메뉴 건너뛰기




Volumn , Issue , 2007, Pages 367-409

Wireless sensor network security: A survey

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85037175440     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (209)

References (94)
  • 6
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 7
    • 0035505507 scopus 로고    scopus 로고
    • Routing with guaranteed delivery in ad hoc wireless networks
    • P. Bose, P. Morin, I. Stojmenović, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001.
    • (2001) Wirel. Netw. , vol.7 , Issue.6 , pp. 609-616
    • Bose, P.1    Morin, P.2    Stojmenović, I.3    Urrutia, J.4
  • 11
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Computer Magazine, pages 103–105, 2003.
    • (2003) IEEE Computer Magazine , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 12
    • 25844435733 scopus 로고    scopus 로고
    • Pike: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig. Pike: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom 2005, 2005.
    • (2005) IEEE Infocom 2005
    • Chan, H.1    Perrig, A.2
  • 14
    • 85056977655 scopus 로고    scopus 로고
    • http://www.xbow.com/wireless_home.aspx, 2006.
    • (2006)
  • 38
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Mobile Computing and Networking, pages 56–67, 2000.
    • (2000) Mobile Computing and Networking , pp. 56-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 40
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal
    • C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, September 2003.
    • (2003) Special Issue on Sensor Network Applications and Protocols , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 44
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Y.W. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw., 2(1):65–93, 2006.
    • (2006) ACM Trans. Sen. Netw. , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 47
    • 84866469313 scopus 로고    scopus 로고
    • Serloc: Robust localization for wireless sensor networks
    • L. Lazos and R. Poovendran. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73–100, 2005.
    • (2005) ACM Trans. Sen. Netw , vol.1 , Issue.1 , pp. 73-100
    • Lazos, L.1    Poovendran, R.2
  • 49
    • 29844451556 scopus 로고    scopus 로고
    • Enforcing cooperative resource sharing in untrusted peerto- peer environment
    • Z. Liang and W. Shi. Enforcing cooperative resource sharing in untrusted peerto- peer environment. ACMJournal of Mobile Networks and Applications (MONET), 10(6):771–783, 2005.
    • (2005) Acmjournal of Mobile Networks and Applications (MONET) , vol.10 , Issue.6 , pp. 771-783
    • Liang, Z.1    Shi, W.2
  • 50
    • 27544488231 scopus 로고    scopus 로고
    • PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing
    • Waikoloa Village, Hawaii, January
    • Z. Liang and W. Shi. PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing. In Proceedings of the HICSS-38, Waikoloa Village, Hawaii, January 2005.
    • (2005) Proceedings of the HICSS-38
    • Liang, Z.1    Shi, W.2
  • 52
    • 85000276942 scopus 로고    scopus 로고
    • MultilevelμTESLA: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning. MultilevelμTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys., 3(4):800–836, 2004.
    • (2004) Trans. on Embedded Computing Sys. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 53
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41–77, 2005.
    • (2005) ACM Trans. Inf. Syst. Secur. , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 57
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library rfid: Issues, practices, and architectures
    • D. Molnar and D. Wagner. Privacy and security in library rfid: Issues, practices, and architectures. In ACM CCS, 2004.
    • (2004) ACM CCS
    • Molnar, D.1    Wagner, D.2
  • 58
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56–64, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 64
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53–57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 69
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli and D. Hutchison. A survey of key management for secure group communication. ACM Comput. Surv., 35(3):309–329, 2003.
    • (2003) ACM Comput. Surv. , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 72
    • 33845496940 scopus 로고    scopus 로고
    • An improved intrusion detection method based on process profiling
    • I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316–3326, 2002.
    • (2002) IPSJ Journal , vol.43 , Issue.11 , pp. 3316-3326
    • Sato, I.1    Okazaki, Y.2    Goto, S.3
  • 78
    • 14344252668 scopus 로고    scopus 로고
    • Real-time communication and coordination in embedded sensor networks
    • J. A. Stankovic et al. Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE, 91(7):1002–1022, July 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.7 , pp. 1002-1022
    • Stankovic, J.A.1
  • 88
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer, 35(10):54–62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 91
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004, 2004.
    • (2004) IEEE INFOCOM 2004
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 94
    • 85056928986 scopus 로고    scopus 로고
    • http://www.zigbee.org/, 2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.