메뉴 건너뛰기




Volumn 21, Issue 2, 2015, Pages 235-250

Security Completeness Problem in Wireless Sensor Networks

Author keywords

Privacy; Security; Trust; Wireless sensor networks

Indexed keywords


EID: 84926246175     PISSN: 10798587     EISSN: 2326005X     Source Type: Journal    
DOI: 10.1080/10798587.2014.970345     Document Type: Article
Times cited : (2)

References (49)
  • 3
    • 35248892909 scopus 로고    scopus 로고
    • Towards a flexible trust establishment framework for sensor networks
    • Aivaloglou, E., Gritzalis, S., & Skianis, C. (2007). Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems, 35, 207–213.
    • (2007) Telecommunication Systems , vol.35 , pp. 207-213
    • Aivaloglou, E.1    Gritzalis, S.2    Skianis, C.3
  • 5
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • Boukerche, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30, 2413–2427.
    • (2007) Computer Communications , vol.30 , pp. 2413-2427
    • Boukerche, A.1    Xu, L.2    El-Khatib, K.3
  • 6
    • 52049119700 scopus 로고    scopus 로고
    • Securing wireless sensor networks: security architectures
    • Boyle, D., & Newe, T. (2008). Securing wireless sensor networks: security architectures. Journal of Networks, 3, 65–77.
    • (2008) Journal of Networks , vol.3 , pp. 65-77
    • Boyle, D.1    Newe, T.2
  • 9
    • 84921068731 scopus 로고    scopus 로고
    • On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks
    • Published online 28 January 2014
    • Chen, H., & Lou, W. (2014). On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive and Mobile Computing. http://dx.doi.org/10.1016/j.pmcj.2014.01.006. Published online 28 January 2014.
    • (2014) Pervasive and Mobile Computing
    • Chen, H.1    Lou, W.2
  • 10
    • 84861929653 scopus 로고    scopus 로고
    • Configuration tool for a wireless sensor network integrated security framework
    • Cionca, V., Newe, T., & Dădârlat, V. T. (2012). Configuration tool for a wireless sensor network integrated security framework. Journal of Network and Systems Management, 20, 417–452.
    • (2012) Journal of Network and Systems Management , vol.20 , pp. 417-452
    • Cionca, V.1    Newe, T.2    Dădârlat, V.T.3
  • 15
    • 79551566748 scopus 로고    scopus 로고
    • Providing trust in wireless sensor networks using a bio-inspired technique
    • Gómez Mármol, F., & Martínez Pérez, G. (2011). Providing trust in wireless sensor networks using a bio-inspired technique. Telecommunication Systems, 46, 163–180.
    • (2011) Telecommunication Systems , vol.46 , pp. 163-180
    • Gómez Mármol, F.1    Martínez Pérez, G.2
  • 16
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Haowen Chan, A., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36, 103–105.
    • (2003) Computer , vol.36 , pp. 103-105
    • Haowen Chan, A.1    Perrig, A.2
  • 19
    • 77954086746 scopus 로고    scopus 로고
    • Secure encrypted-data aggregation for wireless sensor networks
    • Huang, S. I., Shieh, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16, 915–927.
    • (2010) Wireless Networks , vol.16 , pp. 915-927
    • Huang, S.I.1    Shieh, S.2    Tygar, J.D.3
  • 20
    • 84892954157 scopus 로고    scopus 로고
    • A secure trust establishment scheme for wireless sensor networks
    • Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A secure trust establishment scheme for wireless sensor networks. Sensors, 14, 1877–1897.
    • (2014) Sensors , vol.14 , pp. 1877-1897
    • Ishmanov, F.1    Kim, S.W.2    Nam, S.Y.3
  • 26
    • 84878297450 scopus 로고    scopus 로고
    • LDTS: A lightweight and dependable trust system for clustered wireless sensor networks
    • Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8, 924–935.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , pp. 924-935
    • Li, X.1    Zhou, F.2    Du, J.3
  • 27
  • 28
    • 77953302309 scopus 로고    scopus 로고
    • Source-location privacy through dynamic routing in wireless sensor networks
    • March
    • Li, Y., & Ren, J. (2010, March). Source-location privacy through dynamic routing in wireless sensor networks. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9)
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Li, Y.1    Ren, J.2
  • 29
  • 31
    • 52249120873 scopus 로고    scopus 로고
    • Efficient anonymity schemes for clustered wireless sensor networks
    • Misra, S., & Xue, G. (2006). Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks, 1, 50–63.
    • (2006) International Journal of Sensor Networks , vol.1 , pp. 50-63
    • Misra, S.1    Xue, G.2
  • 32
    • 84894068172 scopus 로고    scopus 로고
    • A secure many-to-many routing protocol for wireless sensor and actuator networks
    • Nguyen, S. T., Cayirci, E., & Rong, C. (2014). A secure many-to-many routing protocol for wireless sensor and actuator networks. Security and Communication Networks, 7, 88–98.
    • (2014) Security and Communication Networks , vol.7 , pp. 88-98
    • Nguyen, S.T.1    Cayirci, E.2    Rong, C.3
  • 35
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded Computing Systems, 3, 634–660.
    • (2004) ACM Transactions on Embedded Computing Systems , vol.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 38
    • 77955500884 scopus 로고    scopus 로고
    • Achieving network level privacy in wireless sensor networks
    • Shaikh, R. A., Jameel, H., D'auriol, B. J., Lee, H., Lee, S., & Song, Y. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10, 1447–1472.
    • (2010) Sensors , vol.10 , pp. 1447-1472
    • Shaikh, R.A.1    Jameel, H.2    D'auriol, B.J.3    Lee, H.4    Lee, S.5    Song, Y.6
  • 40
    • 33750300697 scopus 로고    scopus 로고
    • LSec: Lightweight security protocol for distributed wireless sensor network
    • Shaikh, R., Lee, S., Khan, M., & Song, Y. (2006). LSec: Lightweight security protocol for distributed wireless sensor network. In Personal wireless communications (pp. 367–377)
    • (2006) Personal wireless communications , pp. 367-377
    • Shaikh, R.1    Lee, S.2    Khan, M.3    Song, Y.4
  • 44
    • 77958545385 scopus 로고    scopus 로고
    • The case study of system architecture in wireless sensor networks: The kindergarten safety system (KSS)
    • Yang, J., & Jung, S. H. (2010). The case study of system architecture in wireless sensor networks: The kindergarten safety system (KSS). Intelligent Automation & Soft Computing, 16, 507–517.
    • (2010) Intelligent Automation & Soft Computing , vol.16 , pp. 507-517
    • Yang, J.1    Jung, S.H.2
  • 46
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35, 867–880.
    • (2012) Journal of Network and Computer Applications , vol.35 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 49
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2, 500–528.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.