메뉴 건너뛰기




Volumn , Issue , 2013, Pages 194-232

Security and privacy challenges in cognitive wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COGNITIVE RADIO; COMPUTER PRIVACY; RADIO TRANSMISSION; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84883330327     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-4221-8.ch011     Document Type: Chapter
Times cited : (21)

References (147)
  • 6
    • 84872871627 scopus 로고    scopus 로고
    • Security in cognitive wireless sensor networks: Challenges and open problems.
    • Retrieved October 22, 2012, from
    • Araujo, A., Blesa, J., Romero, E., & Villanueva, D. (2012). Security in cognitive wireless sensor networks: Challenges and open problems. EURASIP Journal on Wireless Communications and Networking (p. 48). Retrieved October 22, 2012, from http://jwcn.eurasipjournals.com/content/2012/1/48
    • (2012) EURASIP Journal on Wireless Communications and Networking , pp. 48
    • Araujo, A.1    Blesa, J.2    Romero, E.3    Villanueva, D.4
  • 9
    • 84949938425 scopus 로고    scopus 로고
    • DoSresistant authentication with client puzzles
    • Cambridge, UK, April 2000. Lecture Notes in Computer Science (LNCS), Springer-Verlag, London, 2001.
    • th Int. Workshop on Security Protocols, Cambridge, UK, April 2000. Lecture Notes in Computer Science (LNCS), Vol 2133, pp. 170- 177, Springer-Verlag, London, 2001.
    • (2001) th Int. Workshop on Security Protocols , vol.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 12
    • 77955623517 scopus 로고    scopus 로고
    • Optimal S1SO and M1MO spectral efficiency to minimize hidden-node network interference
    • Bliss, D. W. (2010). Optimal S1SO and M1MO spectral efficiency to minimize hidden-node network interference. IEEE Communications Letters, 14(7), 620-622. doi:10.1109/LCOMM.2010.07.100442.
    • (2010) IEEE Communications Letters , vol.14 , Issue.7 , pp. 620-622
    • Bliss, D.W.1
  • 15
    • 52549109488 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • Brown, T. X., & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment. Mobile Networks and Applications, 13(5), 516-532. doi:10.1007/s11036-008-0085-x.
    • (2007) Mobile Networks and Applications , vol.13 , Issue.5 , pp. 516-532
    • Brown, T.X.1    Sethi, A.2
  • 17
    • 78650759662 scopus 로고    scopus 로고
    • A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming
    • San Diego, CA: IEEE
    • Burbank, J. L., Hammons, A. R., & Jones, S. D. (2008). A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming. In Proc. of the IEEE Military Communications Conf. (pp. 1-7). San Diego, CA: IEEE.
    • (2008) In Proc. of the IEEE Military Communications Conf. , pp. 1-7
    • Burbank, J.L.1    Hammons, A.R.2    Jones, S.D.3
  • 18
    • 32644435647 scopus 로고    scopus 로고
    • Energyefficient secure pattern based data aggregation for wireless sensor networks
    • Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D., & Ozgur Sanli, H. (2006). Energyefficient secure pattern based data aggregation for wireless sensor networks. Computer Communications, 29(4), 446-455. doi:10.1016/j. comcom.2004.12.029.
    • (2006) Computer Communications , vol.29 , Issue.4 , pp. 446-455
    • Cam, H.1    Ozdemir, S.2    Nair, P.3    Muthuavinashiappan, D.4    Ozgur Sanli, H.5
  • 25
    • 42649135628 scopus 로고    scopus 로고
    • Toward secure distributed spectrum sensing in cognitive radio networks
    • Chen, R., Park, J.-M., Hou, Y. T., & Reed, J. H. (2008b). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50-55. doi:10.1109/MCOM.2008.4481340.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 50-55
    • Chen, R.1    Park, J.-M.2    Hou, Y.T.3    Reed, J.H.4
  • 26
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Chen, R., Park, J.-M., & Reed, J. H. (2008c). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25-37. doi:10.1109/JSAC.2008.080104.
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.H.3
  • 30
    • 27544440245 scopus 로고    scopus 로고
    • INSENS: intrusion-tolerant routing in wireless sensor networks.
    • Technical report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder, USA, November 2002.
    • Deng, J., Han, R., & Mishra, S. (2002). INSENS: intrusion-tolerant routing in wireless sensor networks. Technical report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder, USA, November 2002.
    • (2002)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 32
    • 80053502199 scopus 로고    scopus 로고
    • Security, privacy, and fault-tolerance in wireless sensor networks. Book chapter
    • Bulusu, N., & Jha, S. (Eds.), Artech House.
    • Deng, J., Han, R., & Mishra, S. (2005b). Security, privacy, and fault-tolerance in wireless sensor networks. Book chapter. In Bulusu, N., & Jha, S. (Eds.), Wireless Sensor Networks: A Systems Perspective (pp. 215-234). Artech House.
