메뉴 건너뛰기




Volumn 45, Issue 1, 2010, Pages 77-91

The future of security in Wireless Multimedia Sensor Networks : A position paper

Author keywords

Security; Wireless Multimedia Sensor Networks; WMSN

Indexed keywords

FUTURE TRENDS; POSITION PAPERS; RESEARCH AREAS; WIRELESS MULTIMEDIA SENSOR NETWORK;

EID: 77955308863     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-009-9235-0     Document Type: Article
Times cited : (53)

References (121)
  • 4
  • 7
    • 0034291065 scopus 로고    scopus 로고
    • Protocols for self-organization of a wireless sensor network
    • Personal Communications, IEEE. See also
    • Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. (2000). Protocols for self-organization of a wireless sensor network. Personal Communications, IEEE. See also IEEE Wireless Communications, 7(5), 16-27.
    • (2000) IEEE Wirele -01ss Communications , vol.7 , Issue.5 , pp. 16-27
    • Sohrabi, K.1    Gao, J.2    Ailawadhi, V.3    Pottie, G.4
  • 8
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • 10.1145/332833.332838
    • G. J. Pottie W. J. Kaiser 2000 Wireless integrated network sensors Communications of the ACM 43 5 51 58 10.1145/332833.332838
    • (2000) Communications of the ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 10
    • 33646456047 scopus 로고    scopus 로고
    • MMSPEED: Multipath Multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks
    • 10.1109/TMC.2006.79
    • E. Falemban C. Lee E. Ekici 2006 MMSPEED: Multipath Multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks IEEE Transactions on Mobile Computing 5 6 738 754 10.1109/TMC.2006.79
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.6 , pp. 738-754
    • Falemban, E.1    Lee, C.2    Ekici, E.3
  • 11
    • 32644433771 scopus 로고    scopus 로고
    • QoS and energy aware routing for real-time traffic in wireless sensor networks
    • DOI 10.1016/j.comcom.2004.12.028, PII S014036640500040X
    • A. Mahapatra K. Anand D. P. Agrawal 2006 QoS and energy aware routing for real time traffic in wireless sensor networks Journal on Computer Communications 29 437 445 10.1016/j.comcom.2004.12.028 (Pubitemid 43243227)
    • (2006) Computer Communications , vol.29 , Issue.4 , pp. 437-445
    • Mahapatra, A.1    Anand, K.2    Agrawal, D.P.3
  • 14
    • 38349187668 scopus 로고    scopus 로고
    • ASAR: An Ant-based Service Aware Routing algorithm for multimedia sensor networks
    • 10.1007/s11460-008-0013-7
    • Y. Sun H. Ma L. Liu Y. Zheng 2008 ASAR: an Ant-based Service Aware Routing algorithm for multimedia sensor networks Frontiers of Electrical and Electronic Engineering in China 3 1 25 33 10.1007/s11460-008-0013-7
    • (2008) Frontiers of Electrical and Electronic Engineering in China , vol.3 , Issue.1 , pp. 25-33
    • Sun, Y.1    Ma, H.2    Liu, L.3    Zheng, Y.4
  • 15
    • 67249089643 scopus 로고    scopus 로고
    • A cross-layer solution for ultrawideband based wireless video sensor networks
    • 30 November-4 December 2008. IEEE.
    • Campelli, L., Akyildiz, I., Fratta, L., & Cesana, M. (2008). A cross-layer solution for ultrawideband based wireless video sensor networks. In IEEE Globecom 2008. 30 November-4 December 2008. IEEE.
    • (2008) IEEE Globecom 2008
    • Campelli, L.1    Akyildiz, I.2    Fratta, L.3    Cesana, M.4
  • 20
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • DOI 10.1145/1053283.1053287
    • D. Liu P. Ning R. Li 2005 Establishing pairwise keys in distributed sensor networks ACM Transactions on Information and Systems Security 8 1 41 77 10.1145/1053283.1053287 (Pubitemid 40479429)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Rongfang, L.I.3
  • 22
    • 23944459661 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks-revisited
    • C. Castelluccia H. Hartenstein C. Paar D. Westhoff (eds). ESAS, Springer Berlin
    • Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks-revisited. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Lecture notes in computer science : Vol. 3313. ESAS (pp. 2-18). Berlin: Springer.
