메뉴 건너뛰기




Volumn 5705 LNCS, Issue , 2009, Pages 289-338

Analysis of security threats, requirements, technologies and standards in ireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

REAL WORLD SETTING; REAL-WORLD APPLICATION; SECURITY MECHANISM; SECURITY TECHNOLOGY; SECURITY THREATS;

EID: 70349308780     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03829-7_10     Document Type: Conference Paper
Times cited : (103)

References (87)
  • 2
    • 0003846064 scopus 로고    scopus 로고
    • European Organization for Nuclear Research (CERN). retrieved on June
    • European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
    • (2009) The Large Hadron Collider
  • 6
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74-81 (2008)
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 8
    • 33745855808 scopus 로고    scopus 로고
    • Tampering with motes: Real-world physical attacks on wireless sensor networks
    • Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. Springer, Heidelberg
    • Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.3934, pp. 104-118. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3934 , pp. 104-118
    • Becher, A.1    Benenson, Z.2    Dornseif, M.3
  • 9
    • 70349329143 scopus 로고    scopus 로고
    • Wireless sensor networks as an asset and a liability
    • Boston USA (March
    • Goodspeed, T.: Wireless Sensor Networks as an Asset and a Liability. In: Proceedings of the SOURCE Conference, Boston, USA (March 2009)
    • (2009) Proceedings of the SOURCE Conference
    • Goodspeed, T.1
  • 12
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasure
    • Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure. Ad-Hoc Networks 1(2-3), 293-315 (2003)
    • (2003) Ad-Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 67649909548 scopus 로고    scopus 로고
    • Wireless sensor node hardware: A review
    • Lecce, Italy, October 2008
    • Healy, M., Newe, T., Lewis, E.: Wireless Sensor Node Hardware: A Review. In: Proceedings of IEEE SENSORS 2008, Lecce, Italy, October 2008, pp. 621-624 (2008)
    • (2008) Proceedings of IEEE SENSORS 2008 , pp. 621-624
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 21
    • 70350769449 scopus 로고    scopus 로고
    • Wireless sensor networks powered by ambient energy harvesting (wsn-heap) - Survey and challenges
    • Aalborg Denmark May
    • Seah, W.K.G., Eu, Z.A., Tan, H.-P.: Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges. In: Proceedings of CTIF Wireless VITAE 2009, Aalborg, Denmark (May 2009)
    • (2009) Proceedings of CTIF Wireless VITAE 2009
    • Seah, W.K.G.1    Eu, Z.A.2    Tan, H.-P.3
  • 23
    • 79951977576 scopus 로고    scopus 로고
    • Crossbow Technology. retrieved on June
    • Crossbow Technology, Inc. eKo Pro Precision Agriculture, http://www.xbow.com/eko/ (retrieved on June 2009)
    • (2009) Inc. EKo Pro Precision Agriculture
  • 24
    • 58449131864 scopus 로고    scopus 로고
    • A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Galindo, D., Roman, R., Lopez, J.: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.5339, pp. 120-132. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 120-132
    • Galindo, D.1    Roman, R.2    Lopez, J.3
  • 26
    • 45749092622 scopus 로고    scopus 로고
    • Steel, cast iron and concrete: Security engineering for real world wireless sensor networks
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Stajano, F., Cvrcek, D., Lewis, M.: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.5037, pp. 460-478. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 460-478
    • Stajano, F.1    Cvrcek, D.2    Lewis, M.3
  • 27
    • 57349193377 scopus 로고    scopus 로고
    • Applying key infrastructures for sensor networks in cip/ciip scenarios
    • López ,J. (ed.) CRITIS 2006. Springer, Heidelberg
    • Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol.4347, pp. 166-178. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4347 , pp. 166-178
    • Alcaraz, C.1    Roman, R.2
  • 28
    • 70349311163 scopus 로고    scopus 로고
    • the ECRYPT Stream Cipher Project. retrieved on June
    • ECRYPT Network of Excellence. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/ (retrieved on June 2009)
    • (2009) ECRYPT Network of Excellence. ESTREAM
  • 29
    • 0003846064 scopus 로고    scopus 로고
    • European Organization for Nuclear Research (CERN). retrieved on June
    • European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
    • (2009) LHC - The Large Hadron Collider
  • 31
    • 13944252629 scopus 로고    scopus 로고
