메뉴 건너뛰기




Volumn 11, Issue 2, 2009, Pages 52-73

Sensor network security: A survey

Author keywords

Ad hoc networks; Attack detections and preventions; Key management; Node compromise; Secure data aggregation; Secure location; Secure routing; Security; Sensor networks; Survey

Indexed keywords

ATTACK DETECTIONS AND PREVENTIONS; KEY MANAGEMENT; NODE COMPROMISE; SECURE DATA AGGREGATION; SECURE LOCATION; SECURE ROUTING; SECURITY;

EID: 67650844989     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2009.090205     Document Type: Article
Times cited : (479)

References (152)
  • 6
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Commun. Mag., vol. 11, pp. 38-43, 2004.
    • (2004) IEEE Commun. Mag , vol.11 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 7
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • D. Djenouri, L. Khelladi, and N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Commun. Surveys Tutorials, vol. 7, pp. 2-28, 2005.
    • (2005) IEEE Commun. Surveys Tutorials , vol.7 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, N.3
  • 11
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches. for distributed sensor network security,
    • 00-010, 2000
    • D. W. Carman, P. S. Kruus, and B. J. Matt, "Constraints and approaches. for distributed sensor network security," NAI Labs Technical Report 00-010, 2000.
    • NAI Labs Technical Report
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 12
    • 4243082091 scopus 로고    scopus 로고
    • A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor. networks, Commun. ACM, Special Issue: Wireless sensor networks, 47, pp. 53-57, 2004.
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor. networks," Commun. ACM, Special Issue: Wireless sensor networks, vol. 47, pp. 53-57, 2004.
  • 13
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 18
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, pp. 293-315, 2003.
    • (2003) Elsevier's AdHoc Networks Journal , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 19
    • 1542376949 scopus 로고    scopus 로고
    • P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, 2003, pp. 151-159.
    • P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, 2003, pp. 151-159.
  • 22
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Y. W. Law, J. Doumen, and P. Hartel,"Survey and benchmark of block ciphers for wireless sensor networks," ACM Trans. Sensor Networks, vol. 2, pp. 65-93, 2006.
    • (2006) ACM Trans. Sensor Networks , vol.2 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 26
    • 67650874311 scopus 로고    scopus 로고
    • G. Gaubatz, J.-P. Kaps, and B. Sunar, Public key cryptography in sensor networks-revisited, in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
    • G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public key cryptography in sensor networks-revisited," in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
  • 27
    • 1542317846 scopus 로고    scopus 로고
    • An authentication framework for hierarchical ad hoc sensor networks
    • M. Bohge and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks," in Proc. ACM Workshop Wireless Security, 2003, pp. 79-87
    • (2003) Proc. ACM Workshop Wireless Security , pp. 79-87
    • Bohge, M.1    Trappe, W.2
  • 31
    • 67650919170 scopus 로고    scopus 로고
    • I. C. Technology, MICA2: Wireless Measurement System.
    • I. C. Technology, "MICA2: Wireless Measurement System."
  • 32
    • 67650919171 scopus 로고    scopus 로고
    • S. A. Camtepe and B. Yener, Key distribution mechanisms for wireless sensor networks: A survey, Computer Science Department at RPI Tech, Rep. TR-05-07, 2005.
    • S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: A survey," Computer Science Department at RPI Tech, Rep. TR-05-07, 2005.
  • 35
  • 36
    • 39049083533 scopus 로고    scopus 로고
    • Threshold key-establishment in distributed sensor networks using a multivariate scheme
    • F. Delgosha and F. Fekri, "Threshold key-establishment in distributed sensor networks using a multivariate scheme," in Proc. IEEE INFO-COM, 2006.
    • (2006) Proc. IEEE INFO-COM
    • Delgosha, F.1    Fekri, F.2
  • 39
    • 34247388513 scopus 로고    scopus 로고
    • Location dependent key management using random key-predistribution in sensor networks
