메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 128-142

Security in mobile wireless sensor networks - A survey

Author keywords

Mobile Wireless Sensor Network; Security; Wireless Sensor Network

Indexed keywords

BACKWARD SECRECY; BATTLEFIELD SURVEILLANCE; FORWARD SECRECY; MOBILE NETWORKS; MOBILE WIRELESS SENSOR NETWORK; RESEARCH AREAS; RESEARCH TOPICS; SECURITY; SECURITY CHALLENGES; STATE-OF-THE-ART TECHNOLOGY; WIRELESS COMMUNICATIONS;

EID: 79955497218     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.6.2.128-142     Document Type: Review
Times cited : (24)

References (69)
  • 2
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Jun
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks, " Commun. ACM, vol. 47, no. 6, pp. 53-57, Jun. 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 5
    • 70349694070 scopus 로고    scopus 로고
    • Double mobility: Coverage of the sea surface with mobile sensor networks
    • in, Rio de Janeiro, Brazil, Apr
    • J. Luo, D. Wang, and Q. Zhang, "Double mobility: coverage of the sea surface with mobile sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 118-126.
    • (2009) Proc. IEEE INFOCOM '09 , pp. 118-126
    • Luo, J.1    Wang, D.2    Zhang, Q.3
  • 6
    • 78751619231 scopus 로고    scopus 로고
    • Phero-trail: A bio-inspired location service for mobile underwater sensor networks
    • May
    • L. Vieira, U. Lee, and M. Gerla, "Phero-trail: a bio-inspired location service for mobile underwater sensor networks, " IEEE J. Sel. Areas Commun. (JSAC), vol. 28, no. 4, pp. 553-563, May 2010.
    • (2010) IEEE J. Sel. Areas Commun. (JSAC) , vol.28 , Issue.4 , pp. 553-563
    • Vieira, L.1    Lee, U.2    Gerla, M.3
  • 8
    • 84861959653 scopus 로고    scopus 로고
    • Selective code dissemination in mobile wireless sensor networks
    • in, Leuven, Belgium, Dec
    • B. Pásztor, L. Mottola, C. Mascolo, and G. P. Picco, "Selective code dissemination in mobile wireless sensor networks, " in Proc. ACM/IFIP/USENIX Middleware '08, Leuven, Belgium, Dec. 2008, pp. 113-115.
    • (2008) Proc. ACM/IFIP/USENIX Middleware '08 , pp. 113-115
    • Pásztor, B.1    Mottola, L.2    Mascolo, C.3    Picco, G.P.4
  • 10
    • 29844435167 scopus 로고    scopus 로고
    • Mobility improves coverage of sensor networks
    • in, Urbana-Champaign, IL, USA, May
    • B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility improves coverage of sensor networks, " in Proc. ACM MobiHoc '05, Urbana-Champaign, IL, USA, May 2005, pp. 300-308.
    • (2005) Proc. ACM MobiHoc '05 , pp. 300-308
    • Liu, B.1    Brass, P.2    Dousse, O.3    Nain, P.4    Towsley, D.5
  • 11
    • 70349308780 scopus 로고    scopus 로고
    • Analysis of security threats, requirements, technologies and standards in wireless sensor networks
    • Aug
    • J. Lopez, R. Roman, and C. Alcaraz, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks, " Foundations of Security Analysis and Design V, vol. 5705, pp. 289-338, Aug. 2009.
    • (2009) Foundations of Security Analysis and Design V , vol.5705 , pp. 289-338
    • Lopez, J.1    Roman, R.2    Alcaraz, C.3
  • 13
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey, " IEEE Commun. Surveys Tutorial, vol. 10, no. 3, pp. 6-28, 2008.
    • (2008) IEEE Commun. Surveys Tutorial , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 14
  • 15
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • D. Ma, C. Soriente, and G. Tsudik, "New adversary and new threats: security in unattended sensor networks, " IEEE Network, vol. 23, no. 2, pp. 43-48, 2009.
    • (2009) IEEE Network , vol.23 , Issue.2 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 16
    • 33847255502 scopus 로고    scopus 로고
    • A practical study of transitory master key establishment for wireless sensor networks
    • in, Athens, Greece, Sep
