메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 147-157

Analysis of routing security-energy trade-offs in wireless sensor networks

Author keywords

energy efficiency; performance trade offs; protocols; security; Wireless Sensor Networks (WSNs)

Indexed keywords


EID: 79951694028     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011774     Document Type: Article
Times cited : (18)

References (26)
  • 2
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: a survey
    • Al-Karaki, J.N. and Kamal, A.E. (2004) ‘Routing techniques in wireless sensor networks: a survey’, IEEE Wireless Communications, Vol. 11, No. 6, pp.6–28.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 4
    • 26844532138 scopus 로고    scopus 로고
    • End-to-end support for statistical quality of service in heterogeneous mobile ad-hoc networks
    • Al-Karaki, J.N. and Kamal, A.E. (2005) ‘End-to-end support for statistical quality of service in heterogeneous mobile ad-hoc networks’, Computer Communications, Vol. 28, No. 18, pp.2119–2132.
    • (2005) Computer Communications , vol.28 , Issue.18 , pp. 2119-2132
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 6
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • Binkley, J. and Trost, W. (2001) ‘Authenticated ad hoc routing at the link layer for mobile systems’, Wireless Networks, Vol. 7, No. 2, pp.139–145.
    • (2001) Wireless Networks , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1    Trost, W.2
  • 11
    • 0004118152 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • Department of Computer Science, Rice University, December
    • Hu, Y-C., Perrig, A. and Johnson, D.B. (2001) ‘Ariadne: a secure on-demand routing protocol for ad hoc networks’, Technical Report TR01-383, Department of Computer Science, Rice University, December.
    • (2001) Technical Report TR01-383
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 16
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: a lightweight security protocol for wireless sensor networks
    • Park, T. and Shin, K.G. (2004) ‘LiSP: a lightweight security protocol for wireless sensor networks’, ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, pp.1–27.
    • (2004) ACM Transactions on Embedded Computing Systems , vol.3 , Issue.3 , pp. 1-27
    • Park, T.1    Shin, K.G.2
  • 18
    • 3142739563 scopus 로고    scopus 로고
    • An architecture for key management in hierarchical mobile ad hoc networks
    • Rhee, K., Park, Y. and Tsudik, G. (2004) ‘An architecture for key management in hierarchical mobile ad hoc networks’, Journal of Communication and Networks, Vol. 6, No. 2, pp.156–162.
    • (2004) Journal of Communication and Networks , vol.6 , Issue.2 , pp. 156-162
    • Rhee, K.1    Park, Y.2    Tsudik, G.3
  • 20
  • 23
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou, L. and Haas, Z. (1999) ‘Securing ad hoc networks’, IEEE Network Magazine, Vol. 13, No. 6.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 24
    • 84952965601 scopus 로고    scopus 로고
    • For the remainder of this paper, we assume that all nodes locations are fixed for the duration of their lifetime
    • For the remainder of this paper, we assume that all nodes locations are fixed for the duration of their lifetime.
  • 25
    • 84952965705 scopus 로고    scopus 로고
    • Although a NKS is used, an alternative is the prestorage of pair-wise node keys, where each node stores a separate key for communication with each of the other CH nodes in the network
    • Although a NKS is used, an alternative is the prestorage of pair-wise node keys, where each node stores a separate key for communication with each of the other CH nodes in the network.
  • 26
    • 84952957811 scopus 로고    scopus 로고
    • Although symmetric keys are used, asymmetric keys can also be used inside a cluster with minor modifications
    • Although symmetric keys are used, asymmetric keys can also be used inside a cluster with minor modifications.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.