    • (2004) Lecture Notes in Computer Science , vol.3313 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.P.2    Sunar, B.3
  • 25
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. in Sensor and ad hoc communications and networks
    • First annual IEEE communications society conference
    • Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Sensor and ad hoc communications and networks. IEEE SECON 2004. First annual IEEE communications society conference (pp. 71-80).
    • (2004) IEEE SECON 2004 , pp. 71-80
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 27
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • ACM New York
    • Piotrowski, K., Langendoerfer, P., & Peter, S. (2006). How public key cryptography influences wireless sensor node lifetime. In Proceedings of ACM SASN. New York: ACM.
    • (2006) Proceedings of ACM SASN
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3
  • 32
    • 85000276942 scopus 로고    scopus 로고
    • Tesla: Broadcast authentication for distributed sensor networks
    • 10.1145/1027794.1027800
    • D. Liu P. Ning 2004 Tesla: Broadcast authentication for distributed sensor networks Transactions on Embedded Computing Systems 3 4 800 836 10.1145/1027794.1027800
    • (2004) Transactions on Embedded Computing Systems , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 38
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Special Issue on Sensor Network Applications and Protocols
    • C. Karlof D. Wagner 2003 Secure routing in wireless sensor networks: Attacks and countermeasures Elsevier's AdHoc Networks Journal 1 2-3 293 315 Special Issue on Sensor Network Applications and Protocols
    • (2003) Elsevier's AdHoc Networks Journal , vol.1 , Issue.23 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 40
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In ACM SenSys 2003.
    • (2003) ACM SenSys 2003
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 42
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • A. Wood J. Stankovic 2002 Denial of service in sensor network Computer 35 10 54 62 10.1109/MC.2002.1039518 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 44
    • 0035946056 scopus 로고    scopus 로고
    • How to sign digital streams
    • 10.1006/inco.2000.2916
    • R. Gennaro P. Rohatgi 2001 How to sign digital streams Information and Computation 165 100 116 10.1006/inco.2000.2916
    • (2001) Information and Computation , vol.165 , pp. 100-116
    • Gennaro, R.1    Rohatgi, P.2
  • 45
    • 64549108398 scopus 로고    scopus 로고
    • Security and privacy for distributed multimedia sensor networks
    • 10.1109/JPROC.2007.909914
    • D. Kundur W. Luh U. Okorafor T. Zourntos 2008 Security and privacy for distributed multimedia sensor networks Proceedings of the IEEE 96 1 112 130 10.1109/JPROC.2007.909914
    • (2008) Proceedings of the IEEE , vol.96 , Issue.1 , pp. 112-130
    • Kundur, D.1    Luh, W.2    Okorafor, U.3    Zourntos, T.4
  • 46
    • 33846220040 scopus 로고    scopus 로고
    • A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
    • W. Luh D. Kundur T. Zourntos 2007 A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems EURASIP Journal on Applied Signal Processing 2007 1 218
    • (2007) EURASIP Journal on Applied Signal Processing , vol.2007 , Issue.1 , pp. 218
    • Luh, W.1    Kundur, D.2    Zourntos, T.3
  • 47
    • 47649089096 scopus 로고    scopus 로고
    • Reliable event-detection in wireless visual sensor networks through scalar collaboration and game theoretic consideration
    • 10.1109/TMM.2008.922775
    • A. Czarlinska D. Kundur 2008 Reliable event-detection in wireless visual sensor networks through scalar collaboration and game theoretic consideration IEEE Transactions on Multimedia 10 5 675 690 10.1109/TMM.2008.922775
    • (2008) IEEE Transactions on Multimedia , vol.10 , Issue.5 , pp. 675-690
    • Czarlinska, A.1    Kundur, D.2
  • 49
    • 77955309925 scopus 로고    scopus 로고
    • Wireless image sensor networks: Event acquisition in attack-prone and uncertain environments
    • Czarlinska, A., & Kundur, D. (2008). Wireless image sensor networks: Event acquisition in attack-prone and uncertain environments. Multidimensional Systems and Signal Processing.