    • J. Deng, C. Hartung, R. Han, and S. Mishra, "A practical study of transitory master key establishment for wireless sensor networks, " in Proc. IEEE SecureComm '05, Athens, Greece, Sep. 2005, pp. 289-302.
    • (2005) Proc. IEEE SecureComm '05 , pp. 289-302
    • Deng, J.1    Hartung, C.2    Han, R.3    Mishra, S.4
  • 18
    • 58049110209 scopus 로고    scopus 로고
    • DISH: Distributed Self-Healing
    • in, Safety, and Security of Distributed Systems (SSS '08), Detroit, MI, USA, Nov
    • D. Ma and G. Tsudik, "DISH: Distributed Self-Healing, " in Proc. 10th Int. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS '08), Detroit, MI, USA, Nov. 2008, pp. 47-62.
    • (2008) Proc. 10th Int. Symp. on Stabilization , pp. 47-62
    • Ma, D.1    Tsudik, G.2
  • 20
    • 79551653442 scopus 로고    scopus 로고
    • A scheme for secure and reliable distributed data storage in unattended WSNs
    • in, Miami, FL, USA, Dec
    • Y. Ren, V. Oleshchuk, and F. Y. Li, "A scheme for secure and reliable distributed data storage in unattended WSNs, " in Proc. IEEE GLOBECOM '10, Miami, FL, USA, Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE GLOBECOM '10 , pp. 1-6
    • Ren, Y.1    Oleshchuk, V.2    Li, F.Y.3
  • 22
    • 67650465277 scopus 로고    scopus 로고
    • Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
    • R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks, " Ad Hoc Networks (Elsevier), vol. 7, no. 8, pp. 1463-1475, 2009.
    • (2009) Ad Hoc Networks (Elsevier) , vol.7 , Issue.8 , pp. 1463-1475
    • Di Pietro, R.1    Mancini, L.2    Soriente, C.3    Spognardi, A.4    Tsudik, G.5
  • 23
    • 34548802484 scopus 로고    scopus 로고
    • Extended abstract: Forward-secure sequential aggregate authentication
    • in, Oakland, CA, USA, May
    • D. Ma and G. Tsudik, "Extended abstract: forward-secure sequential aggregate authentication, " in Proc. IEEE Symp. on Security and Privacy (S&P '07), Oakland, CA, USA, May. 2007, pp. 86-91.
    • (2007) Proc. IEEE Symp. on Security and Privacy (S&P '07) , pp. 86-91
    • Ma, D.1    Tsudik, G.2
  • 24
    • 72749098410 scopus 로고    scopus 로고
    • Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks
    • in, Networking and Services (MobiQuitous '09), Toronto, Canada, Jul
    • A. Yavuz and P. Ning, "Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks, " in Proc. 6th Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '09), Toronto, Canada, Jul. 2009, pp. 1-10.
    • (2009) Proc. 6th Int. Conf. on Mobile and Ubiquitous Systems: Computing , pp. 1-10
    • Yavuz, A.1    Ning, P.2
  • 25
    • 35648972648 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • in, NYC, USA, Mar
    • N. Subramanian, C. Yang, and W. Zhang, "Securing distributed data storage and retrieval in sensor networks, " in Proc. IEEE PerCom '07, vol. 3, no. 6, NYC, USA, Mar. 2007, pp. 659-676.
    • (2007) Proc. IEEE PerCom '07 , vol.3 , Issue.6 , pp. 659-676
    • Subramanian, N.1    Yang, C.2    Zhang, W.3
  • 26
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • in, Rio de Janeiro, Brazil, Apr
    • S. Yu, K. Ren, and W. Lou, "FDAC: toward fine-grained distributed data access control in wireless sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 963-971.
    • (2009) Proc. IEEE INFOCOM '09 , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 27
    • 70349658629 scopus 로고    scopus 로고
    • DP2AC: Distributed Privacy-Preserving Access Control in sensor networks
    • in, Rio de Janeiro, Brazil, Apr
    • R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 1251-1259.
    • (2009) Proc. IEEE INFOCOM '09 , pp. 1251-1259
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 29
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • in, Phoenix, AZ, USA, Apr
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks, " in Proc. IEEE INFOCOM '08, Phoenix, AZ, USA, Apr. 2008, pp. 51-55.
    • (2008) Proc. IEEE INFOCOM '08 , pp. 51-55