    • Underwater acoustic sensor networks: Research challenges
    • DOI 10.1016/j.adhoc.2005.01.004, PII S1570870505000168
    • Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257-279 (2005) (Pubitemid 40266052)
    • (2005) Ad Hoc Networks , vol.3 , Issue.3 , pp. 257-279
    • Akyildiz, I.F.1    Pompili, D.2    Melodia, T.3
  • 33
    • 33747130666 scopus 로고    scopus 로고
    • Wireless underground sensor networks: Research challenges
    • Akyildiz, I.F., Stuntebeck, E.P.: Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Networks Journal 4(6), 669-686 (2006)
    • (2006) Ad Hoc Networks Journal , vol.4 , Issue.6 , pp. 669-686
    • Akyildiz, I.F.1    Stuntebeck, E.P.2
  • 34
    • 51349147226 scopus 로고    scopus 로고
    • Cross-layer packet size optimization for wireless terrestrial underwater and underground sensor networks
    • Phoenix USA April 2008
    • Vuran, M.C., Akyildiz, I.F.: Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 226-230 (2008)
    • (2008) Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008) , pp. 226-230
    • Vuran, M.C.1    Akyildiz, I.F.2
  • 36
    • 47249147507 scopus 로고    scopus 로고
    • A study of implanted and wearable body sensor networks
    • Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. Springer, Heidelberg
    • Ullah, S., Higgin, H., Siddiqui, M.A., Kwak, K.S.: A Study of Implanted and Wearable Body Sensor Networks. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS, vol.4953, pp. 464-473. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4953 , pp. 464-473
    • Ullah, S.1    Higgin, H.2    Siddiqui, M.A.3    Kwak, K.S.4
  • 37
    • 37249066703 scopus 로고    scopus 로고
    • Wireless multimedia sensor networks: A survey
    • DOI 10.1109/MWC.2007.4407225
    • Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14(6), 32-39 (2007) (Pubitemid 350281212)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.6 , pp. 32-39
    • Akyildiz, I.F.1    Melodia, T.2    Chowdury, K.R.3
  • 40
    • 77954290382 scopus 로고    scopus 로고
    • On the Hardware implementation e.ciency of cryptographic primitives
    • IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • Roman, R., Alcaraz, C., Sklavos, N.: On the Hardware Implementation E.ciency of Cryptographic Primitives. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • On Wireless Sensor Network Security
    • Roman, R.1    Alcaraz, C.2    Sklavos, N.3
  • 43
    • 2942557845 scopus 로고    scopus 로고
    • Analysis of the stream cipher RC4
    • Master's Thesis
    • Mantin, I.: Analysis of the Stream Cipher RC4. Master's Thesis, Weizmann Institute of Science (2001)
    • (2001) Weizmann Institute of Science
    • Mantin, I.1
  • 46
    • 68149165367 scopus 로고    scopus 로고
    • TinyECCK: E.cient elliptic curve cryptography implementation over GF(2m) on 8-bit MICAz Mote
    • Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: E.cient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IEICE Transactions on Info and Systems E91-D(5), 1338-1347 (2008)
    • (2008) IEICE Transactions on Info and Systems , vol.E91-D , Issue.5 , pp. 1338-1347
    • Seo, S.C.1    Han, D.-G.2    Kim, H.C.3    Hong, S.4
  • 50
    • 70349327286 scopus 로고    scopus 로고
    • retrieved on June
    • NIST hash function competition, http://www.nist.gov/hash-competition (retrieved on June 2009)
    • (2009) NIST Hash Function Competition
  • 53
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2), 346-358 (2007)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.2 , pp. 346-358
    • Camtepe, S.A.1    Yener, B.2
  • 56
    • 45849124595 scopus 로고    scopus 로고
    • SAKE: Software attestation for key establishment in sensor networks
    • Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. Springer, Heidelberg
    • Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol.5067, pp. 372-385. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5067 , pp. 372-385
    • Seshadri, A.1    Luk, M.2    Perrig, A.3
  • 58
    • 70349312266 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks
    • IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • Acs, G., Buttyan, L.: Secure Routing in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • On Wireless Sensor Network Security
    • Acs, G.1    Buttyan, L.2
  • 59
    • 50949122471 scopus 로고    scopus 로고
    • Routing Over Low power and Lossy networks (ROLL) Working Group. retrieved on June
    • Routing Over Low power and Lossy networks (ROLL) Working Group. Internet Engineering Task Force (IETF), http://www.ietf.org/html.charters/roll-charter. html (retrieved on June 2009)
