메뉴 건너뛰기




Volumn 17, Issue 5, 2010, Pages 12-21

Security and privacy in emerging wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES; TRANSMISSION HOPS; WIRELESS COMMUNICATIONS;

EID: 77958084079     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2010.5601953     Document Type: Article
Times cited : (33)

References (70)
  • 1
    • 77958087738 scopus 로고    scopus 로고
    • Mobile malware - An outlook and a new defense paradigm
    • Mar
    • M. Jakobsson, "Mobile Malware - An Outlook and a New Defense Paradigm," RSA Conf. '10, Mar. 2010.
    • (2010) RSA Conf. '10
    • Jakobsson, M.1
  • 2
    • 0000000447 scopus 로고    scopus 로고
    • Emerging challenges: Mobile networking for smart dust
    • J. Kahn, R. Katz, and K. Pister, "Emerging Challenges: Mobile Networking for Smart Dust," J. Commun. Net., 2000, pp. 188-196
    • (2000) J. Commun. Net. , pp. 188-196
    • Kahn, J.1    Katz, R.2    Pister, K.3
  • 3
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • May
    • B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," IEEE Symp. Security & Privacy, May 2005.
    • (2005) IEEE Symp. Security & Privacy
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 4
    • 27544432072 scopus 로고    scopus 로고
    • Detection of denial-of-message attacks on sensor network broadcasts
    • J. McCune et al., "Detection of Denial-of-Message Attacks on Sensor Network Broadcasts," IEEE Symp. Security & Privacy, May 2005.
    • (2005) IEEE Symp. Security & Privacy, May
    • McCune, J.1
  • 5
    • 77958095223 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • K. Mehta, D. Liu, and M. Wright, "Location Privacy in Sensor Networks against a Global Eavesdropper," IEEE ICNP, 2007.
    • (2007) IEEE ICNP
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 7
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao et al., "Towards Statistically Strong Source Anonymity for Sensor Networks," IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Shao, M.1
  • 8
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in- network aggregation for sensor networks
    • Oct.
    • H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In- Network Aggregation for Sensor Networks," ACM CCS, Oct. 2006.
    • (2006) ACM CCS
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 10
    • 34248672225 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor Networks
    • May
    • Y. Yang et al., "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM MobiHoc, May 2006.
    • (2006) ACM MobiHoc
    • Yang, Y.1
  • 11
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • Mar.
    • D. Ma, C. Soriente, and G. Tsudik, "New Adversary and New Threats: Security in Unattended Sensor Networks," IEEE Network, Mar. 2009.
    • (2009) IEEE Network
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 12
    • 77958113323 scopus 로고    scopus 로고
    • GossiCrypt: Wireless sensor network data confidentiality against Parasitic Adversaries
    • J. Luo, P. (Panos) Papadimitratos, and J. Hubaux, "GossiCrypt: Wireless Sensor Network Data Confidentiality against Parasitic Adversaries," IEEE SECON, 2008.
    • (2008) IEEE SECON
    • Luo, J.1    Papadimitratos, P.2    Hubaux, J.3
  • 13
    • 35648972648 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • N. Subramanian, C. Yang, and W. Zhan, "Securing Distributed Data Storage and Retrieval in Sensor Networks," Pervasive Mobile Comp., vol.3, no.6, 2007, pp. 659-676
    • (2007) Pervasive Mobile Comp. , vol.3 , Issue.6 , pp. 659-676
    • Subramanian, N.1    Yang, C.2    Zhan, W.3
  • 14
    • 34548302064 scopus 로고    scopus 로고
    • PDCS: Security and privacy support for data-centric sensor Networks
    • M. Shao et al., "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE INFOCOM, 2007, pp. 1298-1306.
    • (2007) IEEE INFOCOM , pp. 1298-1306
    • Shao, M.1
  • 15
    • 34548802484 scopus 로고    scopus 로고
    • Forward-secure sequential aggregate authentication
    • May
    • D. Ma and G. Tsudik, "Forward-Secure Sequential Aggregate Authentication," IEEE Symp. Security & Privacy, May 2007.