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 30
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • in, Beijing, China, Oct
    • K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper, " in Proc. IEEE Int. Conf. on Network Protocols (ICNP '07), Beijing, China, Oct. 2007, pp. 314-323.
    • (2007) Proc. IEEE Int. Conf. on Network Protocols (ICNP '07) , pp. 314-323
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 31
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • in, Anchorage, AL, USA, May
    • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks, " in Proc. IEEE INFOCOM '07, Anchorage, AL, USA, May 2007, pp. 1955-1963.
    • (2007) Proc. IEEE INFOCOM '07 , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 32
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • J. Deng, R. Han, and S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, " Pervasive and Mobile Computing (Elsevier), vol. 2, no. 2, pp. 159-186, 2006.
    • (2006) Pervasive and Mobile Computing (Elsevier) , vol.2 , Issue.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 33
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • in, Urbana-Champaign, IL, USA, May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks, " in Proc. ACM MobiHoc '05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
    • (2005) Proc. ACM MobiHoc '05 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 34
    • 51849099823 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
    • H. Song, S. Zhu, W. Zhang, and G. Cao, "Least privilege and privilege deprivation: toward tolerating mobile sink compromises in wireless sensor networks, " ACM Trans. Sen. Netw. (TOSN), vol. 4, no. 4, pp. 1-34, 2008.
    • (2008) ACM Trans. Sen. Netw. (TOSN) , vol.4 , Issue.4 , pp. 1-34
    • Song, H.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 35
    • 56749181478 scopus 로고    scopus 로고
    • Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
    • in, Alexandria, VA, USA, Mar
    • M. Conti, R. Di Pietro, L. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks, " in Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08), Alexandria, VA, USA, Mar. 2008, pp. 214-219.
    • (2008) Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08) , pp. 214-219
    • Conti, M.1    Di Pietro, R.2    Mancini, L.3    Mei, A.4
  • 37
    • 77953295155 scopus 로고    scopus 로고
    • Intrusion-resilience in mobile unattended WSNs
    • in, San Diego, CA, USA, Mar
    • R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Intrusion-resilience in mobile unattended WSNs, " in Proc. IEEE INFOCOM '10, San Diego, CA, USA, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM '10 , pp. 1-9
    • Di Pietro, R.1    Oligeri, G.2    Soriente, C.3    Tsudik, G.4
  • 40
    • 84880879872 scopus 로고    scopus 로고
    • Forward-secure signatures with optimal signing and verifying
    • in
    • G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying, " in Proc. Advances in Cryptology-CRYPTO '01, 2001, pp. 332-354.
    • (2001) Proc. Advances in Cryptology-CRYPTO '01 , pp. 332-354
    • Itkis, G.1    Reyzin, L.2
  • 45
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Sep
    • A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks, " Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.3    Wen, V.4    Culler, D.5
  • 46
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • in, San Diego, CA, USA, Feb
    • D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, " in Proc. 10th Annual Network and Distributed System Security Symp. (NDSS '03), vol. 276, San Diego, CA, USA, Feb. 2003.
    • (2003) Proc. 10th Annual Network and Distributed System Security Symp. (NDSS '03) , vol.276
    • Liu, D.1    Ning, P.2
  • 47
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • in, Oakland, CA, USA, May
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, " in Proc. IEEE Symp. on Security and Privacy (S&P '04), Oakland, CA, USA, May. 2004, pp. 259-271.