    • (2009) Internet Engineering Task Force
  • 61
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • Article in press
    • Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.comnet.2009.02.023
    • (2009) Computer Networks (Elsevier)
    • Ozdemir, S.1    Xiao, Y.2
  • 62
    • 36849045793 scopus 로고    scopus 로고
    • Secure time synchronization protocols for wireless sensor networks
    • DOI 10.1109/MWC.2007.4396944
    • Boukerche, A., Turgut, D.: Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14(5), 64-69 (2007) (Pubitemid 350231655)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 64-69
    • Boukerche, A.1    Turgut, D.2
  • 63
    • 67249114800 scopus 로고    scopus 로고
    • Securing time-synchronization protocols in sensor networks: Attack detection and Self-healing
    • Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008
    • Yang, Y., Sun, Y.: Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing. In: Proceedings of the IEEE 2008 Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008, pp. 1-6 (2008)
    • (2008) Proceedings of the IEEE 2008 , pp. 1-6
    • Yang, Y.1    Sun, Y.2
  • 66
    • 42649108774 scopus 로고    scopus 로고
    • Situation awareness mechanisms for wireless sensor networks
    • Roman, R., Lopez, J., Gritzalis, S.: Situation Awareness Mechanisms for Wireless Sensor Networks. IEEE Communications Magazine 46(4), 102-107 (2008)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 102-107
    • Roman, R.1    Lopez, J.2    Gritzalis, S.3
  • 68
    • 70349305011 scopus 로고    scopus 로고
    • Trust establishment in sensor networks: Behaviour-based, certi.cate-based and a combinational approach
    • Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: Behaviour-based, certi.cate-based and a combinational approach. International Journal System of Systems Engineering 1(1/2), 128-148 (2008)
    • (2008) International Journal System of Systems Engineering , vol.1 , Issue.1-2 , pp. 128-148
    • Aivaloglou, E.1    Gritzalis, S.2    Skianis, C.3
  • 70
    • 67650461985 scopus 로고    scopus 로고
    • Privacy preservation in wireless sensor networks: A state-of-the-art survey
    • Article in press
    • Na, L., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey. Ad Hoc Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.adhoc.2009.04.009
    • (2009) Ad Hoc Networks (Elsevier)
    • Na, L.1    Zhang, N.2    Das, S.K.3    Thuraisingham, B.4
  • 71
    • 70349306156 scopus 로고    scopus 로고
    • Remote attestation - Identi.cation
    • IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • Yasinsac, A.: Remote Attestation - Identi.cation. On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
    • On Wireless Sensor Network Security
    • Yasinsac, A.1
  • 73
    • 69949163899 scopus 로고    scopus 로고
    • Physical-layer identi.cation of wireless sensor nodes
    • ETH Zürich System Security Group D-INFK August
    • Danev, B., Capkun, S.: Physical-layer Identi.cation of Wireless Sensor Nodes. Technical Reports 604, ETH Zürich, System Security Group D-INFK (August 2008)
    • (2008) Technical Reports 604
    • Danev, B.1    Capkun, S.2
  • 75
    • 70349303101 scopus 로고    scopus 로고
    • retrieved on June
    • ZigBee Alliance, http://www.zigbee.org/ (retrieved on June 2009)
    • (2009)
  • 76
    • 70349319262 scopus 로고    scopus 로고
    • retrieved on June
    • HART Communication, http://www.hartcomm2.org (retrieved on June 2009)
    • (2009)
  • 81
    • 70349319264 scopus 로고    scopus 로고
    • DNP Users Group. retrieved on June
    • DNP3. DNP Users Group, http://www.dnp.org (retrieved on June 2009)
    • (2009)
  • 83
    • 70349308100 scopus 로고    scopus 로고
    • retrieved on June
    • PI Pro.bus - Pro.net, http://www.profibus.com (retrieved on June 2009)
    • (2009)
  • 84
    • 70349311176 scopus 로고    scopus 로고
    • retrieved on June
    • Fieldbus Foundation, http://www.fieldbus.org (retrieved on June 2009)
    • (2009)
  • 86
    • 33646771783 scopus 로고    scopus 로고
    • The Internet of Things
    • International Telecommunication Union
    • International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)
    • (2005) ITU Internet Reports
  • 87
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the internet: A security analysis
    • Roman, R., Lopez, J.: Integrating Wireless Sensor Networks and the Internet: A Security Analysis. Internet Research 19(2), 246-259 (2009)
    • (2009) Internet Research , vol.19 , Issue.2 , pp. 246-259
    • Roman, R.1    Lopez, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.