10
본 연구는 국방과학연구소 민군겸용기술사업 지로 수행하였습니다 * (Dual Use Technology Program) .

본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

본 연구는 국방과학연구소의 민군겸용기술사업 지원으로 수행하였습니다* (Dual Use Technology Program) .

Page 2: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕
Page 3: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕
Page 4: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕
Page 5: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

⊕ ⊕

⊕ ⊕ ⊕ ⊕

Page 6: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

⊕ ⊕ ⋯ ⊕ ⊕

⊕⊕

⊕⊕

Page 7: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

×

×

Page 8: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

× × × ××

[1] Y. Law and P. Havinga, "How to Secure a Wireless Sensor Network", in Intelligent Sensors, Sensor

Networks and Information Processing (ISSNIP '05), IEEE Computer Society Press, 2005, pp. 89-95.

[2] D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and

Page 9: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

Defenses", in Pervasive Computing, IEEE, Vol. 7, Issue 1, Jan.- Mar. 2008 Page(s):74 - 81.

[3] J. Ibriq and Imad Mahgoub, "A Hierarchical Key Establishment Scheme for Wireless Sensor

Networks", Proceedings of 21st International Conference on Advanced Networking and Applications

(AINA'07), pp. 210-219, 2007.

[4] C. Hartung, J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need for Secure

Systems", Technical Report CU-CS-990-05, January, 2005.

[5] A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless

Sensor Networks", Information Processing in Sensor Networks (IPSN '08), 22-24 April, 2008, pp.

245-256.

[6] Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor

Networks", ACM Transactions on Sensor Networks, Vol. 2, No. 1, February, 2006, pp. 65-93.

[7] L. Eschenauer and V. D. Gligor, "A key management scheme for distributed sensor networks." in

Procedings of the 9th ACM conference on Computer and Communications Security (CCS),

Washington. DC. USA. November 18-22 2002. pp. 41-47.

[8] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, "LEAP: Efficient Security Mechanisms for

Large-Scale Distributed Sensor Networks," Proc. of the 10th ACM Conference on Computer and

Communication Security (CCS), 2003, pp.62-72.

[9] H. Chan, A. Perrig, and D. Song, "Random KeyPredistribution Schemes for Sensor Networks." in

IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003 pp. 197-213.

[10] W. Du, J. Deng, Y. S. Han and P. K. Varshney, "A Pairwise Key Pre-distribution Scheme for

Wireless Sensor Networks.", in Proceedings of the 10th ACM conference on Computer and

Communications Security (CCS), Washington, DC. USA, October 27-31 2003, pp. 42-51.

[11] D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks”, Proc. of the

10th ACM Conference on Computer and Communication Security (CCS), 2003, pp.52-61.

[12] J. Hwang and Y. Kim, "Revisiting Random Key Pre-distribution Schemes for Wireless Sensor

Networks", ACM Special Interest Group on Security, Audit, and Control (SIGSAC), 2004, pp.

43-52.

[13] W. Du, J. Deng, Y. S. Han, S. Chen and P. K. Varshney, "A Key Management Scheme for

Wireless Sensor Networks Using Deployment Knowledge", IEEE 2004.

[14] M. G. Sadi, D. S. Kim, J. S. Park, "GBR: Grid Based Random Key Predistribution for Wireless

Sensor Network", Proceedings of the 11th Annual IEEE International Conference on Parallel and

Distributed Systems (ICPADS '05), Vol. 2, 20-22 July 2005 pp.310-314.

[15] T. Moore, "A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor

Page 10: 본연구는국방과학연구소의민군겸용기술사업 지원으로 ...caislab.kaist.ac.kr/publication/paper_files/2008/KIISC... · 2018-09-27 · ⊕ ⊕ ⋯ ⊕ ⊕ ⊕ ⊕

Networks", Proceedings of the Fourth Annual IEEE International Conference on Pervasive

Computing and Communications Workshops (PERCOMW '06), 13-17 March 2006.

[16] R. M. S. Silva, N. S. A. Pereira, M. S. Nunes "Applicability Drawbacks of Probabilistic Key

Management Schemes for Real World Applications of Wireless Sensor Networks", Proceedings of

the Third International Conference on Wireless and Mobile Communications (ICWMC'07), IEEE

2007.