    • (2004) Proc. IEEE Symp. on Security and Privacy (S&P '04) , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 48
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks, " ACM Tran. Sen. Netw. (TOSN), vol. 2, no. 4, pp. 500-528, 2006.
    • (2006) ACM Tran. Sen. Netw. (TOSN) , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 50
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Aug, Extended abstract in Proc. ASIACRYPT '01
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing, " J. Cryptology, vol. 17, no. 4, pp. 297-319, Aug. 2004, Extended abstract in Proc. ASIACRYPT '01.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 55
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • R. Sandhu and P. Samarati, "Access control: principle and practice, " IEEE Commun. Mag., vol. 32, no. 9, pp. 40-48, 1994.
    • (1994) IEEE Commun. Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 56
    • 0030086382 scopus 로고    scopus 로고
    • Rolebased access control models
    • Aug
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Rolebased access control models, " IEEE Computer, vol. 29, no. 2, pp. 38-47, Aug. 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 59
    • 34547273527 scopus 로고    scopus 로고
    • Attributebased encryption for fine-grained access control of encrypted data
    • in, Alexandria, VA, USA, Oct
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributebased encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. on Comp. Comm. Sec. (CCS '06), Alexandria, VA, USA, Oct. 2006, pp. 89-98.
    • (2006) Proc. 13th ACM Conf. on Comp. Comm. Sec. (CCS '06) , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 60
    • 79955504873 scopus 로고    scopus 로고
    • ORION, [Online], Available
    • ORION. [Online]. Available: http://www.joiscience.org/ocean observing/advisors
  • 61
    • 79955507907 scopus 로고    scopus 로고
    • NOPP. [Online], Available
    • NOPP. [Online]. Available: http://www.nopp.org
  • 62
    • 79955508082 scopus 로고    scopus 로고
    • IOOS, [Online], Available
    • IOOS. [Online]. Available: http://www.ocean.us
  • 63
    • 77749271080 scopus 로고    scopus 로고
    • Query privacy in wireless sensor networks
    • A preliminary version of this paper appeared in Proc. IEEE SECON '07
    • B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, "Query privacy in wireless sensor networks, " ACM Trans. Sen. Netw. (TOSN), vol. 6, no. 2, pp. 1-34, 2010, A preliminary version of this paper appeared in Proc. IEEE SECON '07.
    • (2010) ACM Trans. Sen. Netw. (TOSN) , vol.6 , Issue.2 , pp. 1-34
    • Carbunar, B.1    Yu, Y.2    Shi, W.3    Pearce, M.4    Vasudevan, V.5
  • 64
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • in
    • D. Chaum, "Blind signatures for untraceable payments, " in Proc. Advances in Cryptology-CRYPTO '82, vol. 82, 1982, pp. 199-203.
    • (1982) Proc. Advances in Cryptology-CRYPTO '82 , vol.82 , pp. 199-203
    • Chaum, D.1
  • 65
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • in, Boston, MA, USA, Aug
    • B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks, " in Proc. ACM MobiCom '00, Boston, MA, USA, Aug. 2000, pp. 243-254.
    • (2000) Proc. ACM MobiCom '00 , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 66
    • 72449171946 scopus 로고    scopus 로고
    • Double rulings for information brokerage in sensor networks
    • Dec, A preliminary version of this paper appeared in Proc. ACM MobiCom '06
    • R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks, " IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1902-1915, Dec. 2009, A preliminary version of this paper appeared in Proc. ACM MobiCom '06.
    • (2009) IEEE/ACM Trans. Netw , vol.17 , Issue.6 , pp. 1902-1915
    • Sarkar, R.1    Zhu, X.2    Gao, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.