메뉴 건너뛰기




Volumn 6, Issue 4, 2013, Pages 461-472

Component-based security system (COMSEC) with QoS for wireless sensor networks

Author keywords

Key management; Quality of service; Secure data aggregation; Security in wireless sensor network; Sybil attack; Wireless sensor networks

Indexed keywords

COMPUTER CRIME; INFORMATION MANAGEMENT; QUALITY OF SERVICE; SECURITY SYSTEMS; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84875645230     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.634     Document Type: Article
Times cited : (8)

References (30)
  • 1
    • 84925443479 scopus 로고    scopus 로고
    • Survey on wireless sensor network technologies for industrial automation: the security and quality of service perspectives
    • Christin D, Mogre PS, Hollick M. Survey on wireless sensor network technologies for industrial automation: the security and quality of service perspectives. Future Internet 2010; 2(2):96-125.
    • (2010) Future Internet , vol.2 , Issue.2 , pp. 96-125
    • Christin, D.1    Mogre, P.S.2    Hollick, M.3
  • 2
    • 83155184795 scopus 로고    scopus 로고
    • Overview of security issues in wireless sensor networks, in Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM)
    • Modares H, Salleh R, Moravejosharieh A. Overview of security issues in wireless sensor networks, in Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2011; 308-311.
    • (2011) , pp. 308-311
    • Modares, H.1    Salleh, R.2    Moravejosharieh, A.3
  • 3
    • 78651454154 scopus 로고    scopus 로고
    • QoS and security in energy-harvesting wireless sensor networks, in International Conference on Security and Cryptography (SECRYPT)
    • Taddeo AV, Mura M, Ferrante A. QoS and security in energy-harvesting wireless sensor networks, in International Conference on Security and Cryptography (SECRYPT), 2010; 1-10.
    • (2010) , pp. 1-10
    • Taddeo, A.V.1    Mura, M.2    Ferrante, A.3
  • 4
    • 80052224918 scopus 로고    scopus 로고
    • Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on wireless multimedia sensor network, in International Conference on Recent Trends in Information Technology (ICRTIT)
    • Vithya B, Vinayagasundaram G. Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on wireless multimedia sensor network, in International Conference on Recent Trends in Information Technology (ICRTIT), 2011; 444-449.
    • (2011) , pp. 444-449
    • Vithya, B.1    Vinayagasundaram, G.2
  • 5
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: peer intermediaries for key establishment in sensor networks, in INFOCOM
    • Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks, in INFOCOM, 2005.
    • (2005)
    • Chan, H.1    Perrig, A.2
  • 6
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks, in ACM Workshop on Security in Ad Hoc and Sensor Networks
    • Liu D, Ning P. Location-based pairwise key establishments for static sensor networks, in ACM Workshop on Security in Ad Hoc and Sensor Networks, 2003; 72-82.
    • (2003) , pp. 72-82
    • Liu, D.1    Ning, P.2
  • 7
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks, in IEEE Symposium on Research in Security and Privacy
    • Chan AP, Chan DSH. Random key predistribution schemes for sensor networks, in IEEE Symposium on Research in Security and Privacy, 2003, 197-213.
    • (2003) , pp. 197-213
    • Chan, A.P.1    Chan, D.S.H.2
  • 8
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security
    • Du W, Liu D, Ning P. Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security, 2005.
    • (2005)
    • Du, W.1    Liu, D.2    Ning, P.3
  • 9
    • 66549123136 scopus 로고    scopus 로고
    • An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks, in Proceedings of First International Conference on COMmunication Systems and NETworkS (COMSNETS)
    • Das AK. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks, in Proceedings of First International Conference on COMmunication Systems and NETworkS (COMSNETS), 2009; 1-10.
    • (2009) , pp. 1-10
    • Das, A.K.1
  • 10
    • 0038112369 scopus 로고    scopus 로고
    • John Wiley and Sons, vol. 2, no. 470845295
    • Nicopolitidis P. Wireless Networks, John Wiley and Sons, vol. 2, no. 470845295, 2003.
    • (2003) Wireless Networks
    • Nicopolitidis, P.1
  • 11
    • 34250659309 scopus 로고    scopus 로고
    • Key management for long lived sensor networks in hostile environments
    • Chorzempa M, Park J-M, Eltoweissy M. Key management for long lived sensor networks in hostile environments. Computer Communications 2007; 30(9):1964-1979.
    • (2007) Computer Communications , vol.30 , Issue.9 , pp. 1964-1979
    • Chorzempa, M.1    Park, J.-M.2    Eltoweissy, M.3
  • 12
    • 84943753034 scopus 로고    scopus 로고
    • Secure aggregation for wireless networks, in Workshop on Security and Assurance in Ad hoc Networks
    • Hu L, Evans D. Secure aggregation for wireless networks, in Workshop on Security and Assurance in Ad hoc Networks, 2003.
    • (2003)
    • Hu, L.1    Evans, D.2
  • 13
    • 84875684075 scopus 로고    scopus 로고
    • Efficient secure aggregation in sensor networks, in Proceedings of the 11th International Conference on High Performance Computing
    • Jadia P, Mathuria A. Efficient secure aggregation in sensor networks, in Proceedings of the 11th International Conference on High Performance Computing, 2004.
    • (2004)
    • Jadia, P.1    Mathuria, A.2
  • 14
    • 18844457825 scopus 로고    scopus 로고
    • SIA: secure information aggregation in sensor networks, in 1st International Conference on Embedded Networked Sensor Systems
    • Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks, in 1st International Conference on Embedded Networked Sensor Systems, 2003.
