참고문헌
- I.F.Akyiliz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A survey on sensor networks, IEEE Communications Magazine, August 2002, pp. 102-114
- R.Anderson, H.Chan and A. Perrig, Key infecition: Smart trust for smart dust, 12th IEEE International Conference on Network Protocols (ICNP), Oct. 2004
- S.Basagni, K.Herrin, D.Bruschi and E.Rosti, Secure pebblenets, MobiHOC 2001, pp. 156-163
- H.Chan, A.Perrig, and D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Research in Security and Privacy. 2003, pp. 197-213
- H.Chan and A.Perrig, Security and privacy in sensor networks, IEEE Computer, Octber 2003, pp.103-105
- W.Du, J.Deng, Y.Han and P.K.Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, CCS' 03, October 27-30, 2003, Washington, DC.
- L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, ACM CCS 2002, Nov.2002
- P.Ganessan, R.Venugopalan, P.Peddabachagari, A.Dean, F.Muller and M.Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, WSNA' 03, September 19, 2003, San Diego, California, USA
- G.Gaubatz, J.Kaps and B.Sunar, Public key cryptography in sensor networks-revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004
- P.Gorder, Sizing up smart dusts, Computing in Science & Engineering, 5(6), Nov.-Dec. 2003, pp.6-9 https://doi.org/10.1109/MCISE.2003.1238697
- C.Hartung, J.Balasalle and R.Han, Node compromise in sensor networks: The need for secure systems, Technical Report CUCS-988-04, Dept. of Computer Science, University of Colorado at Boulder, 2004
- J.Hill and D.E.CuiIer, Mica: a wireless platform for deeply embedded networks, IEEE Micro, Nov.-Dec. 2002, pp. 12-24
- Hill, M.Horton, R.Kling and L.Krishnamurthy, The platforms enabling wireless sensor networks, Communications of the ACM, Vol.47, No.6,June 2004, pp.41-46 https://doi.org/10.1145/990680.990705
- F.Hu, J.Ziobro, J.Tillett and N.Sharma, Secure wireless sensor networks: Problems and solutions,J. of SCI, to appear, 2004
- C.Karlof and D.Wagner, Secure routing in wireless sensor networks: Attacks and contemeasures, Ad Hoc Networks, vol. 1, issues 2-3 (Special Issue on Sensor Network Applications and Protocols), Elsevier, Sep, 2003, pp.293-315
- C.Karlof, N.Sastary and D.Wagner, Tinysec: A link layer security architecture for wireless sensor networks, ACM SenSys 2004, Nov. 3-5,2004
- Y.W.Law, S.Dulman, S.Etalle and P. Havinga, Assessing security-critical energy-efficient sensor networks, 18th IFIP International Information Security Conference, May 2003
- Y.W.Law and J.M.Doumen and P.H.Hartel, Benchmarking block ciphers for wireless sensor networks (Extended abstract), 1st IEEE Int, Conf, on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, Florida, Oct. 2004
- D.Liu and P.Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, NDSS' 03,2003
- D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
- D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
- D.Malan, M.Welsh and M.D.Smith, A Public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, IEEE SECON2004
- S.Marti, T.J.Giuli, K.Lai and M.Baker, Mitigating routing behavior in mobile ad hoc networks, Annual Internation Conference on Mobile Computing and Networking, Aug.2000
- A.Mishra, K.Nadkarni, and A.Patcha, Intrusion detection in wireless ad hoc networks, IEEE Wireless Communications, February 2004, pp.48-60
- A.Perrig, R.Canetti, D.Song and D.Tygar, Efficient and secure authentication for multicast, NDSS' 01, Feb.2001
- A.Perrig, J.Stankovic and D. Wagner, Security in wireless sensor networks, Commun. Of ACM, 47(5),June 2004, pp.5357
- A.Perrig, R.Szewczyk, J.D. Tygar, V.Wen and D.Culler, SPINS: Security protocols for sensor networks, Wireless Networks 8, Kluwer Academy Publishers, 2002, pp.521534 https://doi.org/10.1023/A:1016598314198
- J.Polastre, R.Szewczyk and D.Culler, Telos: enabling ultra-low power wireless research, Application notes 002, www.moteiv.com
- B.Przydatek, D.Song and A.Perrig, SIA:secure information aggregation in sensor networks, SenSys' 03, Nov.2003
- M.Tubaishat and S.Madria, Sensor networks: An overview, IEEE Potentials, April/May 2003, pp. 20-23
- D.Wagner, Resilient aggregation in sensor networks, Proc, of 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN'04), pp. 78-87, ACM Press, 2004
- J.P.WaIters, Z.Liang, W.Shi and V.Chaudhary, Wireless sensor network security: a survey, http//www. cs. wayne.edu/>weisong/pa pers/walters05-wsn-securitysurvey.pdf
- R.Watro, D.Kong, S.Cuti, C.Gardiner, C.Lynn and P.Kruus, TinyPK : Securing networks with public key technology, SASN '04, pp. 59-64, ACM Press, 2004
- A. D. Wooel and J.A.Stankovic, Denial of service in sensor networks, IEEE Computer, October 2002, pp. 54-62
- P-W. Yau and C.J.Mitchell, Reputation systems for routing security for mobile ad hoc networks, Sym.TIC' 03, Oct.2003
- S.Zhu, S.Setia, and S.J.Ajodia, LEAP: Efficient security mechanisms for large-scale distributed sensor networks, ACM CCS 2003, pp. 62-72.