무선 센서 네트워크 보안

  • Published : 2006.09.01

Abstract

Keywords

References

  1. R. Blom, 'An Optimal Class of Symmetric Key Generation Systems,' In Proceedings of Advances in Cryptology EUROCRYPT' 84, LNCS, vol. 209, Springer- Verlag, pages 335-338, 1985
  2. H. Chan, A. Perrig, and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 197-213, 2003
  3. David E. Culler, 'Wireless Sensor Networks - the Next IT Revolution,' KES 2004, Oct 7, 2004
  4. B.?Doyle, 'S. Bell, A. F. Smeaton, K. McCusker, and N. O'Connor, Security considerations and key negotiation techniques for power constrained sensor networks,' In Proceedings of the Computer Journal (Oxford University Press), vol. 49, no. 4, pages 443-453, 2006
  5. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, 'A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,' In Proceedings of ACM CCS' 03, 2003
  6. W. Du, J. Dang, Y. S. Han, S. Chen, and P. K. Varshney, 'A key management scheme for wireless sensor networks using deployment knowledge,' In Proceedings of IEEE INFOCOM, March 2004
  7. L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' In Proceedings of the 9th ACM conference on Computer and communications security, pages 41 - 47, November 18-22 2002
  8. Fei Hu, Jason Tillet, Jim Ziobro, and Neeraj K. Sharma, 'Secure Wireless Sensor Networks: Problems and Solutions,' Journal on Systemics, Cybernetics and Informatics (Best Paper Award), Vol.1, No.9, 2004
  9. D. Huang, M. Mehta, D. Medhi, and L. Ham, 'Location-aware key management scheme for wireless sensor networks,' In Proceeding of 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, 2004
  10. C. Karlof, and D, Wagner, 'Secure routing in wireless sensor networksL Attacjs abd ciybterneasvres,' In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003
  11. D. J. Malan, M. Welsh, and M. D. Smith, 'A public - key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,' In Proceedings of The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004
  12. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tvsar. 'SPINS: Security protocols for sensor networks,' In Proceedings of ACM International Conference on Mobile Computing and Networks (MobiCom), 2001
  13. A. Perrig, D. Wagner, and J. Stankovic, 'Security in Wireless Sensor Networks,' In Proceedings of Communications of the ACM, page 53-57, 2004
  14. S. Zhu, S. Setia and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 62-72, 2003
  15. 'Key management guideline-workshop document,' draft. Available at http://csrc. nist.gov/encryption/kms/keymanagement-guideline-(workshopt)%.pdf, NIST, 2001
  16. 'TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.1),' Available at http://discovery.csc.ncsu.edu/software/TinyECC/, North Carolina State University
  17. MICAz : Wireless Measurement System, http://xbow.com/Products/Products_pdf_files/Wireless_pdf/6020-0060-01 A MICAz.pdf, 2004, Crossbow
  18. Telos rev.B : Enabling Ultra-Low Power Wireless Research, http://www.moteiv.com/products/docs/an002-telos.pdf, 2004, tmoteiv
  19. Intel Mote2 Overview, http://www.intel.com/research/downloads/imote_overview.pdf, 2005, intel-research