메뉴 건너뛰기




Volumn , Issue , 2013, Pages 301-322

Wireless Sensor Network Security

Author keywords

Attacks; Microelectronic mechanical systems; Open system interconnection; Privacy; Protocol stack; Threats; Vulnerabilities; Wireless ad hoc networks; Wireless networks; Wireless sensor network security

Indexed keywords


EID: 84884111125     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-394397-2.00016-7     Document Type: Chapter
Times cited : (12)

References (43)
  • 3
    • 84884114559 scopus 로고    scopus 로고
    • First International Workshop on Peer-to-Peer Systems (IPTPS '02)
    • J.R. Douceur, The sybil attack. in: First International Workshop on Peer-to-Peer Systems (IPTPS '02), 2002.
    • (2002) The sybil attack.
    • Douceur, J.R.1
  • 4
    • 84942426861 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. First International Workshop on Sensor Network Protocols and Applications.
    • C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. First International Workshop on Sensor Network Protocols and Applications. IEEE, 2003, pp. 113-127.
    • (2003) IEEE , pp. 113-127
    • Karlof, C.1    Wagner, D.2
  • 6
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation, ACM Trans.
    • W. Xu, W. Trappe, Y. Zhang, Defending wireless sensor networks from radio interference through channel adaptation, ACM Trans. Sensor Network 4(4), 18-34.
    • Sensor Network , vol.4 , Issue.4 , pp. 18-34
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 11
    • 84884014378 scopus 로고    scopus 로고
    • Zigbee Specification
    • Z. Alliance, Zigbee Specification, 2013. <>. http://www.zigbee.org/Specifications.aspx.
    • (2013)
    • Alliance, Z.1
  • 16
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of an authenticated key exchange protocol for sensor networks
    • Tian X., Wong D., Zhu.R. Analysis and improvement of an authenticated key exchange protocol for sensor networks. Commun. Lett. (IEEE) 2005, 9(11):970-972.
    • (2005) Commun. Lett. (IEEE) , vol.9 , Issue.11 , pp. 970-972
    • Tian, X.1    Wong, D.2    Zhu, R.3
  • 18
    • 0019292439 scopus 로고
    • Protocols for public key cryptosystems.
    • IEEE
    • R.C. Merkle, Protocols for public key cryptosystems. Symposium on Security and Privacy. IEEE, 1980, pp. 122-134.
    • (1980) Symposium on Security and Privacy. , pp. 122-134
    • Merkle, R.C.1
  • 19
    • 0036806148 scopus 로고    scopus 로고
    • Compressed bloom filters.
    • Edited by ACM.
    • M. Mitzenmacher, Compressed bloom filters. Edited by ACM. Transactions on Networking 10 (5) (2002) 604-612.
    • (2002) Transactions on Networking , vol.10 , Issue.5 , pp. 604-612
    • Mitzenmacher, M.1
  • 20
    • 77953034949 scopus 로고    scopus 로고
    • Efficient implementation of elliptic curve cryptography in wireless sensors
    • Aranha D., Dahab R., López J., Oliveira L. Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 2010, 4(2):169-187.
    • (2010) Adv. Math. Commun. , vol.4 , Issue.2 , pp. 169-187
    • Aranha, D.1    Dahab, R.2    López, J.3    Oliveira, L.4
  • 27
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • Springer-Verlag, 294-307
    • Lee J., Stinson D. Deterministic key predistribution schemes for distributed sensor networks. Lecture Notes in Computer Science 2005, 3357. Springer-Verlag, 294-307.
    • (2005) Lecture Notes in Computer Science , vol.3357
    • Lee, J.1    Stinson, D.2
  • 28
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Camtepe S., Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE Trans. Networking (IEEE) 2007, 15(2):346-358.
    • (2007) IEEE Trans. Networking (IEEE) , vol.15 , Issue.2 , pp. 346-358
    • Camtepe, S.1    Yener, B.2
  • 29
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: a survey
    • Al-Karaki J.N., Kamal A.E. Routing techniques in wireless sensor networks: a survey. Wireless Commun. (IEEE) 2004, 11:6-28.
    • (2004) Wireless Commun. (IEEE) , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 34
    • 85031307530 scopus 로고
    • Highly dynamic destination sequenced distance-vector routing for mobile computers
    • Perkins C., Bhagwat P. Highly dynamic destination sequenced distance-vector routing for mobile computers. ACM's Comput. Commun. Rev. (ACM) 1994, 234-244.
    • (1994) ACM's Comput. Commun. Rev. (ACM) , pp. 234-244
    • Perkins, C.1    Bhagwat, P.2
  • 36
    • 84884095509 scopus 로고    scopus 로고
    • Dynamic sourcerrouting
    • Kulwer Academic Press, 153-181
    • Johnson D., Maltz D. Dynamic sourcerrouting. Mobile Computing 1996, Kulwer Academic Press, 153-181.
    • (1996) Mobile Computing
    • Johnson, D.1    Maltz, D.2
  • 37
    • 0035415758 scopus 로고    scopus 로고
    • The performance of query control scheme for the zone routing protocol
    • Haas Z., Pearlman M. The performance of query control scheme for the zone routing protocol. Trans. Networking (IEEE) 2001, 427-438.
    • (2001) Trans. Networking (IEEE) , pp. 427-438
    • Haas, Z.1    Pearlman, M.2
  • 39
    • 70449525340 scopus 로고    scopus 로고
    • Detecting sybil attacks in wireless sensor networks using neighboring information
    • December
    • Ssu Kuo-Feng, Wei-Tong Wang, Wen-Chung Chang Detecting sybil attacks in wireless sensor networks using neighboring information. Comput. Networks (Elsevier) December 2009, 53(18):3042-3056.
    • (2009) Comput. Networks (Elsevier) , vol.53 , Issue.18 , pp. 3042-3056
    • Ssu, K.-F.1    Wei-Tong, W.2    Wen-Chung, C.3
  • 42
    • 2342537739 scopus 로고    scopus 로고
    • Joint scheduling and power control for wireless ad hoc networks
    • ElBatt T., Ephremides A. Joint scheduling and power control for wireless ad hoc networks. IEEE Trans. Wireless Commun. 2004, 3(1):74-85.
    • (2004) IEEE Trans. Wireless Commun. , vol.3 , Issue.1 , pp. 74-85
    • ElBatt, T.1    Ephremides, A.2
  • 43
    • 84883922279 scopus 로고    scopus 로고
    • Std.802.15.4, IEEE. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). IEEE Press
    • Std.802.15.4, IEEE. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). IEEE Press, 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.