    • (2008) Multidimensional Systems and Signal Processing
    • Czarlinska, A.1    Kundur, D.2
  • 50
    • 33846639667 scopus 로고    scopus 로고
    • From imaging networks to behavior profiling: Ubiquitous sensing for managed homecare of the elderly
    • Lo, B. P. L., Wang, J. L., & Yang, G. Z. (2005). From imaging networks to behavior profiling: Ubiquitous sensing for managed homecare of the elderly. In Proceedings of the pervasive computing conference (pp. 101-104).
    • (2005) Proceedings of the Pervasive Computing Conference , pp. 101-104
    • Lo, B.P.L.1    Wang, J.L.2    Yang, G.Z.3
  • 56
    • 32344446967 scopus 로고    scopus 로고
    • Key management and delayed verification for ad hoc networks
    • M. G. Zapata 2006 Key management and delayed verification for ad hoc networks Journal of High Speed Networks 15 1 93 109
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1 , pp. 93-109
    • Zapata, M.G.1
  • 61
    • 3543079858 scopus 로고    scopus 로고
    • Optimizing the scalability of network intrusion detection systems using mobile agents
    • 10.1023/B:JONS.0000015700.02134.1c
    • D. G. Marks P. Mell M. Stinson 2004 Optimizing the scalability of network intrusion detection systems using mobile agents Journal of Network and Systems Management 12 1 95 110 10.1023/B:JONS.0000015700.02134.1c
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.1 , pp. 95-110
    • Marks, D.G.1    Mell, P.2    Stinson, M.3
  • 64
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • 513-525
    • Biham, E., & Shamir, A. (1997). Differential fault analysis of secret key cryptosystems. In CRYPTO (pp. 513-525).
    • (1997) CRYPTO
    • Biham, E.1    Shamir, A.2
  • 65
    • 34248333875 scopus 로고    scopus 로고
    • Detailed DoS attacks in wireless networks and countermeasures
    • DOI 10.1504/IJAHUC.2007.012417
    • L. A. Mohammed B. Issac 2007 Detailed DoS attacks in wireless networks and countermeasures International Journal of Ad Hoc and Ubiquitous Computing 2 3 157 166 10.1504/IJAHUC.2007.012417 (Pubitemid 46739015)
    • (2007) International Journal of Ad Hoc and Ubiquitous Computing , vol.2 , Issue.3 , pp. 157-166
    • Mohammed, L.A.1    Issac, B.2
  • 68
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation
    • 10.1145/1387663.1387664
    • W. Xu W. Trappe Y. Zhang 2008 Defending wireless sensor networks from radio interference through channel adaptation ACM Transactions on Sensor Networks 4 4 1 34 10.1145/1387663.1387664
    • (2008) ACM Transactions on Sensor Networks , vol.4 , Issue.4 , pp. 1-34
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 69
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • DOI 10.1109/MNET.2006.1637931
    • W. Xu K. Ma W. Trappe Y. Zhang 2006 Jamming sensor networks: attack and defense strategies Network, IEEE 20 3 41 47 10.1109/MNET.2006.1637931 (Pubitemid 43885286)
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 73
    • 77955304464 scopus 로고    scopus 로고
    • On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: Analysis and counter measures
    • 10.1504/IJWMC.2006.012561
    • Y. Zhou D. Wu S. M. Nettles 2006 On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures International Journal of Wireless and Mobile Computing 1 3/4 268 275 10.1504/IJWMC.2006.012561
    • (2006) International Journal of Wireless and Mobile Computing , vol.1 , Issue.3-4 , pp. 268-275
    • Zhou, Y.1    Wu, D.2    Nettles, S.M.3
  • 75
    • 34247504187 scopus 로고    scopus 로고
    • DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
    • DOI 10.1016/j.comcom.2007.02.014, PII S0140366407000953
    • L. Guang C. Assi Y. Ye 2007 DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks Computer Communications 30 8 1841 1853 10.1016/j.comcom.2007.02.014 (Pubitemid 46659755)
    • (2007) Computer Communications , vol.30 , Issue.8 , pp. 1841-1853
    • Guang, L.1    Assi, C.2    Ye, Y.3
  • 76
    • 33845762444 scopus 로고    scopus 로고
    • Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
    • S. Radosavac A. A. Cárdenas J. S. Baras G. V. Moustakides 2007 Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers Journal of Computer Security 15 1 103 128
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 103-128
    • Radosavac, S.1    Cárdenas, A.A.2    Baras, J.S.3    Moustakides, G.V.4
  • 78
    • 67349109409 scopus 로고    scopus 로고
    • Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks
    • Bicakci, K., & Tavli, B. (2009). Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards and Interfaces.
