참고문헌
- W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE, 2004
- I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks:a survey, Computer Networks, 38:393-422, December. 2002 https://doi.org/10.1016/S1389-1286(01)00302-4
- F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons Ltd, 2002
- M. Eltoweissy, H. Heydari, L. Morales, and H. Sudborough, Combinatorial Optimization for Key Management in Secure Multicast Environments, Journal of Network and Ssytem Management, Kluwer Publishing, 2004
- A-S. K. Pathan, H. W. Lee, C. S. Hong, Security in Wireless Sensor Networks: Issues and Challenges, ICACT 2006, vol.2, pp.1043-1048, Feb, 2006
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, SPINS : Security Protocols for Sensor Networks, Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001
- L. Zhou, and Z. J. Haas, Securing ad hoc networks, IEEE Network, Vol.13, Issue 6, pp. 24-30, Nov.-Dec. 1999
- B. Strulo, J. Farr, and A. Smith, Securing Mobile Ad hoc Networks -A Motivational Approach, BT Technology Journal, Vol.21, Issue 3, pp. 81-89, 2003 https://doi.org/10.1023/A:1025111232045
- H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks: Challenges and Solutions, IEEE Wireless Communications, Vol.11, Issue 1, pp.38-47, Feb. 2004
- K. Wu, C. Liu, V. King, Very low cost sensor localization for hostile environments, ICC 2005, Vol.5, pp.3197-3201, 16-20 May, 2005
- T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2004
- W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy efficient communication protocol for wireless microsensor networks, IEEE Proceedings of the Hawaii International conference on System Sciences, pp.1-10, January 2000
- H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, pp.197-213, May, 2003
- L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, pp.41-47, Nov. 2002
- H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for Sensor networks," In IEEE Symposium on Research in Security and Privacy, pp.197-213, May, 2003
- S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
- Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks,' In the proc. of 10th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, pp. 1577-1583, Feb. 2003
- M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in Cryptology -CRYPTO'89, pp.324-334, 1989, INCS Vol. 435, Springer-verlag
- A. Aimbola, S. Qi and M. Merabti, 'Nethostsensor: a novel concept in intrusion detection systems,' Proceedings. Eighth IEEE International Symposium on Computers and Communication, 2003(ISCC 2003), pp.232-237, 2003
- Xiao Chen, Jawad Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Network,' Mobile Adhoc and Sensor Systems Conference 2005 IEEE International Confercence, pp. 6, Nov. 2005
- L. B. Oliveira, H. C. Wang, A. A. Loureiro, 'LHA-SP:secure protocols for hierarchical wireless sensor networks,' In 9th IFIP/IEEE International Symposium on Integrated Network Management, pp. 31-44, 15-19. May. 2005
- F. Yea, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies in INFOCOM 2004, pp.2446-2457, March. 2004
- J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, 'System architecture directions for networked sensors,' In ACM 9th ASPLOS'03, pp. 93-104, 2000
- A. Siraj, R. B. Vaughn, S. M. Bridges, 'Intrusion sensor data fusion in an intelligent intrusion detection system architecture,' Proceedings of the 37th Annual Hawaii International Conference on System Sciences, Jan, 2004