메뉴 건너뛰기




Volumn , Issue , 2010, Pages 949-957

Taxonomy of wireless sensor network cyber security attacks in the oil and gas industries

Author keywords

[No Author keywords available]

Indexed keywords

CYBER SECURITY; OIL AND GAS; OIL AND GAS INDUSTRY; OPERATIONAL PERFORMANCE; RELIABLE COMMUNICATION; SECURITY ISSUES; WIRED SENSORS; WIRELESS TECHNOLOGIES; WSN SECURITY;

EID: 77954325007     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2010.175     Document Type: Conference Paper
Times cited : (43)

References (22)
  • 6
    • 49149099123 scopus 로고    scopus 로고
    • Department of Computer Science, University of Tennessee, Knoxville
    • M. Saraogi, "Security in wireless sensor networks," Department of Computer Science, University of Tennessee, Knoxville 2005.
    • (2005) Security in Wireless Sensor Networks
    • Saraogi, M.1
  • 9
    • 14344252668 scopus 로고    scopus 로고
    • Real-time communication and coordination in embedded sensor networks
    • J. A. Stankovic, T. E. Abdelzaher, C. Lu, L. Sha, and J. C. Hou, "Real-time communication and coordination in embedded sensor networks," Proceedings of the IEEE, vol. 91, pp. 1002-1022, 2003.
    • (2003) Proceedings of the IEEE , vol.91 , pp. 1002-1022
    • Stankovic, J.A.1    Abdelzaher, T.E.2    Lu, C.3    Sha, L.4    Hou, J.C.5
  • 12
    • 33846161991 scopus 로고    scopus 로고
    • Search on security in sensor networks
    • Dec.
    • P. Li, Y. Lin, and W. Zeng, "Search on Security in Sensor Networks," Journal of Software, vol. 17, pp. 2577-2588, Dec. 2006.
    • (2006) Journal of Software , vol.17 , pp. 2577-2588
    • Li, P.1    Lin, Y.2    Zeng, W.3
  • 13
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
    • A. C. Alvaro, R. Tanya, and S. Shankar, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Netw., vol. 7, pp. 1434-1447, 2009.
    • (2009) Ad Hoc Netw. , vol.7 , pp. 1434-1447
    • Alvaro, A.C.1    Tanya, R.2    Shankar, S.3
  • 18
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 19
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • R. Sandro and H. David, "A survey of key management for secure group communication," ACM Comput. Surv., vol. 35, pp. 309-329, 2003.
    • (2003) ACM Comput. Surv. , vol.35 , pp. 309-329
    • Sandro, R.1    David, H.2
  • 22
    • 39449120475 scopus 로고    scopus 로고
    • Low-power direct conversion transceiver for 915 MHz band IEEE 802.15.4b standard based on 0.18 μm CMOS technology
    • February
    • T.-K. Nguyen, V.-H. Le, Q.-H. Duong, S.-K. Han, S.-G. Lee, N.-S. Seong, N.-S. Kim, and C.-S. Pyo, "Low-Power Direct Conversion Transceiver for 915 MHz Band IEEE 802.15.4b Standard Based on 0.18 μm CMOS Technology," ETRI Journal, vol. 30, pp. 33-46, February 2008.
    • (2008) ETRI Journal , vol.30 , pp. 33-46
    • Nguyen, T.-K.1    Le, V.-H.2    Duong, Q.-H.3    Han, S.-K.4    Lee, S.-G.5    Seong, N.-S.6    Kim, N.-S.7    Pyo, C.-S.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.