메뉴 건너뛰기




Volumn 10, Issue 3, 2008, Pages 6-28

Securing wireless sensor networks: A survey

Author keywords

[No Author keywords available]

Indexed keywords

LOW-COST SENSORS; MALICIOUS ATTACK; MANUFACTURING TECHNOLOGIES; MILITARY SCENARIOS; RESOURCE LIMITATIONS; SALIENT FEATURES; SOFTWARE ALGORITHMS; WIRELESS COMMUNICATIONS;

EID: 70350692585     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2008.4625802     Document Type: Article
Times cited : (363)

References (160)
  • 1
    • 0036688074 scopus 로고    scopus 로고
    • A Survey on Sensor Networks
    • Aug.
    • F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-14.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.8 , pp. 102-114
    • Akyildiz, F.1
  • 3
    • 0345851235 scopus 로고    scopus 로고
    • Wireless Integrated Network Sensors
    • May
    • G. J. Pottie and W. J. Kaiser, "Wireless Integrated Network Sensors," Commun. ACM, vol. 43, no. 5, May 2000, pp. 51-58.
    • (2000) Commun. ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 4
    • 84880503042 scopus 로고    scopus 로고
    • Crossbow Technology
    • Crossbow Technology; http://www.xbow.com/, 2006.
    • (2006)
  • 5
    • 84880454028 scopus 로고    scopus 로고
    • Atmel Corporation; http://www.atmel.com/, 2006.
    • (2006)
  • 7
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct.
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Mag., vol. 35, no. 10, Oct. 2002, pp. 54-62.
    • (2002) IEEE Computer Mag. , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 8
    • 4243082091 scopus 로고    scopus 로고
    • Security in Wireless Sensor Networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Commun. ACM, vol. 47, no. 6, June 2004, pp. 53-57.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 9
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Dec
    • E. Shi and A. Perrig, "Designing Secure Sensor Networks," IEEE Wireless Commun. Mag., vol. 11, no. 6, Dec 2004, pp. 38-43.
    • (2004) IEEE Wireless Commun. Mag. , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 10
    • 10644250089 scopus 로고    scopus 로고
    • Security Considerations in Ad Hoc Sensor Networks
    • F. Hu and N. K. Sharma, "Security Considerations in Ad Hoc Sensor Networks," Elsevier Ad Hoc Networks, vol. 3, no. 1, 2005, pp. 69-89.
    • (2005) Elsevier Ad Hoc Networks , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.K.2
  • 12
    • 36349021963 scopus 로고    scopus 로고
    • Security for Wireless Sensor Networks: Overview
    • Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
    • S. Avancha et al., "Security for Wireless Sensor Networks: Overview," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
    • (2004) Wireless Sensor Networks
    • Avancha, S.1
  • 13
    • 36349021963 scopus 로고    scopus 로고
    • Security for Sensor Networks: Key Management
    • Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
    • H. Chan and A. Perrig, "Security for Sensor Networks: Key Management," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
    • (2004) Wireless Sensor Networks
    • Chan, H.1    Perrig, A.2
  • 14
    • 62549136217 scopus 로고    scopus 로고
    • Security in Sensor Networks: Watermarking Techniques
    • Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
    • J. Wong et al., "Security in Sensor Networks: Watermarking Techniques," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
    • (2004) Wireless Sensor Networks
    • Wong, J.1
  • 16
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Oct.
    • C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Sys. Tech. J., vol. 28, Oct. 1949, pp. 656-715.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 17
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Info. Theory, vol. IT-22, no. 6, 1976, pp. 644-54.
    • (1976) IEEE Trans. Info. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 18
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Commun. ACM, vol. 21, no. 2, Feb. 1978, pp. 120-26. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensor Networks
    • Sept.
    • A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," ACM Wireless Networks, vol. 8, no. 5, Sept. 2002, pp. 521-34.
    • (2002) ACM Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 23
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • Advances in Cryptology: Proc. EUROCRYPT'84, Springer-Verlag