    • F. Anjum, "Location dependent key management using random key-predistribution in sensor networks," in Proc. 5th ACM Workshop on Wireless Security, 2006, pp. 21-30
    • (2006) Proc. 5th ACM Workshop on Wireless Security , pp. 21-30
    • Anjum, F.1
  • 40
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proc. IEEE INFOCOM, 2004
    • (2004) Proc. IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 44
    • 41449118287 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment
    • H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment," in Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Chan, H.1    Perrig, A.2
  • 45
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor hetworks
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor hetworks," in Proc. 10th ACM Conf. Computer Commun. Security, 2003 pp. 62-72.
    • (2003) Proc. 10th ACM Conf. Computer Commun. Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 46
    • 39049087772 scopus 로고    scopus 로고
    • Supporting secure communication and data collection in mobile sensor networks
    • L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networks," in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Zhou, L.1    Ni, J.2    Ravishankar, C.V.3
  • 48
    • 24944550584 scopus 로고    scopus 로고
    • A combinatorial approach to key predistribu-tion for distributed sensor networks
    • J. Lee and D. R. Stinson, "A combinatorial approach to key predistribu-tion for distributed sensor networks," in Proc. IEEE Wireless Commun. Networking Conf., 2005, vol. 2, pp. 1200-1205.
    • (2005) Proc. IEEE Wireless Commun. Networking Conf , vol.2 , pp. 1200-1205
    • Lee, J.1    Stinson, D.R.2
  • 50
    • 3142656746 scopus 로고    scopus 로고
    • A decentralized approach to secure group membership testing in distributed sensor networks
    • J. Zachary, "A decentralized approach to secure group membership testing in distributed sensor networks," in Proc. IEEE Military Commun. Conf., 2003.
    • (2003) Proc. IEEE Military Commun. Conf
    • Zachary, J.1
  • 51
    • 36349017874 scopus 로고    scopus 로고
    • Improved self-healing key distribution with revocation in wireless sensor network
    • R. Dutta and S. Mukhopadhyay, "Improved self-healing key distribution with revocation in wireless sensor network," in Proc. IEEE Wireless Commun. Networking Con.(WCNC), 2007, pp. 2963-2968.
    • (2007) Proc. IEEE Wireless Commun. Networking Con.(WCNC) , pp. 2963-2968
    • Dutta, R.1    Mukhopadhyay, S.2
  • 53
    • 25844530844 scopus 로고    scopus 로고
    • New constructions on broadcast encryption and key pre-distribution schemes
    • C.-H. Huang and D. Du, "New constructions on broadcast encryption and key pre-distribution schemes," in Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Huang, C.-H.1    Du, D.2
  • 54
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach," in Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Zhang, W.1    Cao, G.2
  • 56
    • 39049089652 scopus 로고    scopus 로고
    • Leveraging channel diversity for key establishment in wireless sensor networks
    • M. J. Miller and N. H. Vaidya, "Leveraging channel diversity for key establishment in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Miller, M.J.1    Vaidya, N.H.2
  • 61
    • 33646921841 scopus 로고    scopus 로고
    • Location-aware combinatorial key management scheme for clustered sensor networks
    • M. F. Younis, K. Ghumman, and M. Eltoweissy, "Location-aware combinatorial key management scheme for clustered sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 17, pp. 865-882, 2006.
    • (2006) IEEE Trans. Parallel Distrib. Syst , vol.17 , pp. 865-882
    • Younis, M.F.1    Ghumman, K.2    Eltoweissy, M.3
  • 67
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • New York: Springer-Verlag
    • R. Blom, "An optimal class of symmetric key generation systems," in Proc. EUROCRYPT 84 Workshop Advances Cryptology. New York: Springer-Verlag 1985, pp. 335-338.
    • (1985) Proc. EUROCRYPT 84 Workshop Advances Cryptology , pp. 335-338
    • Blom, R.1
  • 70
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFO-COM, 2003.
    • (2003) Proc. IEEE INFO-COM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 73
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1307-1315.
    • (2007) Proc. IEEE INFOCOM , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 76
    • 3142751481 scopus 로고    scopus 로고
