks. In: IEEE INFOCOM; 2004.
    • Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks. In: IEEE INFOCOM; 2004.
  • 42
    • 25844473466 scopus 로고    scopus 로고
    • Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: IEEE INFOCOM; 2005.
    • Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: IEEE INFOCOM; 2005.
  • 43
    • 10044284351 scopus 로고    scopus 로고
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS: conference on computer and communications security; 2003.
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS: conference on computer and communications security; 2003.
  • 44
    • 3543056512 scopus 로고    scopus 로고
    • Zhu S, Setia S, Jajodia S, Ning P. An interleaved hop-by hop authentication scheme for filtering false data in sensor networks. In: IEEE symposium on security and privacy; 2004.
    • Zhu S, Setia S, Jajodia S, Ning P. An interleaved hop-by hop authentication scheme for filtering false data in sensor networks. In: IEEE symposium on security and privacy; 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.