    • (2009) Computer Standards and Interfaces
    • Bicakci, K.1    Tavli, B.2
  • 79
    • 33646906440 scopus 로고    scopus 로고
    • MAC protocols for wireless sensor networks: A survey
    • DOI 10.1109/MCOM.2006.1632658
    • I. Demirkol C. Ersoy F. Alagoz 2006 MAC protocols for wireless sensor networks: a survey IEEE Communications Magazine 44 4 115 121 10.1109/MCOM.2006.1632658 (Pubitemid 43792677)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 115-121
    • Demirkol, I.1    Ersoy, C.2    Alagoz, F.3
  • 86
    • 2942579328 scopus 로고    scopus 로고
    • Mh-trace: Multi-hop time reservation using adaptive control for energy efficiency
    • 10.1109/JSAC.2004.826932
    • B. Tavli W. Heinzelman 2004 Mh-trace: Multi-hop time reservation using adaptive control for energy efficiency IEEE Journal on Selected Areas in Communications 22 942 953 10.1109/JSAC.2004.826932
    • (2004) IEEE Journal on Selected Areas in Communications , vol.22 , pp. 942-953
    • Tavli, B.1    Heinzelman, W.2
  • 89
    • 34250739920 scopus 로고    scopus 로고
    • The Anchor Location Service (ALS) protocol for large-scale wireless sensor networks
    • DOI 10.1145/1142680.1142704, ACM International Conference Proceeding Series - Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks
    • Zhang, R., Zhao, H., & Labrador, M. A. (2006). The Anchor Location Service (ALS) protocol for large-scale wireless sensor networks. In InterSense '06: Proceedings of the first international conference on integrated Internet ad hoc and sensor networks (p. 18). New York: ACM. (Pubitemid 46966796)
    • (2006) ACM International Conference Proceeding Series , vol.138 , pp. 1142704
    • Zhang, R.1    Zhao, H.2    Labrador, M.A.3
  • 90
    • 33745909177 scopus 로고    scopus 로고
    • Battery-aware routing for streaming data transmissions in wireless sensor networks
    • DOI 10.1007/s11036-006-7800-2
    • C. Ma Y. Yang 2006 Battery aware routing for streaming data transmissions in wireless sensor networks Mobile Networks and Applications 11 757 767 10.1007/s11036-006-7800-2 (Pubitemid 44048676)
    • (2006) Mobile Networks and Applications , vol.11 , Issue.5 , pp. 757-767
    • Ma, C.1    Yang, Y.2
  • 92
    • 33144475784 scopus 로고    scopus 로고
    • Wormhole attacks in wireless networks
    • DOI 10.1109/JSAC.2005.861394
    • Y. C. Hu A. Perrig D. Johnson 2006 Wormhole attacks in wireless networks IEEE Journal on Selected Areas in Communications 24 2 370 380 10.1109/JSAC.2005.861394 (Pubitemid 43269756)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 370-379
    • Hu, Y.-C.1    Perrig, A.2
  • 93
    • 52249100824 scopus 로고    scopus 로고
    • Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation
    • 10.1109/FGCN.2007.184
    • H. Weerasinghe H. Fu 2007 Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation Future Generation Communication and Networking 2 362 367 10.1109/FGCN.2007.184
    • (2007) Future Generation Communication and Networking , vol.2 , pp. 362-367
    • Weerasinghe, H.1    Fu, H.2
  • 94
    • 51249101665 scopus 로고    scopus 로고
    • An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol
    • 2780-2785
    • Djahel, S., Nait-Abdesselam, F., & Khokhar, A. (2008). An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol. In IEEE international conference on communications ICC '08 (pp. 2780-2785).