    • (2007) IEEE Symp. Security & Privacy
    • Ma, D.1    Tsudik, G.2
  • 16
    • 72749098410 scopus 로고    scopus 로고
    • Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks
    • A. Yavuz and P. Ning, "Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks," ICST Mobiquitous, 2009.
    • (2009) ICST Mobiquitous
    • Yavuz, A.1    Ning, P.2
  • 17
    • 49149089237 scopus 로고    scopus 로고
    • Catch me if you can: Data survival in unattended sensor networks
    • R. Di Pietro et al., "Catch Me If You Can: Data Survival in Unattended Sensor Networks," IEEE PerCom, 2008, pp. 185-194
    • (2008) IEEE PerCom , pp. 185-194
    • Di Pietro, R.1
  • 18
    • 70449419951 scopus 로고    scopus 로고
    • Data security in unattended sensor networks
    • R. Di Pietro et al., "Data Security in Unattended Sensor Networks," IEEE Trans. Comp., 2009.
    • (2009) IEEE Trans. Comp.
    • Di Pietro, R.1
  • 19
    • 77958104473 scopus 로고    scopus 로고
    • Maximizing data survival in unattended wireless sensor networks against a focused mobile adversary
    • R. Di Pietro et al., "Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary," Ad Hoc Net. J., 2009.
    • (2009) Ad Hoc Net. J.
    • Di Pietro, R.1
  • 20
    • 77958110931 scopus 로고    scopus 로고
    • Network coding based dependable and efficient data survival in unattended wireless sensor networks
    • Dec.
    • W. Ren, J. Zhao, and Y. Ren, "Network Coding Based Dependable And Efficient Data Survival in Unattended Wireless Sensor Networks," J. Commun., vol.4, no.11, Dec. 2009, pp. 894-901.
    • (2009) J. Commun. , vol.4 , Issue.11 , pp. 894-901
    • Ren, W.1    Zhao, J.2    Ren, Y.3
  • 21
    • 58149086240 scopus 로고    scopus 로고
    • POSH: Proactive co-operative self- healing in unattended sensor networks
    • R. Di Pietro et al., "POSH: Proactive Co-Operative Self- Healing in Unattended Sensor Networks," 27th IEEE SRDS '08, 2008, pp. 185-194
    • (2008) 27th IEEE SRDS '08 , pp. 185-194
    • Di Pietro, R.1
  • 23
    • 70349251527 scopus 로고    scopus 로고
    • Collaborative authentication in unattended WSNs
    • R. Di Pietro et al., "Collaborative Authentication in Unattended WSNs," ACM WiSec '09, 2009.
    • (2009) ACM WiSec '09
    • Di Pietro, R.1
  • 24
    • 77953295155 scopus 로고    scopus 로고
    • Intrusion-resilience in mobile unattended WSNs
    • R. Di Pietro et al., "Intrusion-Resilience in Mobile Unattended WSNs," IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Di Pietro, R.1
  • 25
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • May
    • W. Zhang et al., "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," ACM MobiHoc, May 2005, pp. 378-389
    • (2005) ACM MobiHoc , pp. 378-389
    • Zhang, W.1
  • 26
    • 70349658629 scopus 로고    scopus 로고
    • DP2AC: Distributed privacy-preserving access control in sensor networks
    • R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks," IEEE INFOCOM, 2009.
    • (2009) IEEE INFOCOM
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 28
    • 84873946697 scopus 로고    scopus 로고
    • Revisiting smart dust with rfid sensor networks
    • Oct.
    • M. Buettner et al., "Revisiting Smart Dust with RFID Sensor Networks," ACM SIGCOMM HotNets-VII, Oct. 2008.
    • (2008) ACM SIGCOMM HotNets-VII
    • Buettner, M.1
  • 29
    • 68949183472 scopus 로고    scopus 로고
    • Wireless passive sensor networks
    • Aug.