    • R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. EUROCRYPT'84, Lecture Notes in Computer Science, Springer-Verlag, vol. 209, 1985, pp. 335-38.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • Blom, R.1
  • 24
    • 85028765277 scopus 로고
    • Perfectly Secure Key Distribution for Dynamic Conferences
    • Advances in Cryptology: Proc. CRYPTO' 92, Springer-Verlag
    • C. Blundo et al., "Perfectly Secure Key Distribution for Dynamic Conferences," Advances in Cryptology: Proc. CRYPTO' 92, Lecture Notes in Computer Science, Springer-Verlag, vol. 740, 1992, pp. 471-86.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • Blundo, C.1
  • 26
    • 14844287958 scopus 로고    scopus 로고
    • The Strange Logic of Random Graphs
    • Springer-Verlag
    • J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag 2000.
    • (2000) Algorithms and Combinatorics , vol.22
    • Spencer, J.1
  • 33
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic Key Pre-Distribution Schemes for Distributed Sensor Networks
    • Proc. 11th Int'l. Wksp. Selected Areas in Cryptography (SAC'04), Springer-Verlag
    • J. Lee and D. R. Stinson, "Deterministic Key Pre-Distribution Schemes for Distributed Sensor Networks," Proc. 11th Int'l. Wksp. Selected Areas in Cryptography (SAC'04), Lecture Notes in Computer Science, Springer-Verlag, vol. 3357/2004, 2004, pp. 294-307.
    • (2004) Lecture Notes in Computer Science , vol.3357 , Issue.2004 , pp. 294-307
    • Lee, J.1    Stinson, D.R.2
  • 38
    • 37049001818 scopus 로고    scopus 로고
    • Scalable and Deterministic Key Agreement for Large Scale Networks
    • Nov.
    • Y. Zhou and Y. Fang, "Scalable and Deterministic Key Agreement for Large Scale Networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, Nov. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11
    • Zhou, Y.1    Fang, Y.2
  • 40
  • 50
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • DOI 10.1109/TMC.2007.1008
    • Y. Zhou and Y. Fang, "A Two-Layer Key Establishment Scheme for Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 9, Sept. 2007, pp. 1009-20. (Pubitemid 47171282)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 64
    • 23944459661 scopus 로고    scopus 로고
    • Public Key Cryptography in Sensor Networks - Revisited
    • Proc. 1st European Wksp. Security in Ad Hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, Aug. 2004, Revised Selected Papers, Springer-Verlag
    • G. Gaubatz, J. Kaps, and B. Sunar, "Public Key Cryptography in Sensor Networks - Revisited," Proc. 1st European Wksp. Security in Ad Hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, Aug. 2004, Revised Selected Papers, Lecture Notes in Computer Science, Springer-Verlag, vol. 3313/2005, 2005, pp. 2-18.
    • (2005) Lecture Notes in Computer Science , vol.3313 , Issue.2005 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.2    Sunar, B.3
  • 66
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A Ring-Based Public Key Cryptosystem
    • Proc. ANTS III, Springer-Verlag
    • J. Hoffstein, J. Pipher, and J. H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Proc. ANTS III, Lecture Notes in Computer Science, Springer-Verlag, vol. 1423/1998, 1998, pp. 267-88.
    • (1998) Lecture Notes in Computer Science , vol.1423 , Issue.1998 , pp. 267-288
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.H.3
  • 67
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, 1987, pp. 203-9.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 68
    • 85015402934 scopus 로고
    • Uses of Elliptic Curves in Cryptography
    • Proc. Advances in Cryptology - CRYPTO'85, Springer-Verlag
    • V. Miller, "Uses of Elliptic Curves in Cryptography," Proc. Advances in Cryptology - CRYPTO'85, Lecture Notes in Computer Science, Springer-Verlag, vol. 218, 1986, pp. 417-26.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 70
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • Proc. 6th Int'l. Wksp. Cryptographic Hardware and Embedded Systems (CHES'04), Springer-Verlag
    • N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int'l. Wksp. Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes in Computer Science, Springer-Verlag, vol. 3156/2004, 2004, pp. 119-32.
    • (2004) Lecture Notes in Computer Science , vol.3156 , Issue.2004 , pp. 119-132