    • (2008) IEEE International Conference on Communications ICC '08
    • Djahel, S.1    Nait-Abdesselam, F.2    Khokhar, A.3
  • 95
    • 49749126034 scopus 로고    scopus 로고
    • Struggling against selfishness and black hole attacks in MANETs
    • 10.1002/wcm.493
    • D. Djenouri N. Badache 2008 Struggling against selfishness and black hole attacks in MANETs Wireless Communications and Mobile Computing 8 6 689 704 10.1002/wcm.493
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.6 , pp. 689-704
    • Djenouri, D.1    Badache, N.2
  • 96
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • DOI 10.1007/s11276-006-3723-x
    • R. Poovendran L. Lazos 2007 A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Networks 13 1 27 59 10.1007/s11276-006-3723-x (Pubitemid 46034258)
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 99
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • 10.1016/j.comnet.2008.04.002
    • J. Yick B. Mukherjee D. Ghosal 2008 Wireless sensor network survey Computer Networks 52 12 2292 2330 10.1016/j.comnet.2008.04.002
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 103
    • 17144375624 scopus 로고    scopus 로고
    • Pump-Slowly, Fetch-Quickly (PSFQ): A reliable transport protocol for sensor networks
    • DOI 10.1109/JSAC.2005.843554
    • C. Y. Wan A. Campbell L. Krishnamurthy 2005 Pump-slowly, fetch-quickly (PSFQ): a reliable transport protocol for sensor networks IEEE Journal on Selected Areas in Communications 23 4 862 872 10.1109/JSAC.2005.843554 (Pubitemid 40519640)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.4 , pp. 862-872
    • Wan, C.-Y.1    Campbell, A.T.2    Krishnamurthy, L.3
  • 104
    • 26644458553 scopus 로고    scopus 로고
    • Event-to-sink reliable transport in wireless sensor networks
    • DOI 10.1109/TNET.2005.857076
    • B. Akan Özgür I. F. Akyildiz 2005 Event-to-sink reliable transport in wireless sensor networks IEEE/ACM Transactions on Networks 13 5 1003 1016 10.1109/TNET.2005.857076 (Pubitemid 41685011)
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.5 , pp. 1003-1016
    • Akan, O.B.1    Akyildiz, I.F.2
  • 115
    • 38549085319 scopus 로고    scopus 로고
    • In-network aggregation trade-offs for data collection in wireless sensor networks
    • 10.1504/IJSNET.2006.012035
    • I. Solis K. Obraczka 2006 In-network aggregation trade-offs for data collection in wireless sensor networks International Journal of Sensor Networks 1 3/4 200 212 10.1504/IJSNET.2006.012035
    • (2006) International Journal of Sensor Networks , vol.1 , Issue.3-4 , pp. 200-212
    • Solis, I.1    Obraczka, K.2
  • 116
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • DOI 10.1145/1341731.1341733
    • Q. Zhang T. Yu P. Ning 2008 A framework for identifying compromised nodes in wireless sensor networks ACM Transactions on Information and Systems Security 11 3 1 37 10.1145/1341731.1341733 (Pubitemid 351462726)
    • (2008) ACM Transactions on Information and System Security , vol.11 , Issue.3 , pp. 12
    • Zhang, Q.1    Yu, T.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.