참고문헌
- I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, 2002 https://doi.org/10.1109/MCOM.2002.1024422
- J. Burrell, T. Brooke, and R. Beckwith, "Vineyard computing: Sensor networks in agricultural production,' IEEE Pervasive Comput., vol. 3, no. 1, pp. 385, Jan–Mar. 2004
- Z. Benenson, N. Gedicke, and O. Raivio, "Realizing robust user authentication in sensor networks," in Proc. Workshop on Real-World Wireless Sensor Networks, 2005
- H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks,' Int. J. Security and Networks, vol. 1, nos. 3/4, pp. 127–137, 2006 https://doi.org/10.1504/IJSN.2006.011772
- N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proc. CHES, 2004, vol. 3156, LNCS, pp. 119–132
- C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," in Proc. SNPA, May 2003, pp. 113–127
- A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, 'SPINS: Security protocols for sensor networks," Wireless Netw., vol. 8, pp. 521–534, Sept. 2002 https://doi.org/10.1023/A:1016598314198
- J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," in Proc. Intl. Symp. Inf. Process. Sensor Networks, USA, Apr. 2004, pp. 259–268
- A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, pp. 54–62, Oct. 2002
- ANSI X9.63, Elliptic Curve Key Agreement and Key Transport Protocols, American Bankers Association, 1999
- Z. Benenson, L. Pimenidis, F. Freiling, and S. Lucks, "Authenticated query flooding in sensor networks," in Proc. the 4th IEEE Conf. Pervasive Comput. Commun. Workshops, Pisa, Italy, 2006, pp. 644–647
- G. Chen, J. Branch, M. J. Pflug, L. Zhu, and B. Szymanski, SENSE: A Sensor Network Simulator, Advances in Pervasive Computing and Networking, NY, USA: Springer, 2004, pp. 249–269
- J. Deepakumara, H. M. Heys, and R. Venkatesan, 'Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC)," in Proc. Newfoundland Electrical and Computer Engineering Conf., St. John’s, Newfoundland, Nov. 2003
- C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. SensSys, Nov. 2004, pp. 162–175
- A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," North Carolina State University, Department of Computer Science, Tech. Rep. (TR-2007-36), Nov. 2007
- A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography., FL, USA: CRC Press, 1997
- G. Prasanth, V. Ramnath, P. Pushkin, G. D. Alexander, M. Frank, and L. S. Mihail, "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. Second ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), Sept. 19, 2003, pp. 151–159
- T. S. Rappaport, Wireless Communications, Principles, and Practice, Prentice Hall, 1996