    • Gura, N.1
  • 72
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
    • Y. Zhou, Y. Zhang, and Y. Fang, "Access Control in Wireless Sensor Networks," Elsevier Ad Hoc Networks Journal, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, 2007, pp. 3-13. (Pubitemid 44573007)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3
  • 73
    • 84976770858 scopus 로고
    • Responses to NIST's Proposal
    • July
    • S. Vanstone, "Responses to NIST's Proposal," Commun. ACM, vol. 35, July 1992, pp. 50-52.
    • (1992) Commun. ACM , vol.35 , pp. 50-52
    • Vanstone, S.1
  • 76
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Advances in Cryptology - CRYPTO'01, Lecture Notes in Computer Science, Springer-Verlag, vol. 2139, 2001, pp. 213-29. (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 78
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
    • special issue on Security in Wireless Ad Hoc Networks, Feb.
    • Y. Zhang et al., "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE JSAC, special issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, Feb. 2006, pp. 247-60.
    • (2006) IEEE JSAC , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1
  • 82
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Proc. Advances in Cryptology Crypto' 96, Springer-Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Proc. Advances in Cryptology Crypto' 96, Lecture Notes in Computer Science, Springer-Verlag, vol. 1109, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 87
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov.
    • A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, Nov. 1979, pp. 612-13.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 98
    • 0345565893 scopus 로고    scopus 로고
    • A Survey of Key Management for Secure Group Communication
    • Sept.
    • S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, no. 3, Sept. 2003, pp. 309-29.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 99
    • 11144277843 scopus 로고    scopus 로고
    • Routing Techniques in Wireless Sensor Networks: A Survey
    • Dec.
    • J. A. Al-Karaki and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Commun., vol. 11, no. 6, Dec. 2004.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.6
    • Al-Karaki, J.A.1    Kamal, A.E.2
  • 102
    • 0003405130 scopus 로고    scopus 로고
    • Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
    • UCLA-CSD TR-010023, May
    • Y. Yu, D. Estrin, and R. Govindan, "Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks," UCLA Comp. Sci. Dept. Tech. Rep., UCLA-CSD TR-010023, May 2001.
    • (2001) UCLA Comp. Sci. Dept. Tech. Rep.
    • Yu, Y.1    Estrin, D.2    Govindan, R.3
  • 113
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc Networks: Challenges and Solutions
    • Feb.
    • H. Yang et al., "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Commun., vol. 11, no. 1, Feb. 2004, pp. 38-47.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1
  • 116
    • 14344254253 scopus 로고    scopus 로고
    • A Secure Hierarchical Model for Sensor Networks
    • Mar.
    • M. Tubaishat et al., "A Secure Hierarchical Model for Sensor Networks," ACM SIGMOD Record, vol. 33, no. 1, Mar. 2004.
    • (2004) ACM SIGMOD Record , vol.33 , Issue.1
    • Tubaishat, M.1
  • 134
    • 0037253062 scopus 로고    scopus 로고
    • The Vision of Autonomic Computing
    • Jan.
    • J. O. Kephart and D. M. Chess, "The Vision of Autonomic Computing," IEEE Computer Mag., vol. 36, no. 1, Jan. 2003, pp. 41-50.
    • (2003) IEEE Computer Mag. , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 136
    • 26444539711 scopus 로고    scopus 로고
    • Performance Management for Cluster-Based Web Services
    • G. Pacifici, "Performance Management for Cluster-Based Web Services," IBM Technical Report, 2003.
    • (2003) IBM Technical Report
    • Pacifici, G.1
  • 157
    • 33947309703 scopus 로고    scopus 로고
    • Secure Localization and Authentication in Ultra-Wideband Sensor Networks
    • Special Issue on UWB Wireless Communications - Theory and Applications, Apr.
    • Y. Zhang et al., "Secure Localization and Authentication in Ultra-Wideband Sensor Networks," IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, Apr. 2006, pp. 829-35.
    • (2006) IEEE JSAC , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.