    • (2005) Wireless Sensor Networks: A Systems Perspective , pp. 215-234
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 34
    • 0842332407 scopus 로고    scopus 로고
    • A witness-based approach for data fusion assurance in wireless sensor networks
    • San Francisco, CA: IEEE
    • Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proc. of IEEE Global Telecommunications Conf. (pp. 1435-1439). San Francisco, CA: IEEE.
    • (2003) In Proc. of IEEE Global Telecommunications Conf. , pp. 1435-1439
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 39
    • 84872048332 scopus 로고    scopus 로고
    • Security and privacy of collaborative spectrum sensing in cognitive radio networks.
    • Retrieved October 22, 2012, from
    • Gao, Z., Zhu, H., Li, S., Du, S., & Li, X. (2012). Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wireless Communications. Retrieved October 22, 2012, from http://tdt.sjtu.edu.cn/~hjzhu/Paper/IEEE_WCM.pdf
    • (2012) IEEE Wireless Communications.
    • Gao, Z.1    Zhu, H.2    Li, S.3    Du, S.4    Li, X.5
  • 53
    • 77953195920 scopus 로고    scopus 로고
    • Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach
    • Singapore: IEEE
    • Li, H., & Han, Z. (2010). Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach. In Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (pp. 1-12). Singapore: IEEE.
    • (2010) In Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks , pp. 1-12
    • Li, H.1    Han, Z.2
  • 55
    • 36148956575 scopus 로고    scopus 로고
    • Analysis of ratings on trust inference in the open environment
    • Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in the open environment. Journal on Performance Evaluation, 65(2), 99-128. doi:10.1016/j.peva.2007.04.001.
    • (2008) Journal on Performance Evaluation , vol.65 , Issue.2 , pp. 99-128
    • Liang, Z.1    Shi, W.2
  • 56
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel μTESLA: Broadcast authentication for distributed sensor networks
    • Liu, D., & Ning, P. (2004). Multilevel μTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems, 3(4), 800-836. doi:10.1145/1027794.1027800.
    • (2004) ACM Transactions on Embedded Computing Systems , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 57
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • Oakland, CA: IEEE
    • Liu, Y., Ning, P., & Dai, H. (2010). Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Proc. of IEEE Symposium on Security and Privacy (pp. 286-301). Oakland, CA: IEEE.
    • (2010) In Proc. of IEEE Symposium on Security and Privacy , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 61
    • 77951429767 scopus 로고    scopus 로고
    • Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
    • Boston, MA: IEEE
    • Mody, A. N., Reddy, R., Kiernan, T., & Brown, T. X. (2009). Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard. In Proc. of IEEE Military Communications Conference (pp. 1-7). Boston, MA: IEEE.
    • (2009) In Proc. of IEEE Military Communications Conference , pp. 1-7
    • Mody, A.N.1    Reddy, R.2    Kiernan, T.3    Brown, T.X.4
  • 70
    • 58049207983 scopus 로고    scopus 로고
    • Policy-based spectrum access control for dynamic spectrum access network radios
    • Amsterdam, The Netherlands: Elsevier
    • Perich, F., & McHenry, M. (2009). Policy-based spectrum access control for dynamic spectrum access network radios. Web Semantics: Science, Services and Agents on the World Wide Web, 7(1), 21-227. Amsterdam, The Netherlands: Elsevier.
    • (2009) Web Semantics: Science, Services and Agents on the World Wide Web , vol.7 , Issue.1 , pp. 21-227
    • Perich, F.1    McHenry, M.2
  • 71
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • [Hingham, MA: Kluwer Academic Publishers.]
    • Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. [Hingham, MA: Kluwer Academic Publishers.]. Wireless Networks, 8(5), 521-534. doi:10.1023/A:1016598314198.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 75
    • 3142569233 scopus 로고    scopus 로고
    • Highly reliable trust establishment scheme in ad hoc networks
    • Computer Networks: The Int. [Amsterdam, The Netherlands: Elsevier.].
    • Ren, K., Li, T., Wan, Z., Bao, F., Deng, R. H., & Kim, K. (2004). Highly reliable trust establishment scheme in ad hoc networks. Computer Networks: The Int. [Amsterdam, The Netherlands: Elsevier.]. Journal of Computer and Telecommunications Networking, 45(6), 687-699. doi:10.1016/j.comnet. 2004.01.008.
    • (2004) Journal of Computer and Telecommunications Networking , vol.45 , Issue.6 , pp. 687-699
    • Ren, K.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.H.5    Kim, K.6
  • 79
    • 84944715713 scopus 로고    scopus 로고
    • Routing security issues in wireless sensor networks: Attacks and defense. Book Chapter
    • Tan, Y. K. (Ed.), Croatia: INTECH Publishers.
