메뉴 건너뛰기




Volumn , Issue , 2012, Pages 626-633

Security and privacy considerations for Wireless Sensor Networks in smart home environments

Author keywords

cryptography; privacy; security; smart home; Wireless Sensor Networks

Indexed keywords

HUMIDITY LEVELS; MONITORING CAPABILITIES; PRIVACY AND SECURITY; QUALITY OF LIFE; RESEARCH ISSUES; SECURITY; SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES; SMART ENVIRONMENT; SMART HOMES; VITAL SIGN;

EID: 84864248763     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSCWD.2012.6221884     Document Type: Conference Paper
Times cited : (53)

References (47)
  • 6
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, "Security and privacy in Sensor Networks," IEEE Computer, vol. 36, no. 10, pp. 103-105,2003.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 7
    • 0036739784 scopus 로고    scopus 로고
    • Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
    • B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks," ACM Wireless Networks Journal, vol. 8, no. 5, pp. 481-494, 2002.
    • (2002) ACM Wireless Networks Journal , vol.8 , Issue.5 , pp. 481-494
    • Chen, B.1    Jamieson, K.2    Balakrishnan, H.3    Morris, R.4
  • 8
    • 84925443479 scopus 로고    scopus 로고
    • Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives
    • D. Christin, P. Mogre, and M. Hollick, "Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives," Future Internet vol. 2, no. 2, pp. 96-125,2010.
    • (2010) Future Internet , vol.2 , Issue.2 , pp. 96-125
    • Christin, D.1    Mogre, P.2    Hollick, M.3
  • 10
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • J. Deng, R. Han, S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Pervasive and Mobile Computing Elsevier, vol. 2, no. 2, pp 159-186,2000.
    • (2000) Pervasive and Mobile Computing Elsevier , vol.2 , Issue.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 12
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial communication systems
    • D. Dzung, M. Naedele, T. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. of the IEEE, vol. 93, no. 6, 2005,pp. 1152-1177.
    • (2005) Proc. of the IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.3    Crevatin, M.4
  • 20
    • 0029530159 scopus 로고
    • A routing protocol for finding two node-disjoint paths in computer networks
    • K. Ishida, Y. Kakuda, and T. Kikuno, "A routing protocol for finding two node-disjoint paths in computer networks," Proc. of Network Protocols, 1992, pp. 340-347.
    • (1992) Proc. of Network Protocols , pp. 340-347
    • Ishida, K.1    Kakuda, Y.2    Kikuno, T.3
  • 23
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design principles of privacy aware ubiquitous systems
    • M. Langeheinrich, "Privacy by Design Principles of Privacy Aware Ubiquitous Systems," Proc. in UBICOMP, 2001. pp. 273-291.
    • (2001) Proc. in UBICOMP , pp. 273-291
    • Langeheinrich, M.1
  • 24
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C. Liew, U. Choi, and C. Liew, "A data distortion by probability distribution," ACM Transaction Database System, vol. 10, no. 3, pp. 395-411,1985.
    • (1985) ACM Transaction Database System , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.1    Choi, U.2    Liew, C.3
  • 28
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proc. Advanced Communication Multimedia Security, 2002, pp. 107-121.
    • (2002) Proc. Advanced Communication Multimedia Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999.,1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 30
    • 33847279474 scopus 로고    scopus 로고
    • Security, privacy and trust issues in smart environments
    • Chapter in, D. Cooke and S. Das (Eds), Pearson Press
    • P. Nixon, W. Wagealla, C. English and S. Terzis, "Security, Privacy and Trust Issues in Smart Environments," Chapter in Smart Environments, D. Cooke and S. Das (Eds), Pearson Press, 2004.
    • (2004) Smart Environments
    • Nixon, P.1    Wagealla, W.2    English, C.3    Terzis, S.4
  • 38
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure networks
    • E. Shi, A. Perrig, "Designing secure networks," In IEEE Wireless Communications, vol. 11, no.6, pp. 38-43, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 44
    • 84976653144 scopus 로고    scopus 로고
    • Some computer science issues in ubiquitous computing
    • M. Weiser, "Some computer science issues in ubiquitous computing," Communications of the ACM, vol. 36, no. 7, pp. 75-84, 2003.
    • (2003) Communications of the ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 46
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62,2002.
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.1    Stankovic, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.