    • M. Isik and O. Akan, "Wireless Passive Sensor Networks," IEEE Commun. Mag., vol.47, no.89, Aug. 2009, pp. 92-99
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.89 , pp. 92-99
    • Isik, M.1    Akan, O.2
  • 30
    • 0032074435 scopus 로고    scopus 로고
    • Self-powered signal processing using vibration-based power generation
    • R. Amirtharajah and A. Chandrakasan, "Self-Powered Signal Processing Using Vibration-Based Power Generation," IEEE J. Solid-State Circuits, vol.33, 1998, pp. 687-695
    • (1998) IEEE J. Solid-State Circuits , vol.33 , pp. 687-695
    • Amirtharajah, R.1    Chandrakasan, A.2
  • 31
    • 79953078626 scopus 로고    scopus 로고
    • Towards autonomously-powered CRFIDs
    • Oct.
    • S. Clark et al., "Towards Autonomously-Powered CRFIDs," HotPower '09, Oct. 2009.
    • (2009) HotPower '09
    • Clark, S.1
  • 32
    • 33744937153 scopus 로고    scopus 로고
    • Performance aware tasking for environmentally powered sensor networks
    • A. Kansal, D. Potter, and M. Srivastava, "Performance Aware Tasking for Environmentally Powered Sensor Networks," ACM SIGMETRICS '04, 2004.
    • (2004) ACM SIGMETRICS ' 04
    • Kansal, A.1    Potter, D.2    Srivastava, M.3
  • 33
    • 48049122971 scopus 로고    scopus 로고
    • An environmental energy harvesting framework for sensor networks
    • A. Kansal and M. Srivastava, "An Environmental Energy Harvesting Framework for Sensor Networks," ACM/IEEE ISLPED, 2003.
    • (2003) ACM/IEEE ISLPED
    • Kansal, A.1    Srivastava, M.2
  • 35
    • 33750345292 scopus 로고    scopus 로고
    • A wirelessly-powered platform for sensing and computation
    • J. Smith et al., "A Wirelessly-Powered Platform for Sensing and Computation," Ubicomp '06, 2006, pp. 495-506.
    • (2006) Ubicomp ' 06 , pp. 495-506
    • Smith, J.1
  • 36
    • 77958105995 scopus 로고    scopus 로고
    • Wirelessly-charged UHF tags for sensor data collection
    • R. Prasad et al., "Wirelessly-Charged UHF Tags for Sensor Data Collection," IEEE RFID '08, 2008.
    • (2008) IEEE RFID '08
    • Prasad, R.1
  • 37
    • 77950320989 scopus 로고    scopus 로고
    • CCCP: Secure remote storage for computational RFIDs
    • Aug.
    • M. Salajegheh et al., "CCCP: Secure Remote Storage for Computational RFIDs," 18th USENIX Security Symp., Aug. 2009.
    • (2009) 18th USENIX Security Symp.
    • Salajegheh, M.1
  • 38
    • 44649195976 scopus 로고    scopus 로고
    • Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
    • F. Bai, T. Elbatt, and G. Hollan, "Towards Characterizing and Classifying Communication-Based Automotive Applications from a Wireless Networking Perspective," IEEE AutoNet, 2006.
    • (2006) IEEE AutoNet
    • Bai, F.1    Elbatt, T.2    Hollan, G.3
  • 39
    • 84890060973 scopus 로고    scopus 로고
    • Co-operative downloading in vehicular ad-hoc wireless networks
    • A. Nandan et al., "Co-Operative Downloading in Vehicular Ad-Hoc Wireless Networks," WONS '05, 2005.
    • (2005) WONS ' 05
    • Nandan, A.1
  • 40
    • 77958082085 scopus 로고    scopus 로고
    • First experience with cartorrent in a real vehicular ad hoc network testbed
    • K. Lee et al., "First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed," Move '07, 2007.
    • (2007) Move ' 07
    • Lee, K.1
  • 42
    • 61449232614 scopus 로고    scopus 로고
    • Dissemination and harvesting of urban data using vehicular sensor platforms
    • U. Lee et al., "Dissemination and Harvesting of Urban Data using Vehicular Sensor Platforms," IEEE Trans. Vehic. Tech., vol.58, no.2, 2009, pp. 882-901.