    • On supporting distributed collaboration in sensor networks
    • G. Wang, W. Zhang, and G. Cao, "On supporting distributed collaboration in sensor networks," in Proc. IEEE Military Communi. Conf., 2003, vol. 2, pp. 752-757.
    • (2003) Proc. IEEE Military Communi. Conf , vol.2 , pp. 752-757
    • Wang, G.1    Zhang, W.2    Cao, G.3
  • 78
    • 25844521520 scopus 로고    scopus 로고
    • Localized fault-tolerant event boundary detection in sensor networks
    • M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks," in Proc. IEEE INFO-COM, 2005, vol. 2, pp. 902-913
    • (2005) Proc. IEEE INFO-COM , vol.2 , pp. 902-913
    • Ding, M.1    Chen, D.2    Xing, K.3    Cheng, X.4
  • 79
    • 1842478856 scopus 로고    scopus 로고
    • Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks
    • B. Krishnamachari and S. Iyengar, "Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks," IEEE Trans. Comput., vol. 53, pp. 241-250, 2004.
    • (2004) IEEE Trans. Comput , vol.53 , pp. 241-250
    • Krishnamachari, B.1    Iyengar, S.2
  • 81
    • 34548364110 scopus 로고    scopus 로고
    • Insider attacker detection in wireless sensor networks
    • F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1937-1945.
    • (2007) Proc. IEEE INFOCOM , pp. 1937-1945
    • Liu, F.1    Cheng, X.2    Chen, D.3
  • 82
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Advanced Commun. Multimedia Security, 2002, pp. 107-121.
    • (2002) Proc. Advanced Commun. Multimedia Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 87
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks," in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1987-1997
    • (2003) Proc. IEEE INFOCOM , vol.3 , pp. 1987-1997
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 90
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • IBM T. J. Watson Research Center
    • R. Sailer, X. Zhang, T. Jaeger, and L. v. Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. 13th USENIX Security Symposium, vol. 13, IBM T. J. Watson Research Center, 2004.
    • (2004) Proc. 13th USENIX Security Symposium , vol.13
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Doorn, L.V.4
  • 91
    • 50249183144 scopus 로고    scopus 로고
    • Detecting node compromise in hybrid wireless sensor networks Using attestation techniques
    • Springer: Berlin/Heidelberg
    • C. Krauss, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks Using attestation techniques," in Proc. Security and Privacy in Ad-hoc and Sensor Networks, vol. 4572/2007. Springer: Berlin/Heidelberg, 2007.
    • (2007) Proc. Security and Privacy in Ad-hoc and Sensor Networks , vol.4572
    • Krauss, C.1    Stumpf, F.2    Eckert, C.3
  • 95
    • 0035178273 scopus 로고    scopus 로고
    • Security enhancements in AODV protocol for wireless ad hoc networks
    • S. Bhargava and D. P. Agrawal, "Security enhancements in AODV protocol for wireless ad hoc networks," in Proc. 54th IEEE Vehicular Technology Conference, 2001, vol. 4, pp. 2143-2147.
    • (2001) Proc. 54th IEEE Vehicular Technology Conference , vol.4 , pp. 2143-2147
    • Bhargava, S.1    Agrawal, D.P.2
  • 96
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Networking, vol. 12, pp. 1049-1063, 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 101
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra, "INSENS: Intrusion-tolerant routing in wireless sensor networks," Computer Commun., vol. 29, pp. 216-230 2006.
    • (2006) Computer Commun , vol.29 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 108
    • 14344254253 scopus 로고    scopus 로고
    • A secure hierarchical model for sensor network
    • M. Tubaishat, J. Yin, B. Panja, and S. Madria, "A secure hierarchical model for sensor network," ACM SIGMOD Record, vol. 33, pp. 7-13, 2004.
    • (2004) ACM SIGMOD Record , vol.33 , pp. 7-13
    • Tubaishat, M.1    Yin, J.2    Panja, B.3    Madria, S.4
  • 109
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. 10th Annual Network Distributed System Security Symposium (NDSS), 2003, pp. 263-276.
    • (2003) Proc. 10th Annual Network Distributed System Security Symposium (NDSS) , pp. 263-276
    • Liu, D.1    Ning, P.2
  • 111
    • 36348949279 scopus 로고    scopus 로고
    • Route recovery with one-hop broadcast to bypass compromised nodes in wireless sensor networks