    • Sen, J. (2010a). Routing security issues in wireless sensor networks: Attacks and defense. Book Chapter. In Tan, Y. K. (Ed.), Sustainable Wireless Sensor Networks (pp. 279-309). Croatia: INTECH Publishers. doi:10.5772/12952.
    • (2010) Sustainable Wireless Sensor Networks , pp. 279-309
    • Sen, J.1
  • 80
    • 79960292287 scopus 로고    scopus 로고
    • An efficient and user privacypreserving routing protocol for wireless mesh networks
    • Special Issue on Networks and Distributed Systems
    • Sen, J. (2010b). An efficient and user privacypreserving routing protocol for wireless mesh networks. International Journal on Scalable Computing: Practice and Experience. Special Issue on Networks and Distributed Systems, 11(4), 345-358.
    • (2010) International Journal on Scalable Computing: Practice and Experience. , vol.11 , Issue.4 , pp. 345-358
    • Sen, J.1
  • 81
    • 85138406381 scopus 로고    scopus 로고
    • Reputation-and trust-based systems for wireless self-organizing networks
    • A-S.K. Pathan (ed.), Aurbach Publication, Book Chapter No 5, CRC Press, Taylor & Francis Group, USA, 2010
    • Sen, J. (2010c). Reputation-and trust-based systems for wireless self-organizing networks. Book Chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, A-S.K. Pathan (ed.), Aurbach Publication, Book Chapter No 5, pp. 91- 122, CRC Press, Taylor & Francis Group, USA, 2010.
    • (2010) Book Chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , pp. 91-122
    • Sen, J.1
  • 87
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications Magazine, 11(6), 38-43. doi:10.1109/MWC.2004.1368895.
    • (2004) IEEE Wireless Communications Magazine , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 91
    • 77949345490 scopus 로고    scopus 로고
    • Evolutionary cooperative spectrum sensing game: How to collaborate
    • Wang, B., Liu, K. J. R., & Clancy, T. C. (2010). Evolutionary cooperative spectrum sensing game: How to collaborate. IEEE Transactions on Communications, 58(3), 890-900. doi:10.1109/TCOMM.2010.03.090084.
    • (2010) IEEE Transactions on Communications , vol.58 , Issue.3 , pp. 890-900
    • Wang, B.1    Liu, K.J.R.2    Clancy, T.C.3
  • 96
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54-62. doi:10.1109/MC.2002.1039518.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 98
    • 70349653799 scopus 로고    scopus 로고
    • Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks
    • Barcelona, Spain: IEEE
    • th Vehicular Technology Conf. (pp. 1-5). Barcelona, Spain: IEEE.
    • (2009) th Vehicular Technology Conf. , pp. 1-5
    • Xu, S.1    Shang, Y.2    Wang, H.3
  • 101
    • 77951486373 scopus 로고    scopus 로고
    • Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
    • Boston, MA: IEEE Press
    • Yu, F. R., Tang, H., Huang, M., Li, Z., & Mason, P. C. (2009). Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In Proc. of the IEEE Military Communications Conf. (pp. 1143-1149). Boston, MA: IEEE Press.
    • (2009) In Proc. of the IEEE Military Communications Conf. , pp. 1143-1149
    • Yu, F.R.1    Tang, H.2    Huang, M.3    Li, Z.4    Mason, P.C.5
  • 102
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys & Tutorials, 11(1), 116-130. doi:10.1109/SURV.2009.090109.
    • (2009) IEEE Communications Surveys & Tutorials , vol.11 , Issue.1 , pp. 116-130
    • Yucek, T.1    Arslan, H.2
  • 103
    • 73049083486 scopus 로고    scopus 로고
    • Anti-jamming coding techniques with application to cognitive radio
    • Yue, G., & Wang, X. (2009). Anti-jamming coding techniques with application to cognitive radio. IEEE Transactions on Wireless Communications, 8(12), 5996-6007. doi:10.1109/TWC.2009.12.081627.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.12 , pp. 5996-6007
    • Yue, G.1    Wang, X.2
  • 104
    • 77949356469 scopus 로고    scopus 로고
    • Reputation-based cooperative spectrum sensing with trusted nodes assistance
    • Zeng, K., Pawelczak, P., & Cabric, D. (2010). Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Communications Letters, 14(3), 226-228. doi:10.1109/LCOMM.2010.03.092240.
    • (2010) IEEE Communications Letters , vol.14 , Issue.3 , pp. 226-228
    • Zeng, K.1    Pawelczak, P.2    Cabric, D.3
  • 107
    • 70449468191 scopus 로고    scopus 로고
    • A new cooperative detection technique with malicious user suppression
    • Dresden, Germany: IEEE
    • Zhao, T., & Zhao, Y. (2009). A new cooperative detection technique with malicious user suppression. In Proc. of the IEEE Int. Conf. on Communications (pp. 2754-2758). Dresden, Germany: IEEE.