    • (2009) IEEE Trans. Vehic. Tech. , vol.58 , Issue.2 , pp. 882-901
    • Lee, U.1
  • 43
    • 58149190182 scopus 로고    scopus 로고
    • Bio-inspired multi-agent data harvesting in a proactive urban monitoring environment
    • U. Lee et al., "Bio-Inspired Multi-Agent Data Harvesting in a Proactive Urban Monitoring Environment," Ad Hoc Net. J., vol.7, no.4, 2009.
    • (2009) Ad Hoc Net. J. , vol.7 , Issue.4
    • Lee, U.1
  • 44
    • 33845565342 scopus 로고    scopus 로고
    • MobEyes: Smart mobs for urban monitoring with vehicular sensor networks
    • U. Lee et al., "MobEyes: Smart Mobs for Urban Monitoring with Vehicular Sensor Networks," IEEE Wireless Commun., vol.13, no.5, 2006, pp. 51-57.
    • (2006) IEEE Wireless Commun. , vol.13 , Issue.5 , pp. 51-57
    • Lee, U.1
  • 45
    • 33745963166 scopus 로고    scopus 로고
    • VITP: An information transfer protocol for vehicular computing
    • M. Dikaiakos et al., "VITP: An Information Transfer Protocol for Vehicular Computing," Proc. 2nd ACM VANET '05, 2005, pp. 30-39.
    • (2005) Proc. 2nd ACM VANET '05 , pp. 30-39
    • Dikaiakos, M.1
  • 47
    • 77951152238 scopus 로고    scopus 로고
    • Standard specification for telecommunications and information exchange between roadside and vehicle systems 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) specifications
    • ASTM Std. E2213, West Conshohocken, PA
    • ASTM Std. E2213, 2003, "Standard Specification for Telecommunications and Information Exchange between Roadside and Vehicle Systems 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) specifications," ASTM Int'l., West Conshohocken, PA, 2003; http://www.astm.org.
    • (2003) ASTM int'L.
  • 48
    • 32144446861 scopus 로고    scopus 로고
    • Security issues in a future vehicular network
    • Feb.
    • M. El Zarki et al., "Security Issues in a Future Vehicular Network," EuroWireless '02, Feb. 2002.
    • (2002) EuroWireless '02
    • El Zarki, M.1
  • 49
    • 57449105235 scopus 로고    scopus 로고
    • Secure vehicular communication systems: Design and architecture
    • P. Papadimitratos et al., "Secure Vehicular Communication Systems: Design and Architecture," IEEE Commun. Mag., 2008.
    • (2008) IEEE Commun. Mag.
    • Papadimitratos, P.1
  • 53
    • 74549134073 scopus 로고    scopus 로고
    • Flexible, extensible, and efficient VANET authentication
    • Dec.
    • A. Studer et al., "Flexible, Extensible, and Efficient VANET Authentication," J. Commun. Net., vol.11, no.6, Dec. 2009, pp. 894-901.
    • (2009) J. Commun. Net. , vol.11 , Issue.6 , pp. 894-901
    • Studer, A.1
  • 54
    • 48349084433 scopus 로고    scopus 로고
    • Alarm: Anonymous location-aided routing in suspicious MANETs
    • K. El Defrawy and G. Tsudik, "Alarm: Anonymous Location-Aided Routing in Suspicious MANETs," IEEE ICNP '07, 2007, pp. 304-313
    • (2007) IEEE ICNP '07 , pp. 304-313
    • El Defrawy, K.1    Tsudik, G.2
  • 55
    • 67249139271 scopus 로고    scopus 로고
    • Prism: Privacy-friendly routing in suspicious MANETs (and VANETs)
    • K. El Defrawy and G. Tsudik, "Prism: Privacy-Friendly Routing in Suspicious MANETs (and VANETs)," IEEE ICNP '08, 2008, pp. 258-267
    • (2008) IEEE ICNP ' 08 , pp. 258-267
    • El Defrawy, K.1    Tsudik, G.2
  • 56
    • 83655189677 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • J. Guo, J. Baugh, and S. Wang, "A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework," IEEE INFOCOM, 2007.
