참고문헌
- J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Sensor Networks' , In Proc. of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003
- Y.C. Hu, A. Perrig, D.B. Johnson, 'Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols', In Proc. of 2nd ACM Workshop on Wireless Security(WiSe' 03), 2003
- A. Perrig, J. Stankovic, and D. Wagner, 'Security in Wireless Sensor Networks,' CACM, Vol. 47, No. 6, June 2004
- ADRIAN PERRIG, ROBERT SZEWCZYK, J.D. TYGAR, VICTOR WEN and DAVID E. CULLER, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks 8, 521-534, 2002 https://doi.org/10.1023/A:1016598314198
- O. Goldreich, S, Goldwasser and S. Micali, 'How to construct random functions,' Journal of the ACM 33(4), 792-807, 1986 https://doi.org/10.1145/6490.6503
- A. Perrig, R. Canetti, D.Song and J.F.Tygar, 'Efficient and secure source authentication for multicast,' Network and Distributed System Security Symposium, NDSS' 01, 2001
- A. Perrig, R. Canetti, J.F.Tygar and D.Song, 'Efficient Authentication and Signing of multicast streams over lossy channels,' IEEE Symposium on Security and Privacy, 2000