References
- D. W. Carman, P. S. Kruus, and B. J. Matt, 'Constraints and approaches for distributed sensor network security,' Technical report, NAI Labs, 2000
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' In Proceedings of the IEEE International Conference on Network Protocols(ICNP), Nov. 2002
- M. G. Zapata and N. Asokan, 'Securing ad hoc routing protocols,' In Proceedings of ACM Workshop on Wireless Security (WiSe), ACM Press, 2002 https://doi.org/10.1145/570681.570682
- Y-C. Hu, D. B. Johnson, and A. Perrig, 'Secure efficient distance vector routing in mobile wireless ad-hoc networks,' In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Jun. 2002 https://doi.org/10.1109/MCSA.2002.1017480
- Y.-C Hu, A. Perrig, and D. B. Johnson, 'Ariadne: a secure on-demand routing protocol for ad hoc networks,' In Proceedings of the 8th Annual International Conference on Mobile computing and Networking, Sep. 2002 https://doi.org/10.1145/570645.570648
- P. Papadimitratos and Z. Haas, 'Secure routing for mobile ad hoc networks,' In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' In Proceedings of 7th Annual International Conference on Mobile Computing and Networks MOBICOM 2001, Jul. 2001 https://doi.org/10.1145/381677.381696
- C. Karlof, N. Sastry, and D. Wagner, 'Tinyflec: a link layer security architecture for wireless sensor networks,' In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04), 2004 https://doi.org/10.1145/1031495.1031515
- J. Deng, R. Han, and S. Mishra, 'A performance evaluation of intrusion-tolerant routing in wireless sensor networks,' In Proceedings IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN '03), Apr. 2003
- G. G. Finn, 'Routing and addressing problems In large metropolitan-scale internetworks,' Technical Report ISI/RR-87-180, lSI, Mar. 1987
- B. Blum, T. He, S. Son, and J. Stankovic, 'IGF: A state-free robust communication protocol for wireless sensor networks,' Technical Report CS-2003-11, Univ. of Virginia, Charlottesville, VA, 2003
- B. Karp and H. T. Kung, 'GPSR: Greedy perimeter stateless routing for wireless networks,' In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), Aug. 2000 https://doi.org/10.1145/345910.345953
- Y-J. Kim, R. Govindan, B. Karp, and S. Shenker, 'Geographic routing made practical,' In Proceedings of USENIX Symposium on Networked Systems Design and Implementation, May 2005
- Z. J. Haas, M. R. Pearlm, and P. Samar, 'The Zone Routing Protocol (ZRP) for ad hoc networks,' IETF MANET Internet Draft, Jul. 2002
- Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He, 'SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks,' In Proceedings of the SASN'06, Oct. 30, 2006 https://doi.org/10.1145/1180345.1180351
- 도인실, 채기준, 김호원, '배치정보를 이용한 클러스터 기반 센서 네트워크 키 설정 메커니즘,' 한국정보처리학회논문지 13-C권 제2호, 2006년 4월 https://doi.org/10.3745/KIPSTC.2006.13C.2.195
- 'The Network Simulator: ns-2,' Available at: http://www.isi.edu/nsnam/ns [Last accessed; Jun 26, 2007.]
- C. Karlof and D. Wagner, 'Secure routing in wireless sensor networks: Attacks and countermeasures,' Elsevier's Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Sep. 2003
- Z. Yu and Y. Guan, 'A Robust Group based Key Management Scheme for Wireless Sensor Networks,' IEEE Communications Society, WCNC 2005 https://doi.org/10.1109/WCNC.2005.1424812
- IEEE 802.15.4 - 2003 IEEE Standard for Information Technology-Part 15.4: Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANS), 2003
- F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks,' In Proceedings of IEEE INFOCOM 2004