    • (2007) IEEE INFOCOM
    • Guo, J.1    Baugh, J.2    Wang, S.3
  • 57
    • 78650728143 scopus 로고    scopus 로고
    • Tacking together efficient authentication revocation, and privacy in VANETs
    • A. Studer et al., "Tacking together Efficient Authentication Revocation, and Privacy in VANETs," IEEE SECON, 2009.
    • (2009) IEEE SECON
    • Studer, A.1
  • 59
    • 77958098760 scopus 로고    scopus 로고
    • NASA, "NASA DTN Project Page"; http://www.nasa.gov/missionpp./ station/science/experiments/ DTN.htm.
    • NASA DTN Project Page
  • 60
    • 70349467302 scopus 로고    scopus 로고
    • Delay-tolerant network technologies coming together
    • G. Goth, "Delay-Tolerant Network Technologies Coming Together," IEEE Distrib. Sys., vol.7, no.8, 2006.
    • (2006) IEEE Distrib. Sys. , vol.7 , Issue.8
    • Goth, G.1
  • 61
    • 77958095222 scopus 로고    scopus 로고
    • Application of delay tolerant networking DTN in airborne networks
    • T. Jonson et al., "Application of Delay Tolerant Networking DTN in Airborne Networks," IEEE MILCOM, 2008.
    • (2008) IEEE MILCOM
    • Jonson, T.1
  • 62
    • 51349140660 scopus 로고    scopus 로고
    • Towards securing disruption-tolerant networking
    • Nokia Research Center
    • N. Asokan et al., "Towards Securing Disruption-Tolerant Networking," tech. rep. NRC-TR2007-07, Nokia Research Center, 2007.
    • (2007) Tech. Rep. NRC-TR2007-07
    • Asokan, N.1
  • 63
    • 4444288136 scopus 로고    scopus 로고
    • A delay tolerant network architecture for challenged internets
    • K. Fall, "A Delay Tolerant Network Architecture for Challenged Internets," ACM SIGCOMM, 2003.
    • (2003) ACM SIGCOMM
    • Fall, K.1
  • 64
    • 33749041735 scopus 로고    scopus 로고
    • Keshav, practical security for disconnected nodes
    • S, Nov
    • A. Seth and S, "Keshav, "Practical Security for Disconnected Nodes," IEEE NPSec, Nov. 2005.
    • (2005) IEEE NPSec
    • Seth, A.1
  • 65
    • 51349159708 scopus 로고    scopus 로고
    • Anonymity and security in delay tolerant networks
    • Sept.
    • A. Kate, G. Zaverucha, and U. Hengartner, "Anonymity and Security in Delay Tolerant Networks," ICST Securecom, Sept. 2007.
    • (2007) ICST Securecom
    • Kate, A.1    Zaverucha, G.2    Hengartner, U.3
  • 66
    • 77958097103 scopus 로고    scopus 로고
    • Applicability of identity-based cryptography for disruption-tolerant networking
    • N. Asokan et al., "Applicability of Identity-Based Cryptography for Disruption-Tolerant Networking," ACM MobiOpp, 2007.
    • (2007) ACM MobiOpp
    • Asokan, N.1
  • 67
    • 70249115721 scopus 로고    scopus 로고
    • Practical security for rural internet kiosks
    • S. Ur Rahman et al., "Practical Security for Rural Internet Kiosks," ACM NSDR '08, 2008, pp. 13-18.
    • (2008) ACM NSDR '08 , pp. 13-18
    • Ur Rahman, S.1
  • 68
    • 70449632776 scopus 로고    scopus 로고
    • Leveraging social contacts for message confidentiality in delay- tolerant networks
    • K. El Defrawy, J. Solis, and G. Tsudik, "Leveraging Social Contacts for Message Confidentiality in Delay- Tolerant Networks," IEEE COMPSAC, 2009.
    • (2009) IEEE COMPSAC
    • El Defrawy, K.1    Solis, J.2    Tsudik, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.