과제정보
연구 과제번호 : Car-헬스케어 보안 기술개발
연구 과제 주관 기관 : 한국산업기술평가관리원
참고문헌
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Construction," IEEE INFOCOM, pp. 708-176, Mar. 1999
- K. Ren, W. Lou, and Y. Zhang, "Multi-user Broadcast Authentication in Wireless Sensor Networks," IEEE Communications Society Conference, pp. 223-232, June 2007
- A. Perrig, D. Song, and D. tyhar, "ELK, A New Protocol for Efficient Large Group Key Distribution," IEEE Signal Processing, pp. 247-262, May 2001
- A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. Culler, "SPINS : Security Protocols for Sensor Networks," Wireless Network, vol.8, no.5, pp. 521-534, Sep. 2002 https://doi.org/10.1023/A:1016598314198
- C. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Transactions on networking, vol. 8, no. 1, Feb. 2000
- S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN : An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks," ACM Mobiquitous, pp. 42-51, Aug. 2004
- R.D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW:A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003
- T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure Multicast Groups on Ad Hoc Networks," ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 94-102, 2003
- L. Laxos and R. Poovendram, "Energy -Aware Secure Multicast Communication in Ad Hoc Netwroks Using Geographical Location Information," IEEE International Conference on Acoustics Speech and Signal Processing, vol. 4 pp. IV-201-4, 2003
- S. Mittra, "Iolus : A framework for scalable secure multicasting," ACM Special Interest Group on Data Communication, pp. 277-288, 1997
- M. Bouassida, I. Chrisment and O. Festor, "An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks," NETWORKING LNCS 3042, pp. 725-742, 2004
- M. Bouassida, I. Chrisment and O. Festor, "Efficient Clustring for Multicast Key Distribution in MANET," NETWORKING LNCS pp. 138-153, 2005
- M. Bouassida, I. Chrisment and O. Festor, "Group Key Management in Manets," International Journal of Network Security, pp. 67-79 2008
- T. Chiang and Y. Huang, "Group Keys and the Multicast Security in Ad Hoc Networks," International Conference on Parallel Processing Workshops, pp. 385-390, Oct. 2003
- W. Zhang, S. Zhu, and G. Cao, "Predistribution and Local Collaboration -based Group Rekeying for Wireless Sensor Networks," Ad Hoc Network, vol. 7, pp. 1229-1242, Aug. 2009 https://doi.org/10.1016/j.adhoc.2008.11.004
- K. Ren, W. Lou, B. Zhu, and S. Jajodia "Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad Hoc Group Formation," IEEE Transactions on vehicular technology, vol.58, no. 4, pp. 2018-2029, May 2009 https://doi.org/10.1109/TVT.2008.2003961
- J. Hall, M. Barbeau, and E. Kranakis, "Detection of Transient in Radio Frequency Fingerprinting Using Phase Characteristics of Signals," IASTED International Conference on Wireless and Optical Communication (WOC), pp. 13-18, May 2003
- S. Marti, T. Giuli, T. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, pp. 255-265, Aug. 2000
- G. Wang, W. Zhang, and G. Cao, T. La Porta, "On Supporing Distribued Collaboration in Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 752-757, Oct. 2003
- A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT : Software-based Attestation for Embedded Devices," IEEE Symposium on Security and Privacy, May 2004
- T Shi-Chun, T Wen-Guey, and Z Kun-Yi, "Key establishment schemes against storage-bounded adversaries in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 8, no. 3, pp. 1218-1222, Mar. 2009 https://doi.org/10.1109/TWC.2009.081048
- M. Jadliwala, Z. Sheng, S.J. Upadhyaya, Q. Chunming, and J.P. Hubaux, "Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes," Mobile Computing, IEEE Transactions on, vol. 9, no. 6, pp. 810-823, Apr. 2010 https://doi.org/10.1109/TMC.2010.20
- F. Anjum, "Location dependent key management in sensor networks without using deployment knowledge," Wireless Networks, vol. 16, no. 6, pp. 1587-1600, Oct. 2008
- T.V. Srinath, "Localization in resource constrained sensor networks using a mobile beacon with in-ranging," Wireless and Optical Communications Networks, pp.5, Apr. 2006
- "The Network Simulator, ns-2," available at http://www.isi.edu/nsnam/ns
- A. Liu and P. Ning, "TinyECC : A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Information Processing in Sensor Networks(IPSN), pp. 245-256, 2008
- K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," The International Workshop on Scalable Ad Hoc and Sensor Networks(SASN), pp. 169-176, 2006
- A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C.Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," IEEE International Conf. Pervasive Computing and Communications (PerCom), pp. 324-328, Mar. 2005
- Y. Wang, G. Attebury, and B. Ramamurthy "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.