참고문헌
- P. Brutch and C. Ko, 'Challenges in intrusion detection for wireless ad-hoc networks,' Symposium on Applications and the Internet Workshops (SAINT), pp.368-373, 2003
- 최경진, 윤명준, 심인보, 이재용, '무선 센서 네트워크에서의 에너지 효율적인 클러스터 헤드 선출 알고리즘', 한국통신학회논문지, Vol.32, No.6, pp.342-349, 2007
- Youtao Zhang, Jun Yang, and Weijia Li, 'Towards Energy-Efficient Code Dissemination in Wireless Sensor Networks,' IEEE International Symposium on Parallel and Distributed Processing, pp.1-5, 2008 https://doi.org/10.1109/IPDPS.2008.4536396
- R. Panta, I. Khalil, and S. Bagchi, 'Stream: Low Overhead Wireless Reprogramming,' IEEE Conference on Computer Communications (INFOCOM), pp.928-936, 2007 https://doi.org/10.1109/INFCOM.2007.113
- Weijia Li, Youtao Zhang, Jun Yang, and Jiang Zheng, 'UCC: Update-conscious Compilation for Energy Efficiency in Wireless Sensor Networks,' ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), San Diego, California, Vol.42, No.6, pp.383-393, June, 2007 https://doi.org/10.1145/1250734.1250778
- M. D. Krasniewski, S. Bagchi, C-L. Yang, and W. J. Chappell, 'Energy-efficient, On-demand Reprogramming of Large-scale Sensor Networks,' Transactions on Sensor Network (TOSN), Vol.4, No.2, 2008 https://doi.org/10.1145/1325651.1325653
- W Tang, W Kuang, B Wang, and J Yang, 'E3NP: An Energy-Efficient, Expeditious Network Reprogramming Mechanism in Wireless Sensor Network,' Embedded Software and Systems (ICESS), pp.516-523, 2008 https://doi.org/10.1109/ICESS.2008.74
- Michele Rossi, Giovanni Zanca, Luca Stabellini, Riccardo Crepaldi, Albert F. Harris III and Michele Zorzi, 'SYNAPSE: A Network Reprogramming Protocol for wireless sensor networks using fountain codes,' IEEE SECON, pp.188-196, 2008 https://doi.org/10.1109/SAHCN.2008.32
- P. J. Marron, M. Gauger, A. Lachenmann, D. Minder, O.Saukh, and K. Rothermel, 'Flexcup: A flexible and efficient code update mechanism for sensor networks,' European Workshop on Wireless Sensor Networks (EWSN), pp.212-227, 2006 https://doi.org/10.1007/11669463_17
- Adam Dunkels, Niclas Finne, Joakim Eriksson, and Thiemo Voigt, 'Run-Time Dynamic Linking for Reprogramming Wireless Sensor Networks,' Embedded Networked Sensor Systems (SenSys), pp.15-28, 2006 https://doi.org/10.1145/1182807.1182810
- P. E. Lanigan, R. Gandhi, and P. Narasimhan, 'Sluice: Secure dissemination of code updates in sensor networks,' Distributed Computing Systems (ICDCS), pp.53-63, July, 2006 https://doi.org/10.1109/ICDCS.2006.77
- P. K. Dutta, J.W. Hui, D. C. Chu, and D. E. Culler, 'Securing the Deluge network programming system,' Information Processing in Sensor Networks (IPSN), pp.326-333, 2006 https://doi.org/10.1109/IPSN.2006.243821
- DENG, J., HAN, R., and MISHRA, S, 'Secure code distribution in dynamically programmable wireless sensor networks,' Information Processing in Sensor Networks (IPSN), pp.292-300, 2006 https://doi.org/10.1109/IPSN.2006.243786
- Jing Deng, Richard Han, and Shivakant Mishra, 'Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks,' Pervasive Computing and Communications Workshops (PERCOMW), pp.272-277, 2006 https://doi.org/10.1109/PERCOMW.2006.48
- Sokjoon Lee, Howon Kim, and Kyoil Chung, 'Hashbased Secure Sensor Network Programming Method without Public Key Cryptography,' World-Sensor-Web at International Conference on Embedded Networked Sensor Systems, 2006
- D. H. Kim, R. Gandhi, and P. Narasimhan, 'Exploring Symmetric Cryptography for Secure Network Reprogramming,' Wireless Ad hoc and Sensor Networks, Canada, pp.17-25, 2007 https://doi.org/10.1109/ICDCSW.2007.37
- Kwangkyu Park, JongHyup Lee, Taekyoung Kwon and Jooseok Song, 'Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks,' Ubiquitous Intelligence and Computing, LNCS 4611, pp.653-662, 2007 https://doi.org/10.1007/978-3-540-73549-6_64
- H Tan, S Jha, D Ostry, J Zic, and V Sivaraman, 'Secure multi-hop network programming with multiple one-way key chains,' ACM conference on Wireless network, pp.183-193, 2008. https://doi.org/10.1145/1352533.1352564
- S Hyun, P Ning, A Liu, and W Du, 'Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks,' Information Processing in Sensor Networks (IPSN), pp.445-456, 2008 https://doi.org/10.1109/IPSN.2008.12
- 신승목, 최임성, 김광조, '무선 센서 네트워크에서의 안전한 네트워크 재프로그래밍 기법', 한국정보보호학회 하계학술대회(CISC), 2008
- D. W. A. Poschmann and A. Weimerskirch, 'Dynamic Code Update for the Efficient Usage of Security Components in WSNs,' KiVS Industribeitrage, Kurzbeitrage und Workshops. Berlin: VDE Verlag, pp.445-455, 2007
- Aurelien Francillon, and Claude Castelluccia, 'Code Injection Attacks on Harvard-Architecture Devices,' ACM conference on Computer and communications security, pp.15-26, 2008 https://doi.org/10.1145/1455770.1455775
- S.Brwon, 'Updating Software in Wireless Sensor Networks: A Survey,' Dept. of Computer Science, National Univ. of Ireland, Maynooth, Tech. Rep., 2006
- J. W. Hui and D. and Culler, 'The dynamic behavior of a data dissemination protocol for network programming at scale,' International conference on Embedded networked sensor systems, pp.81-94, 2004 https://doi.org/10.1145/1031495.1031506
- Jeong J. and Culler.D, 'Incremental network programming for wireless sonsors,' Sensor and Ad Hoc Communications and Networks, pp.25-33, 2004 https://doi.org/10.1109/SAHCN.2004.1381899