    • (2003)
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 15
    • 84875646500 scopus 로고    scopus 로고
    • Cryptographic apparatus and method, U.S. Patent US42007701980.
    • Merkle RC, Cryptographic apparatus and method, U.S. Patent US42007701980.
    • Merkle, R.C.1
  • 16
    • 84875683862 scopus 로고    scopus 로고
    • SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in ACM MOBIHOC
    • Yang Y, Wang X, Zhu S, Cao G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in ACM MOBIHOC, 2006.
    • (2006)
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 17
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks, in 13th ACM conference on Computer and communications security
    • Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks, in 13th ACM conference on Computer and communications security, 2006.
    • (2006)
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 18
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: analysis and defences, in Third International Symposium on Information Processing in Sensor Networks
    • Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis and defences, in Third International Symposium on Information Processing in Sensor Networks, 2004; 259-268.
    • (2004) , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 19
    • 84875663118 scopus 로고    scopus 로고
    • The performance of dynamic group-based key establishment (DGKE) under node capture attacks in wireless sensor networks, in 2nd Conference on Advances in Computer Security and Forensics (ACSF)
    • Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. The performance of dynamic group-based key establishment (DGKE) under node capture attacks in wireless sensor networks, in 2nd Conference on Advances in Computer Security and Forensics (ACSF), 2007.
    • (2007)
    • Kifayat, K.1    Merabti, M.2    Shi, Q.3    Llewellyn-Jones, D.4
  • 20
    • 85037175440 scopus 로고    scopus 로고
    • Wireless sensor networks security: a survey, security in distributed, grid, and pervasive computing
    • Walters JP, Liang Z, Shi W, Chaudhary V. Wireless sensor networks security: a survey, security in distributed, grid, and pervasive computing, 367-410, 2007.
    • (2007) , pp. 367-410
    • Walters, J.P.1    Liang, Z.2    Shi, W.3    Chaudhary, V.4
  • 21
    • 33746874914 scopus 로고    scopus 로고
    • On the forward and backward secrecy of HLL group key exchange mechanism, in Proceedings of the Fifth International Conference on Computer and Information Technology
    • Chang C, Lee J, Chen C. On the forward and backward secrecy of HLL group key exchange mechanism, in Proceedings of the Fifth International Conference on Computer and Information Technology, 2005; 702-705.
    • (2005) , pp. 702-705
    • Chang, C.1    Lee, J.2    Chen, C.3
  • 22
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge, in IEEE INFOCOM
    • Du W, Deng J, Han YS, Chen S, Varshney P. A key management scheme for wireless sensor networks using deployment knowledge, in IEEE INFOCOM, 2004.
    • (2004)
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.5
  • 23
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices, in 41st ACM Symposium on Theory of Computing (STOC)
    • Gentry C. Fully homomorphic encryption using ideal lattices, in 41st ACM Symposium on Theory of Computing (STOC), 2009.
    • (2009)
    • Gentry, C.1
  • 24
    • 3142716056 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data, in ACM International Conference on Management of Data (SIGMOD)
    • Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data, in ACM International Conference on Management of Data (SIGMOD), 2004; 563 - 574.
    • (2004) , pp. 563-574
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 25
    • 33744499939 scopus 로고    scopus 로고
    • Secure comparison of encrypted data in wireless sensor networks, in WiOpt
    • Acharya M, Girao J, Westhoff V. Secure comparison of encrypted data in wireless sensor networks, in WiOpt, 2005; 47-53.
    • (2005) , pp. 47-53
    • Acharya, M.1    Girao, J.2    Westhoff, V.3
  • 26
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge, in INFOCOM
    • Du W, Deng J, Han Y, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge, in INFOCOM, 2004.
    • (2004)
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.K.5
  • 27
    • 0033877788 scopus 로고    scopus 로고
    • Energy-efficient communication protocol for wireless microsensor networks, in Hawaiian International Conference On Systems Science On Systems Science
    • Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks, in Hawaiian International Conference On Systems Science On Systems Science, 2000.
    • (2000)
    • Heinzelman, W.R.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 28
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security (WiSec)
    • Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks, in ACM Workshop on Wireless Security (WiSec), 2005.
    • (2005)
    • Liu, D.1    Ning, P.2    Du, W.3
  • 29
    • 33750297758 scopus 로고    scopus 로고
    • State-based key management scheme for wireless sensor networks, in IEEE Mobile Ad hoc and Sensor Systems Conference
    • Park J, Kim Z, Kim K. State-based key management scheme for wireless sensor networks, in IEEE Mobile Ad hoc and Sensor Systems Conference, 2005.
    • (2005)
    • Park, J.1    Kim, Z.2    Kim, K.3
  • 30
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party, in EUROCRYPT;
    • Pedersen TP. A threshold cryptosystem without a trusted party, in EUROCRYPT; 1991; 522-526.
    • (1991) , pp. 522-526
    • Pedersen, T.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.