    • (2009) In Proc. of the IEEE Int. Conf. on Communications , pp. 2754-2758
    • Zhao, T.1    Zhao, Y.2
  • 108
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Zhou, Y., Fang, Y., & Zhang, Y. (2009). Securing wireless sensor networks: A survey. IEEE Communications Survey Tutorials, 10(3), 6-28. doi:10.1109/COMST.2008.4625802.
    • (2009) IEEE Communications Survey Tutorials , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 121
    • 47649129348 scopus 로고    scopus 로고
    • Secure differential data aggregation for wireless sensor networks.
    • S. Phoha, T. F. La Porta, & C. Griffin (eds.), Willey-IEEE Press.
    • Cam, H., Ozdemir, S., Sanli, H. O., & Nair, P. (2004). Secure differential data aggregation for wireless sensor networks. Book Chapter in Sensor Network Operation, S. Phoha, T. F. La Porta, & C. Griffin (eds.), Willey-IEEE Press.
    • (2004) Book Chapter in Sensor Network Operation
    • Cam, H.1    Ozdemir, S.2    Sanli, H.O.3    Nair, P.4
  • 122
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • Capkun, S., Buttyan, L., & Hubaux, J.-P. (2003, January). Self-organized public key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 52-64. doi:10.1109/TMC.2003.1195151.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 123
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H., & Perrig, A. (2003, October). Security and privacy in sensor networks. IEEE Computer, 36(Issue 10), 103-105. doi:10.1109/MC.2003.1236475.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 124
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks.
    • Berkeley, California, USA, May 2003, IEEE Computer Society Press
    • Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy (S & P'03), Berkeley, California, USA, p.197-213, May 2003. IEEE Computer Society Press.
    • (2003) In Proceedings of the IEEE Symposium on Security and Privacy (S & P'03) , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 128
    • 49749084392 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Du, X., & Chen, H.-C. (2008, August). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/MWC.2008.4599222.
    • (2008) IEEE Wireless Communications , vol.15 , Issue.4 , pp. 60-66
    • Du, X.1    Chen, H.-C.2
  • 131
    • 23944459661 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks-revisited
    • Heidelberg, Germany, August 2004. Lecture Notes in Computer Science (LNCS), Springer-Verlag, Heidelberg, Germany 2005
    • st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, August 2004. Lecture Notes in Computer Science (LNCS), Vol 3313, pp. 2-18, Springer-Verlag, Heidelberg, Germany 2005.
    • (2004) st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'04) , vol.3313 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 134
    • 29844451556 scopus 로고    scopus 로고
    • Enforcing cooperative resource sharing in untrusted peerto- peer environment
    • Liang, Z., & Shi, W. (2005, December). Enforcing cooperative resource sharing in untrusted peerto- peer environment. [MONET]. ACM Journal of Mobile Networks and Applications, 10(Issue 6), 971-983. doi:10.1007/s11036-005-4453-5.
    • (2005) [MONET]. ACM Journal of Mobile Networks and Applications , vol.10 , Issue.6 , pp. 971-983
    • Liang, Z.1    Shi, W.2
  • 142
    • 77956262504 scopus 로고    scopus 로고
    • Achieving cooperative spectrum sensing in wireless cognitive radio networks
    • Special Issue on Cognitive Radio Technologies and Systems
    • Song, C., & Zhang, Q. (2009, April). Achieving cooperative spectrum sensing in wireless cognitive radio networks. ACM SIGMOBILE Mobile Computing and Communications Review (MC2R). Special Issue on Cognitive Radio Technologies and Systems, 13(Issue 2), 14-25.
    • (2009) ACM SIGMOBILE Mobile Computing and Communications Review (MC2R). , vol.13 , Issue.2 , pp. 14-25
    • Song, C.1    Zhang, Q.2
  • 143
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation
    • Westhoff, D., Girao, J., & Acharya, M. (2006, October). Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(Issue 10), 1417-1431. doi:10.1109/TMC.2006.144.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 145
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Yong, W., Attebury, G., & Ramamurthy, B. (2006, April). A survey of security issues in wireless sensor networks. IEEE Communications Survey Tutorials, 8(Issue 2), 2-33. doi:10.1109/COMST.2006.315852.
    • (2006) IEEE Communications Survey Tutorials , vol.8 , Issue.2 , pp. 2-33
    • Yong, W.1    Attebury, G.2    Ramamurthy, B.3
  • 147
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks.
    • Oakland, California, USA, May 2004.
    • Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004b). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, pp. 259-271, Oakland, California, USA, May 2004.
    • (2004) In Proceedings of IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.