메뉴 건너뛰기




Volumn , Issue , 2017, Pages 66-72

A survey on wireless sensor networks security issues and military specificities

Author keywords

Attacks; Cryptographic protocols; Vulnerabilities; Wireless Sensor Networks

Indexed keywords

ELECTRONIC DATA INTERCHANGE; MILITARY APPLICATIONS; NETWORK SECURITY;

EID: 85027833126     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASET.2017.7983668     Document Type: Conference Paper
Times cited : (49)

References (35)
  • 2
    • 85031312466 scopus 로고    scopus 로고
    • Saif ullah military applications using wireless sensor Networks: A survey
    • June
    • Ishfaq Ahmad, Khalil Shah, Saif Ullah Military Applications using Wireless Sensor Networks: A survey, International Journal of Engineering Science and Computing, Volume 6 Issue No. 6, June 2016.
    • (2016) International Journal of Engineering Science and Computing , vol.6 , Issue.6
    • Ahmad, I.1    Shah, K.2
  • 6
    • 84984612212 scopus 로고    scopus 로고
    • Security issues in wireless sensor networks: Attacks and Countermeasures
    • K. CHELLI, Security Issues in Wireless Sensor Networks: Attacks and Countermeasures, Proceedings of the World Congress on Engineering, Volume 1, 2015.
    • (2015) Proceedings of the World Congress on Engineering , vol.1
    • Chelli, K.1
  • 10
    • 36248995256 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless sensor networks
    • Critical Infrastructure Protection
    • Yurong Xu, Guanling Chen, James Ford, Fillia Makedon, Detecting Wormhole Attacks in Wireless Sensor Networks, IFIP International Federation for Information Processing, Volume 253, Critical Infrastructure Protection, Pages 267 279, 2008.
    • (2008) IFIP International Federation for Information Processing , vol.253 , pp. 267-279
    • Xu, Y.1    Chen, G.2    Ford, J.3    Makedon, F.4
  • 13
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and Countermeasures
    • C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad Hoc Networks, Pages 293 315, 2003.
    • (2003) Ad Hoc Networks , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 16
    • 37149010269 scopus 로고    scopus 로고
    • A new resilient key management protocol for wireless sensor networks
    • Chakib Bekara, Maryline Laurent-Maknavicius, A new resilient key management protocol for wireless sensor networks, WISTP, Volume 4462, Pages 14-26, 2007
    • (2007) WISTP , vol.4462 , pp. 14-26
    • Bekara, C.1    Laurent-Maknavicius, M.2
  • 17
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • IEEE Computer Society
    • Donggang Liu, Peng Ning, Wenliang Du., Detecting malicious beacon nodes for secure location discovery in wireless sensor networks, ICDCS, Pages 609 619. IEEE Computer Society, 2005.
    • (2005) ICDCS , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.3
  • 22
    • 47649113722 scopus 로고    scopus 로고
    • An energy efficient link-layer security protocol for wireless Sensor Networks
    • Leonard E. Lighfoot, Jian Ren, Tongtong Li, An Energy Efficient Link-Layer Security Protocol for Wireless Sensor Networks, IEEE EIT, 2007.
    • (2007) IEEE EIT
    • Lighfoot, L.E.1    Ren, J.2    Li, T.3
  • 27
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-Aware end-To-end data security in wireless sensor networks
    • Ren K., Lou W., Zhang Y., LEDS: Providing location-Aware end-To-end data security in wireless sensor networks, Proc. IEEE INFOCOM, 2006.
    • (2006) Proc IEEE INFOCOM
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 28
    • 33750417077 scopus 로고    scopus 로고
    • Efficient and authenticated key agreement mechanism in low-Rate WPAN Environment
    • Phuket, Thailand, Pages, January 2006
    • Heo J., C.S. Hong, Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment, International Symposium on Wireless Pervasive Computing 2006, Phuket, Thailand, Pages 1-5, January 2006.
    • (2006) International Symposium on Wireless Pervasive Computing , pp. 1-5
    • Heo, J.1    Hong, C.S.2
  • 30
    • 85027865424 scopus 로고    scopus 로고
    • Application-based classification and comparison of secure Routing Protocols in Wireless sensor Networks: A Survey
    • June
    • A. K. Imran, A. Farooq, A. B. Waleed, N. Mudasser, Application-based Classification and Comparison of Secure Routing Protocols in Wireless sensor Networks: A Survey, Smart Computing Review, vol. 5, no. 3, June 2015.
    • (2015) Smart Computing Review , vol.5 , Issue.3
    • Imran, A.K.1    Farooq, A.2    Waleed, A.B.3    Mudasser, N.4
  • 32
    • 85002179475 scopus 로고    scopus 로고
    • Comparative analysis of selective forwarding attacks over Wireless Sensor Networks
    • February
    • Naser M. Alajmi, Khaled M. Elleithy, Comparative Analysis of Selective Forwarding Attacks over Wireless Sensor Networks, International Journal of Computer Applications Volume 111, No 14, February 2015.
    • (2015) International Journal of Computer Applications , vol.111 , Issue.14
    • Alajmi, N.M.1    Elleithy, K.M.2
  • 34
    • 79955162431 scopus 로고    scopus 로고
    • Enhanced security protocol in wireless sensor networks
    • Aseri T.C., Singla N., Enhanced Security Protocol in Wireless Sensor Networks, Int. J. of Computers, Communications Control, Vol. VI, No. 2, Pages. 214-221, 2011.
    • (2011) Int J. of Computers, Communications Control , vol.6 , Issue.2 , pp. 214-221
    • Aseri, T.C.1    Singla, N.2
  • 35
    • 85027845995 scopus 로고    scopus 로고
    • A secure routing protocol for wireless sensor networks Considering Secure Data Aggregation
    • Triana M. R., Sang-Gon L., Hoon-Jae L., A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation, Sensors 2015.
    • (2015) Sensors
    • Triana, M.R.1    Sang-Gon, L.2    Hoon-Jae, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.