메뉴 건너뛰기




Volumn 7, Issue 1, 2014, Pages 88-98

A secure many-to-many routing protocol for wireless sensor and actuator networks

Author keywords

Actuator network; Routing; Security; Sensor network

Indexed keywords

ACTUATORS; ENERGY EFFICIENCY; INTERNET PROTOCOLS; NETWORK ROUTING; NETWORK SECURITY; ROUTING PROTOCOLS; SENSOR NETWORKS; SENSOR NODES;

EID: 84894068172     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.548     Document Type: Article
Times cited : (8)

References (22)
  • 1
    • 0033900912 scopus 로고    scopus 로고
    • Multicast routing algorithms and protocols: a tutorial
    • Sahasrabuddhe LH, Biswanath M. Multicast routing algorithms and protocols: a tutorial. IEEE Networks 2000; 14: 90-102.
    • (2000) IEEE Networks , vol.14 , pp. 90-102
    • Sahasrabuddhe, L.H.1    Biswanath, M.2
  • 2
    • 77953852618 scopus 로고    scopus 로고
    • Secure sensor network routing: a clean state approach. In Proceedings of CoNEXT'06
    • Parno B, Gaustad E, Luk M. Secure sensor network routing: a clean state approach. In Proceedings of CoNEXT'06, 2006.
    • (2006)
    • Parno, B.1    Gaustad, E.2    Luk, M.3
  • 3
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
    • (2003)
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 4
    • 85177225747 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensor Networks. In Proceedings of MOBICOM'01
    • Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. In Proceedings of MOBICOM'01, 2001.
    • (2001)
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.D.5
  • 5
    • 34547466172 scopus 로고    scopus 로고
    • seven cardinal properties of sensor network broadcast authentication. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06)
    • Mark L, Perrig A, Whillock B. seven cardinal properties of sensor network broadcast authentication. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006.
    • (2006)
    • Mark, L.1    Perrig, A.2    Whillock, B.3
  • 6
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of INFOCOM'03
    • Hu Y-C, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of INFOCOM'03, 2003.
    • (2003)
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 7
    • 18844362199 scopus 로고    scopus 로고
    • Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In Proceedings of Sensys'03 Poster Session
    • Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In Proceedings of Sensys'03 Poster Session, 2003.
    • (2003)
    • Tanachaiwiwat, S.1    Dave, P.2    Bhindwale, R.3    Helmy, A.4
  • 8
    • 70349312266 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks
    • IOS Press: Amsterdam, The Netherlands
    • Acs G, Buttyan L. Secure routing in wireless sensor networks. In Wireless Sensor Network Security. IOS Press: Amsterdam, The Netherlands, 2008.
    • (2008) Wireless Sensor Network Security
    • Acs, G.1    Buttyan, L.2
  • 9
    • 84907549442 scopus 로고    scopus 로고
    • Energy aware routing for low energy ad hoc sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference
    • Shah RC, Rabaey JM. Energy aware routing for low energy ad hoc sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference, 2002.
    • (2002)
    • Shah, R.C.1    Rabaey, J.M.2
  • 10
    • 84894028534 scopus 로고    scopus 로고
    • Hierarchical power-aware routing in sensor networks. In Proceedings of the DIMACS Workshop on Pervasive Networking
    • Li Q, Aslam J, Rus D. Hierarchical power-aware routing in sensor networks. In Proceedings of the DIMACS Workshop on Pervasive Networking, 2001.
    • (2001)
    • Li, Q.1    Aslam, J.2    Rus, D.3
  • 11
    • 84907688804 scopus 로고    scopus 로고
    • Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference
    • Dulman S, Nieberg T, Wu J. Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference, 2003.
    • (2003)
    • Dulman, S.1    Nieberg, T.2    Wu, J.3
  • 12
    • 84894041591 scopus 로고    scopus 로고
    • INSENS: INtrusion-tolerant routing in wireless SEnsor NetworkS. In Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS)
    • Deng J, Han R, Mishra S. INSENS: INtrusion-tolerant routing in wireless SEnsor NetworkS. In Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS), 2003.
    • (2003)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 13
    • 0035727475 scopus 로고    scopus 로고
    • A multipath routing approach for secure data delivery. In Proceedings of Military Communications Conference 2001 (Milcom'01)
    • Lou W, Fang Y. A multipath routing approach for secure data delivery. In Proceedings of Military Communications Conference 2001 (Milcom'01), 2001.
    • (2001)
    • Lou, W.1    Fang, Y.2
  • 14
    • 34547477757 scopus 로고    scopus 로고
    • SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06)
    • Wood AD, Fang L, Stankovic JA, He T. SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006.
    • (2006)
    • Wood, A.D.1    Fang, L.2    Stankovic, J.A.3    He, T.4
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc and Sensor Networks (Elsevier) 2003; 1: 293-315.
    • (2003) Ad Hoc and Sensor Networks (Elsevier) , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 16
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy
    • Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, 2003.
    • (2003)
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 17
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04
    • Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04, 2004.
    • (2004)
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 18
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security
    • Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
    • (2003)
    • Liu, D.1    Ning, P.2
  • 19
    • 85177497795 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00
    • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00, 2000.
    • (2000)
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 20
    • 34247573439 scopus 로고    scopus 로고
    • SENDROM: sensor networks for disaster relief operations management
    • Cayirci E, Coplu T. SENDROM: sensor networks for disaster relief operations management. Wireless Networks 2007; 13: 409-423.
    • (2007) Wireless Networks , vol.13 , pp. 409-423
    • Cayirci, E.1    Coplu, T.2
  • 21
    • 0034445661 scopus 로고    scopus 로고
    • System architecture directions for network sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
    • Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K. System architecture directions for network sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
    • (2000)
    • Hill, J.1    Szewczyk, R.2    Woo, A.3    Hollar, S.4    Culler, D.5    Pister, K.6
  • 22
    • 0033877788 scopus 로고    scopus 로고
    • Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences
    • Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences, 2000.
    • (2000)
    • Heinzelman, W.R.1    Chandrakasan, A.2    Balakrishnan, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.