메뉴 건너뛰기




Volumn 31, Issue 18, 2008, Pages 4294-4303

Security co-existence of wireless sensor networks and RFID for pervasive computing

Author keywords

Pervasive computing; RFID; Security; Wireless sensor network

Indexed keywords

COMPUTER SYSTEMS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; HYBRID SENSORS; INTEGRATED CIRCUITS; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO SYSTEMS; ROUTING PROTOCOLS; SENSOR NETWORKS; SENSORS; UBIQUITOUS COMPUTING; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 56949107218     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.05.035     Document Type: Article
Times cited : (25)

References (20)
  • 1
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in RFID and applications in telemedicine
    • Xiao Y., Shen X., Sun B., and Cai L. Security and privacy in RFID and applications in telemedicine. IEEE Commun. Mag. (2006) 64-72
    • (2006) IEEE Commun. Mag. , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4
  • 2
    • 33746734206 scopus 로고    scopus 로고
    • B. Sun, C.C. Li, K. Wu, Y. Xiao, A Lightweight Secure Protocol for Wireless Sensor Networks, Elsevier Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance Reliability, Security and Beyond, 2006, pp. 2556-2568.
    • B. Sun, C.C. Li, K. Wu, Y. Xiao, A Lightweight Secure Protocol for Wireless Sensor Networks, Elsevier Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance Reliability, Security and Beyond, 2006, pp. 2556-2568.
  • 3
    • 14844294769 scopus 로고    scopus 로고
    • D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: ACM CCS'04, Washington, DC, USA, October 2004, pp. 210-219.
    • D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: ACM CCS'04, Washington, DC, USA, October 2004, pp. 210-219.
  • 4
    • 33847330246 scopus 로고    scopus 로고
    • T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: IEEE SecureComm'05, Athens, Greece, September 2005, pp. 59-66.
    • T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: IEEE SecureComm'05, Athens, Greece, September 2005, pp. 59-66.
  • 5
    • 85081447381 scopus 로고    scopus 로고
    • S.A. Weis, New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing, Ph.D. Dissertation, MIT, May 2006.
    • S.A. Weis, New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing, Ph.D. Dissertation, MIT, May 2006.
  • 6
    • 33751528815 scopus 로고    scopus 로고
    • Y. Xiao, H.-H Chen, B. Sun, R. Wang, S. Sethi, MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, Article ID 93830, 2006.
    • Y. Xiao, H.-H Chen, B. Sun, R. Wang, S. Sethi, MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, Article ID 93830, 2006.
  • 7
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: ACM Sensys'04, Baltimore, MD, 2004, pp. 162-175.
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: ACM Sensys'04, Baltimore, MD, 2004, pp. 162-175.
  • 9
    • 32844459414 scopus 로고    scopus 로고
    • A key predistribution scheme for sensor networks using deployment knowledge
    • Du W., Deng J., Han Y.-S., and Varshney P. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Depend. Secure Comput. 3 2 (2006) 62-77
    • (2006) IEEE Trans. Depend. Secure Comput. , vol.3 , Issue.2 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.-S.3    Varshney, P.4
  • 10
    • 36349028029 scopus 로고    scopus 로고
    • D. Liu, Q. Dong, Detecting misused keys in wireless sensor networks, in: International Performance Computing and Communications Conference (IPCCC 2007), April 2007, pp. 272-280.
    • D. Liu, Q. Dong, Detecting misused keys in wireless sensor networks, in: International Performance Computing and Communications Conference (IPCCC 2007), April 2007, pp. 272-280.
  • 11
    • 3543056512 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, in: IEEE Symposium on Security and Privacy, Oakland, CA, 2004, pp. 260-272.
    • S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, in: IEEE Symposium on Security and Privacy, Oakland, CA, 2004, pp. 260-272.
  • 12
    • 33845747795 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation in sensor networks, in: ACM CCS'06, Alexandria, VA, 2006, pp. 278-287.
    • H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation in sensor networks, in: ACM CCS'06, Alexandria, VA, 2006, pp. 278-287.
  • 13
    • 33748089962 scopus 로고    scopus 로고
    • Y. Yang, X. Wang, S. Zhu, G. Cao, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM MOBIHOC'06, Florence, Italy, May 2006, pp. 356-367.
    • Y. Yang, X. Wang, S. Zhu, G. Cao, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM MOBIHOC'06, Florence, Italy, May 2006, pp. 356-367.
  • 14
    • 33144467903 scopus 로고    scopus 로고
    • D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE IPSN'05, Los Angeles, CA, 2005, pp. 99-106.
    • D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE IPSN'05, Los Angeles, CA, 2005, pp. 99-106.
  • 15
    • 33744548460 scopus 로고    scopus 로고
    • LAD: localization anomaly detection for wireless sensor networks
    • Du W., Fang L., and Ning P. LAD: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. (JPDC) 66 7 (2006) 874-886
    • (2006) J. Parallel Distrib. Comput. (JPDC) , vol.66 , Issue.7 , pp. 874-886
    • Du, W.1    Fang, L.2    Ning, P.3
  • 16
    • 85081445075 scopus 로고    scopus 로고
    • TinyOS. Available from: .
    • TinyOS. Available from: .
  • 18
    • 84884730529 scopus 로고    scopus 로고
    • R. Blom, An optimal class of symmetric key generation schemes, Advance in Cryptography EUROCRYPT, 1985 Lecture Notes in Computer Science, vol. 209, Springer-Verlag, 198, pp. 335-338.
    • R. Blom, An optimal class of symmetric key generation schemes, Advance in Cryptography EUROCRYPT, 1985 Lecture Notes in Computer Science, vol. 209, Springer-Verlag, 198, pp. 335-338.
  • 20
    • 56749103027 scopus 로고    scopus 로고
    • B. Song, C.J. Mitchell, RFID authentication protocol for low-cost tags, in: ACM Conference on Wireless Network Security (WiSec'08), Alexandria, VA, 2008.
    • B. Song, C.J. Mitchell, RFID authentication protocol for low-cost tags, in: ACM Conference on Wireless Network Security (WiSec'08), Alexandria, VA, 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.