메뉴 건너뛰기




Volumn 8, Issue 12, 2008, Pages 7753-7782

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Author keywords

Deployment knowledge; Key management; Secure routing; Sensor networks; Sink mobility

Indexed keywords

COMMUNICATION OVERHEADS; DEPLOYMENT KNOWLEDGE; KEY MANAGEMENT; LARGE SCALE SENSOR NETWORK; SECURE ROUTING; SELECTIVE FORWARDING ATTACKS; SENSOR NETWORK APPLICATIONS; SINK MOBILITY;

EID: 58149190051     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s8127753     Document Type: Article
Times cited : (9)

References (31)
  • 1
    • 33646589837 scopus 로고    scopus 로고
    • An Application-Specific Protocol Architecture for Wireless Microsensor Networks
    • Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wireless Commun. 2002, 1, 660-670.
    • (2002) IEEE Trans. Wireless Commun , vol.1 , pp. 660-670
    • Heinzelman, W.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 2
    • 33751088577 scopus 로고    scopus 로고
    • Yin, J.; Madria, S.K. SecRout: A Secure Routing Protocol for Sensor Networks. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA), Vienna, Austria, April 2006; pp. 393-398.
    • Yin, J.; Madria, S.K. SecRout: A Secure Routing Protocol for Sensor Networks. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA), Vienna, Austria, April 2006; pp. 393-398.
  • 3
    • 34548042955 scopus 로고    scopus 로고
    • Nasser, N.; Chen, Y. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput. Commun. 2007, 30, 2401-2412.
    • Nasser, N.; Chen, Y. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput. Commun. 2007, 30, 2401-2412.
  • 4
    • 33751183522 scopus 로고    scopus 로고
    • Lee, S.B; Choi, Y.H. A secure alternate path routing in sensor networks. Comput Commun. 2006, 30, 153-165.
    • Lee, S.B; Choi, Y.H. A secure alternate path routing in sensor networks. Comput Commun. 2006, 30, 153-165.
  • 8
    • 2442529460 scopus 로고    scopus 로고
    • GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks
    • Ye, F., Zhong, G.; Lu, S.; Zhang, L. GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks. Wireless Netw. 2005, 11, 285-298.
    • (2005) Wireless Netw , vol.11 , pp. 285-298
    • Ye, F.1    Zhong, G.2    Lu, S.3    Zhang, L.4
  • 9
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54-62.
    • (2002) Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 11
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • Technical Report TR013 84, Department of Computer Science, Rice University, June
    • Hu, Y.-C.; Perrig, A.; Johnson, D.B. Wormhole detection in wireless ad hoc networks. Technical Report TR013 84, Department of Computer Science, Rice University, June 2002.
    • (2002)
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 77952655038 scopus 로고    scopus 로고
    • Hung L.X.; Lee S.Y.; Lee Y.-K; Lee H.J. SCODE: A Secure Coordination-based Data Dissemination to Mobile Sinks in Wireless Sensor Networks. IEICE Trans. Commun. 2009, E92-B(01).
    • Hung L.X.; Lee S.Y.; Lee Y.-K; Lee H.J. SCODE: A Secure Coordination-based Data Dissemination to Mobile Sinks in Wireless Sensor Networks. IEICE Trans. Commun. 2009, E92-B(01).
  • 13
    • 11244264140 scopus 로고    scopus 로고
    • Lazos, L.; Poovendran, R. SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of ACM Workshop on Wireless Security, PA, USA, October 2004; pp. 21-30.
    • Lazos, L.; Poovendran, R. SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of ACM Workshop on Wireless Security, PA, USA, October 2004; pp. 21-30.
  • 14
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
    • Zhu, S.; Setia, S.; Jajodia, S. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Trans. Sens. Netw. 2006, 2, 500-528.
    • (2006) ACM Trans. Sens. Netw , vol.2 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 17
    • 17444376044 scopus 로고    scopus 로고
    • A two-tier data dissemination model for large-scale wireless sensor networks
    • Ye, F.; Luo, H.; Cheng, J.; Lu, S.; Zhang, L. TTDD: A two-tier data dissemination model for large-scale wireless sensor networks. Wirel. Netw. 2005, 11, 161-175.
    • (2005) Wirel. Netw , vol.11 , pp. 161-175
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang5    TTDD, L.6
  • 19
    • 26444574670 scopus 로고    scopus 로고
    • Karlof, C.; Sastry, N.; Dagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04), Baltimore, Maryland, November 2004; pp. 162-175.
    • Karlof, C.; Sastry, N.; Dagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04), Baltimore, Maryland, November 2004; pp. 162-175.
  • 21
    • 84876611098 scopus 로고    scopus 로고
    • NS-2;
    • NS-2; http://www.isi.edu/nsnam/ns/.
  • 22
    • 4143054544 scopus 로고    scopus 로고
    • Xue, Q.; Ganz, A. Runtime security composition for sensor networks. In Proceedings of IEEE Vehicular Technology Conference, FL, USA, October 2003; pp. 105-111.
    • Xue, Q.; Ganz, A. Runtime security composition for sensor networks. In Proceedings of IEEE Vehicular Technology Conference, FL, USA, October 2003; pp. 105-111.
  • 23
    • 35448965082 scopus 로고    scopus 로고
    • Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
    • Du, X.J.; Guizani, M.; Xiao, Y.; Chen, H.H. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks. IEEE Trans. Wireless Commun. 2007, 6, 3395-3401.
    • (2007) IEEE Trans. Wireless Commun , vol.6 , pp. 3395-3401
    • Du, X.J.1    Guizani, M.2    Xiao, Y.3    Chen, H.H.4
  • 27
    • 84866860550 scopus 로고    scopus 로고
    • Improving Key Predistribution with Deployment Knowledge in Static Sensor Networks
    • Liu, D.; Ning, P. Improving Key Predistribution with Deployment Knowledge in Static Sensor Networks. ACM Trans. Sens. Netw. 2005, 1, 204-239.
    • (2005) ACM Trans. Sens. Netw , vol.1 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 28
    • 32844459414 scopus 로고    scopus 로고
    • A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
    • Du, W.; Deng, J.; Han, Y.; Varshney, P. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Depend. Secure 2006, 3, 62-77.
    • (2006) IEEE Trans. Depend. Secure , vol.3 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 31
    • 0036739784 scopus 로고    scopus 로고
    • Chen, B.; Jamieson, K.; Balakrishnan, H.; Morris, R. Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw. 2002, 8, 481-494.
    • Chen, B.; Jamieson, K.; Balakrishnan, H.; Morris, R. Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw. 2002, 8, 481-494.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.