메뉴 건너뛰기




Volumn 5, Issue 2-3, 2010, Pages 188-197

Security assessments of IEEE 802.15.4 standard based on X.805 framework

Author keywords

IEEE802.15.4WPAN security; LR WPAN security; Network security; Security assessment; Wireless security; X.805 security framework

Indexed keywords

IEEE STANDARDS; LOW POWER ELECTRONICS; MOBILE TELECOMMUNICATION SYSTEMS; PERSONAL COMMUNICATION SYSTEMS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 77949752019     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.032217     Document Type: Article
Times cited : (14)

References (11)
  • 3
    • 24344480083 scopus 로고    scopus 로고
    • Security usability
    • July-August
    • Gutmann, P. and Grigg, I. (2005) 'Security usability', Security and Privacy, IEEE, Vol.3, No.4, July-August, pp.56-58.
    • (2005) Security and Privacy, IEEE , vol.3 , Issue.4 , pp. 56-58
    • Gutmann, P.1    Grigg, I.2
  • 4
    • 84964559052 scopus 로고    scopus 로고
    • Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks
    • IEEE 802.15.4 LR-WPAN
    • IEEE 802.15.4 LR-WPAN (2006) 'Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)', IEEE Standards Association, http://standards.ieee.org/getieee802/ download/802.15.4-2006.pdf
    • (2006) IEEE Standards Association
  • 6
    • 77949665713 scopus 로고    scopus 로고
    • International Organization for Standardization
    • International Organization for Standardization (2006) ISO/IEC 18028 - (Part 1-5), http://www.iso.org/
    • (2006)
  • 7
    • 77949752297 scopus 로고    scopus 로고
    • Addressing the nation's cyber security challenges: Reducing vulnerabilities requires strategic investment and immediate action
    • Cybersecurity, and Science and Technology, April
    • Maughan, W.D. (2007) 'Addressing the nation's cyber security challenges: reducing vulnerabilities requires strategic investment and immediate action', Before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, April, http://homeland. house.gov/
    • (2007) Before the House Committee on Homeland Security Subcommittee on Emerging Threats
    • Maughan, W.D.1
  • 8
    • 77949687168 scopus 로고    scopus 로고
    • X.805: Security architecture for systems providing end-to-end communication
    • Reinhard Scholl - ITU-T
    • Reinhard Scholl - ITU-T (2005) 'X.805: security architecture for systems providing end-to-end communication', International Telecommunications Union, Telecommunications Standardization Sector, http://www.itu.int
    • (2005) International Telecommunications Union, Telecommunications Standardization Sector
  • 10
    • 33751531045 scopus 로고    scopus 로고
    • Security services and enhancements in the IEEE802.15.4 wireless sensor networks
    • November-December
    • Xiao, Y., Sethi, S., Chen, H-H. and Sun, B. (2005) 'Security services and enhancements in the IEEE802.15.4 wireless sensor networks', IEEE, GLOBECOM'05 Proceedings, Vol.3, November-December, pp.1796-1800.
    • (2005) IEEE, GLOBECOM'05 Proceedings , vol.3 , pp. 1796-1800
    • Xiao, Y.1    Sethi, S.2    Chen, H.-H.3    Sun, B.4
  • 11
    • 33748346240 scopus 로고    scopus 로고
    • Toward secure low rate wireless personal area networks
    • October
    • Zheng, J., Lee, M.J. and Anshel, M. (2006) 'Toward secure low rate wireless personal area networks', Appears in IEEE Transaction Mobile Computing, Vol.5, No.10, October, pp.1361-1373.
    • (2006) Appears in IEEE Transaction Mobile Computing , vol.5 , Issue.10 , pp. 1361-1373
    • Zheng, J.1    Lee, M.J.2    Anshel, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.