메뉴 건너뛰기




Volumn 2, Issue 3, 2011, Pages 53-73

A lightweight security framework for wireless sensor networks

Author keywords

Malicious node detection; Secure key management; Secure localization; Secure routing; Security framework; Wireless sensor networks security

Indexed keywords


EID: 84860685134     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (28)

References (40)
  • 5
    • 77951190728 scopus 로고    scopus 로고
    • Quality of security through triple key scheme in wireless sensor networks
    • T. A. Zia, Quality of security through triple key scheme in wireless sensor networks, Wireless Communications and Mobile Computing, vol. 10, no. 5, pp. 722-732, May 2010.
    • (2010) Wireless Communications and Mobile Computing , vol.10 , Issue.5 , pp. 722-732
    • Zia, T.A.1
  • 9
  • 22
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • Y. Zhou and Y. Fang, A two-layer key establishment scheme for wireless sensor networks, IEEE Transac- tions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
    • (2007) IEEE Transac- Tions On Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 23
    • 49249123418 scopus 로고    scopus 로고
    • Han, Multipath key establishment for wireless sensor networks using just- nough redun- dancy transmission
    • J. Deng and Y. S. Han, Multipath key establishment for wireless sensor networks using just- nough redun- dancy transmission, IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 3, pp. 177-190, July-September 2008.
    • (2008) IEEE Transactions On Dependable and Secure Computing , vol.5 , Issue.3 , pp. 177-190
    • Deng, J.1
  • 25
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • C.-Y. Chong and S. P. Kumar, Sensor networks: Evolution, opportunities, and challenges, Proceedings of the IEEE, vol. 91, no. 8, pp. 1247-1256, August 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.-Y.1    Kumar, S.P.2
  • 27
    • 14344254253 scopus 로고    scopus 로고
    • A secure hierarchical model for sensor network
    • M. Tubaishat, J. Yin, B. Panja, and S. Madria, A secure hierarchical model for sensor network, ACM SIGMOD Record, vol. 33, no. 1, pp. 7-13, March 2004.
    • (2004) ACM SIGMOD Record , vol.33 , Issue.1 , pp. 7-13
    • Tubaishat, M.1    Yin, J.2    Panja, B.3    Madria, S.4
  • 28
    • 0036739784 scopus 로고    scopus 로고
    • Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
    • B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks, Wireless Networks, vol. 8, no. 5, pp. 481-494, September 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 481-494
    • Chen, B.1    Jamieson, K.2    Balakrishnan, H.3    Morris, R.4
  • 30
    • 84886907611 scopus 로고    scopus 로고
    • MEMSIC Inc., MICA2: Wireless Measurement System, Mica2 Datasheets
    • MEMSIC Inc., MICA2: Wireless Measurement System, Mica2 Datasheets, http://www.memsic.com/support/documentation/wireless-sensor-networks/category/7-datasheets.html.
  • 32
    • 84886910577 scopus 로고    scopus 로고
    • Security in Computing (4th Edition). Prentice Hall PTR, [Online]. Available
    • C. P. Pfleeger and S. L. Pfleeger, Security in Computing (4th Edition). Prentice Hall PTR, 2006. [Online]. Available: http://portal.acm.org/citation.cfm?id=1177321
    • (2006)
    • Pfleeger, C.P.1    Pfleeger, S.L.2
  • 33
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Ad Hoc Network Journal, vol. 1, no. 2-3, pp. 293-315, September 2003.
    • (2003) Ad Hoc Network Journal , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 35
    • 0028514601 scopus 로고
    • Kerberos - an authentication service for computer networks
    • B. C. Neuman and T. Ts'o, Kerberos - an authentication service for computer networks, IEEE Communi- cations Magazine, vol. 32, no. 9, pp. 33-38, 1994.
    • (1994) IEEE Communi- Cations Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.