    • D. An and H. Cam, "Route recovery with one-hop broadcast to bypass compromised nodes in wireless sensor networks," in Proc. IEEE Wireless Commun. Networking Conf. (WCNC), 2007, pp. 2495-2500.
    • (2007) Proc. IEEE Wireless Commun. Networking Conf. (WCNC) , pp. 2495-2500
    • An, D.1    Cam, H.2
  • 112
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1955-1963.
    • (2007) Proc. IEEE INFOCOM , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 114
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. INFOCOM, 2005, vol. 3, pp. 1917-1928
    • (2005) Proc. INFOCOM , vol.3 , pp. 1917-1928
    • Capkun, S.1    Hubaux, J.-P.2
  • 115
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proc. 3rd ACM Workshop Wireless Security, 2004, pp. 21-30.
    • (2004) Proc. 3rd ACM Workshop Wireless Security , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 118
  • 120
    • 34548329877 scopus 로고    scopus 로고
    • Detecting phantom nodes in wireless sensor networks
    • J. Hwang, T. He, and Y. Kim, "Detecting phantom nodes in wireless sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 2391-2395.
    • (2007) Proc. IEEE INFOCOM , pp. 2391-2395
    • Hwang, J.1    He, T.2    Kim, Y.3
  • 123
    • 25844493197 scopus 로고    scopus 로고
    • A beacon-less location discovery scheme for wireless sensor networks
    • L. Fang, W. Du, and P. Ning, "A beacon-less location discovery scheme for wireless sensor networks," in Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Fang, L.1    Du, W.2    Ning, P.3
  • 128
    • 0842332407 scopus 로고    scopus 로고
    • A witness-based approach for data fusion assurance in wireless sensor networks
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A witness-based approach for data fusion assurance in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., 2003, vol. 3, pp. 1435-1439
    • (2003) Proc. IEEE Global Telecommun. Conf , vol.3 , pp. 1435-1439
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 130
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in Proc. IEEE Symposium Security Privacy, 2004, pp. 259-271.
    • (2004) Proc. IEEE Symposium Security Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 132
    • 38549177436 scopus 로고    scopus 로고
    • A dynamic en-route scheme for filtering false data injection in wireless sensor networks
    • Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data injection in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Yu, Z.1    Guan, Y.2
  • 133
    • 17144429277 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE J. Select. Areas Commun., vol. 23, pp. 839-850, 2005.
    • (2005) IEEE J. Select. Areas Commun , vol.23 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 135
    • 34547354244 scopus 로고    scopus 로고
    • CDA: Concealed data aggregation in wireless sensor networks
    • J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed data aggregation in wireless sensor networks," in Proc. ACM WiSe, 2004.
    • (2004) Proc. ACM WiSe
    • Girao, J.1    Westhoff, D.2    Schneider, M.3
  • 137
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism" in Proc. Information Security Conf., 2002, pp. 471-483.
    • (2002) Proc. Information Security Conf , pp. 471-483
    • Domingo-Ferrer, J.1
  • 146
    • 33751075757 scopus 로고    scopus 로고
    • Survivability in wireless sensor networks
    • G. W. Skelton and A. Holton, "Survivability in wireless sensor networks," in Proc. IEEE SoutheastCon, 2006, pp. 341-341.
    • (2006) Proc. IEEE SoutheastCon , pp. 341-341
    • Skelton, G.W.1    Holton, A.2
  • 147
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 149
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 150
    • 34548302064 scopus 로고    scopus 로고
    • pDCS: Security and privacy support for data-centric sensor networks
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in Proc. IEEE INFOCOM, 2007, pp. 1298-1306.
    • (2007) Proc. IEEE INFOCOM , pp. 1298-1306
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 151
    • 0041165532 scopus 로고    scopus 로고
    • Euclidean steiner minimum trees: An improved exact algorithm
    • P. Winter and M. Zachariasen, "Euclidean steiner minimum trees: An improved exact algorithm," Networks, vol. 30, pp. 149-166, 1997.
    • (1997) Networks , vol.30 , pp. 149-166
    • Winter, P.1    Zachariasen, M.2
  • 152
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.