메뉴 건너뛰기




Volumn , Issue , 2010, Pages 313-320

Wireless sensor network attacks and security mechanisms: A short survey

Author keywords

Attacks; Security; Security mechanisms; Vulnerability; Wireless sensor network

Indexed keywords

BISMUTH COMPOUNDS; WIRELESS AD HOC NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 78650500280     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NBiS.2010.11     Document Type: Conference Paper
Times cited : (65)

References (39)
  • 1
    • 34547420644 scopus 로고    scopus 로고
    • Wireless sensor networks for structural health monitoring
    • Campbell AT, Bonnet P, Heidemann JS (eds.), ACM
    • Kim S, Pakzad S, Culler DE, Demmel J, Fenves G, Glaser S, Turon M. Wireless sensor networks for structural health monitoring. SenSys, Campbell AT, Bonnet P, Heidemann JS (eds.), ACM, 2006; 427-428.
    • (2006) SenSys , pp. 427-428
    • Kim, S.1    Pakzad, S.2    Culler, D.E.3    Demmel, J.4    Fenves, G.5    Glaser, S.6    Turon, M.7
  • 2
    • 78650435544 scopus 로고    scopus 로고
    • Deploying a sensor network on an active volcano
    • General Track, USENIX
    • Welsh M. Deploying a sensor network on an active volcano. USENIX Annual Technical Conference, General Track, USENIX, 2006.
    • (2006) USENIX Annual Technical Conference
    • Welsh, M.1
  • 7
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput. Netw. 2002; 38(4):393-422, doi:http://dx.doi.org/10. 1016/S1389-1286(01)00302-4. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 8
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • Al-Karaki JN, Kamal AE. Routing techniques in wireless sensor networks: a survey. IEEE Wireless Comm., vol. 11, 2004; 6-28.
    • (2004) IEEE Wireless Comm. , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 9
    • 66549119394 scopus 로고    scopus 로고
    • Crossbow Technology Inc.
    • Crossbow technology inc. mpr/mib user's manual. http://www.xbow.com/ Support/Support-pdf-files/MPRMIB/Series-Users-Manual.pdf2010.
    • Mpr/mib User's Manual
  • 11
    • 0036793924 scopus 로고    scopus 로고
    • Denial of services in sensor networks
    • October
    • Wood A, Stankovic J. Denial of services in sensor networks. IEEE Computer October 2002; .
    • (2002) IEEE Computer
    • Wood, A.1    Stankovic, J.2
  • 12
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • IEEE Computer Society
    • Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks. IEEE Symposium on Security and Privacy, IEEE Computer Society, 2005; 49-63.
    • (2005) IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.D.3
  • 13
    • 26444474622 scopus 로고    scopus 로고
    • Sensor network configuration under physical attacks
    • Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
    • Wang X, Gu W, Schosek K, Chellappan S, Xuan D. Sensor network configuration under physical attacks. ICCNMC, Lecture Notes in Computer Science, vol. 3619, Lu X, Zhao W (eds.), Springer, 2005; 23-32. (Pubitemid 41435742)
    • (2005) Lecture Notes in Computer Science , vol.3619 , pp. 23-32
    • Wang, X.1    Gu, W.2    Schosek, K.3    Chellappan, S.4    Xuan, D.5
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1(2- 3):293-315.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Lecture Notes in Computer Science, Christianson B, Crispo B, Malcolm JA, Roe M (eds.), Springer
    • Stajano F, Anderson RJ. The resurrecting duckling: Security issues for ad-hoc wireless networks. Security Protocols Workshop, Lecture Notes in Computer Science, vol. 1796, Christianson B, Crispo B, Malcolm JA, Roe M (eds.), Springer, 1999; 172-194.
    • (1999) Security Protocols Workshop , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 19
    • 78650508689 scopus 로고    scopus 로고
    • Résistance contre les attaques par capture dans les réseaux de capteurs
    • Thomas Claveirole MA, Marcelo Dias De Amorim, Viniotis Y. Résistance contre les attaques par capture dans les réseaux de capteurs. JDIR, 2007.
    • (2007) JDIR
    • Thomas Claveirole, M.A.1    Marcelo Dias De, A.2    Viniotis, Y.3
  • 22
    • 51249087814 scopus 로고    scopus 로고
    • Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
    • IEEE Computer Society: Washington, DC, USA, doi
    • Liu A, Ning P. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. IPSN '08: Proceedings of the 7th international conference on Information processing in sensor networks, IEEE Computer Society: Washington, DC, USA, 2008; 245-256, doi:http://dx.doi.org/10. 1109/IPSN.2008.47.
    • (2008) IPSN '08: Proceedings of the 7th International Conference on Information Processing in Sensor Networks , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 23
    • 78650463097 scopus 로고    scopus 로고
    • Tinyos. http:/www.tinyos.net/2010.
    • Tinyos
  • 24
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • Stankovic JA, Arora A, Govindan R (eds.), ACM
    • Karlof C, Sastry N, Wagner D. Tinysec: a link layer security architecture for wireless sensor networks. SenSys, Stankovic JA, Arora A, Govindan R (eds.), ACM, 2004; 162-175.
    • (2004) SenSys , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 29
    • 37149010269 scopus 로고    scopus 로고
    • A new resilient key management protocol for wireless sensor networks
    • Lecture Notes in Computer Science, Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.), Springer
    • Bekara C, Laurent-Maknavicius M. A new resilient key management protocol for wireless sensor networks. WISTP, Lecture Notes in Computer Science, vol. 4462, Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.), Springer, 2007; 14-26.
    • (2007) WISTP , vol.4462 , pp. 14-26
    • Bekara, C.1    Laurent-Maknavicius, M.2
  • 30
    • 85092924851 scopus 로고    scopus 로고
    • Privacyaware location sensor networks
    • Jones MB (ed.), USENIX
    • Gruteser M, Schelle G, Jain A, Han R, Grunwald D. Privacyaware location sensor networks. HotOS, Jones MB (ed.), USENIX, 2003; 163-168.
    • (2003) HotOS , pp. 163-168
    • Gruteser, M.1    Schelle, G.2    Jain, A.3    Han, R.4    Grunwald, D.5
  • 31
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • IEEE Computer Society
    • Liu D, Ning P, Du W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. ICDCS, IEEE Computer Society, 2005; 609-619.
    • (2005) ICDCS , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.3
  • 35
    • 3142569233 scopus 로고    scopus 로고
    • Highly reliable trust establishment scheme in ad hoc networks
    • Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 2004; 45(6):687-699.
    • (2004) Computer Networks , vol.45 , Issue.6 , pp. 687-699
    • Ren, K.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.H.5    Kim, K.6
  • 36
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • Setia S, Swarup V (eds.), ACM
    • Ganeriwal S, Srivastava MB. Reputation-based framework for high integrity sensor networks. SASN, Setia S, Swarup V (eds.), ACM, 2004; 66-77.
    • (2004) SASN , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.B.2
  • 38
    • 27544488231 scopus 로고    scopus 로고
    • Pet: A personalized trust model with reputation and risk evaluation for p2p resource sharing
    • IEEE Computer Society
    • Liang Z, Shi W. Pet: A personalized trust model with reputation and risk evaluation for p2p resource sharing. HICSS, IEEE Computer Society, 2005.
    • (2005) HICSS
    • Liang, Z.1    Shi, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.