참고문헌
- Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey, Computer Networks (Elsevier) Journal, Vol. 38, No. 4, pp. 393-422, March 2002 https://doi.org/10.1016/S1389-1286(01)00302-4
- Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography, Proceedings EUROCRYPT 84, LNCS, Springer-Verlag, 209, pp. 335-338, 1985
- Blundo, C., DE Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M.: Perfectly secure key distribution for dynamic conferences,' In Advances in Cryptology - CRYPTO '92, LNCS 740, pp. 471-486, 1993
- Camtepe, S. A. Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Surve,. Rensselaer Polytechnic Institute RPI, Technical Report TR-05-07, (March 23, 2005)
- Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003
- Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644-654, November 1976 https://doi.org/10.1109/TIT.1976.1055638
- Du, W., Deng, J., Han, Y. S., and Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS'03), pp. 42-51, 2003 https://doi.org/10.1145/948109.948118
- Eschenauer, L., Gligor, V. D.: A key management scheme for distributed sensor networks, In Proceeding of the $9^{th}$ ACM Conf. on Computer and Communications Security, pp. 41-47, 2002 https://doi.org/10.1145/586110.586117
- Huang, D. , Mehta, M., Mehdi, D, Harm, L.: Location-aware Key Management Scheme for Wireless Sensor Networks, Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), pp. 29-42, October 2004 https://doi.org/10.1145/1029102.1029110
- Hwang, J. M., Kim, Y. D.: Revisiting random key pre-distribution schemes for wireless sensor networks, Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43-52, 2004 https://doi.org/10.1145/1029102.1029111
- Li, J., Janotti, J., DeCouto, D. S. J. , Karger, D. R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing, The Sixth Annual International Conf. on Mobile Computing and Networking, pp. 120-130, August 2000 https://doi.org/10.1145/345910.345931
- Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communi-cations Security (CCS'03), pp. 52-61, 2003 https://doi.org/10.1145/948109.948119
- McCune, J., Shi, E., Perrig, A., Reiter, M.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts, In Proceedings of the IEEE Symposium on Security and Privacy, May 2005 https://doi.org/10.1109/SP.2005.7
- Newsome, J., Shi, E., Song D., Perrig A.: The Sybil Attack in Sensor Networks: Analysis and Defense., In Proceedings of Information Processing in Sensor Networks (IPSN), April 2004 https://doi.org/10.1109/IPSN.2004.1307346
- Parno, B., Perrig, A., and Gligor V.: Distributed Detection of Node Replication Attacks in Sensor Networks, Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005 https://doi.org/10.1109/SP.2005.8
- Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., Tygar, J. D.: SPINS: security protocols for sensor networks, MOBICOM, pp. 189-199, 2001 https://doi.org/10.1145/381677.381696
- Rivest, R. L., Shamir, A., Adleman, L. M: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2): pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
- Schmidt, JS. , Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks, Security in Ad-hoc and Sensor Networks, LNCS 3313, pp 166-177, Springer-Verlag Berlin Heidelberg 2005
- Wood, A.,Stankovic, J. A.: Denial of Service in Sensor Networks, IEEE Computer, 35(10): pp. 54-62, October 2002 https://doi.org/10.1109/MC.2002.1039518