Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
본 연구는 국방과학연구소의 민군겸용기술사업 지원으로 수행하였습니다* (Dual Use Technology Program) .
⊕
⊕ ⊕
⊕ ⊕ ⊕ ⊕
⊕
⊕ ⊕ ⋯ ⊕ ⊕
⊕⊕
⋯
⋯
⊕
⊕
⊕⊕
⊕
×
×
× × × ××
[1] Y. Law and P. Havinga, "How to Secure a Wireless Sensor Network", in Intelligent Sensors, Sensor
Networks and Information Processing (ISSNIP '05), IEEE Computer Society Press, 2005, pp. 89-95.
[2] D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and
Defenses", in Pervasive Computing, IEEE, Vol. 7, Issue 1, Jan.- Mar. 2008 Page(s):74 - 81.
[3] J. Ibriq and Imad Mahgoub, "A Hierarchical Key Establishment Scheme for Wireless Sensor
Networks", Proceedings of 21st International Conference on Advanced Networking and Applications
(AINA'07), pp. 210-219, 2007.
[4] C. Hartung, J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need for Secure
Systems", Technical Report CU-CS-990-05, January, 2005.
[5] A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless
Sensor Networks", Information Processing in Sensor Networks (IPSN '08), 22-24 April, 2008, pp.
245-256.
[6] Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor
Networks", ACM Transactions on Sensor Networks, Vol. 2, No. 1, February, 2006, pp. 65-93.
[7] L. Eschenauer and V. D. Gligor, "A key management scheme for distributed sensor networks." in
Procedings of the 9th ACM conference on Computer and Communications Security (CCS),
Washington. DC. USA. November 18-22 2002. pp. 41-47.
[8] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, "LEAP: Efficient Security Mechanisms for
Large-Scale Distributed Sensor Networks," Proc. of the 10th ACM Conference on Computer and
Communication Security (CCS), 2003, pp.62-72.
[9] H. Chan, A. Perrig, and D. Song, "Random KeyPredistribution Schemes for Sensor Networks." in
IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003 pp. 197-213.
[10] W. Du, J. Deng, Y. S. Han and P. K. Varshney, "A Pairwise Key Pre-distribution Scheme for
Wireless Sensor Networks.", in Proceedings of the 10th ACM conference on Computer and
Communications Security (CCS), Washington, DC. USA, October 27-31 2003, pp. 42-51.
[11] D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks”, Proc. of the
10th ACM Conference on Computer and Communication Security (CCS), 2003, pp.52-61.
[12] J. Hwang and Y. Kim, "Revisiting Random Key Pre-distribution Schemes for Wireless Sensor
Networks", ACM Special Interest Group on Security, Audit, and Control (SIGSAC), 2004, pp.
43-52.
[13] W. Du, J. Deng, Y. S. Han, S. Chen and P. K. Varshney, "A Key Management Scheme for
Wireless Sensor Networks Using Deployment Knowledge", IEEE 2004.
[14] M. G. Sadi, D. S. Kim, J. S. Park, "GBR: Grid Based Random Key Predistribution for Wireless
Sensor Network", Proceedings of the 11th Annual IEEE International Conference on Parallel and
Distributed Systems (ICPADS '05), Vol. 2, 20-22 July 2005 pp.310-314.
[15] T. Moore, "A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor
Networks", Proceedings of the Fourth Annual IEEE International Conference on Pervasive
Computing and Communications Workshops (PERCOMW '06), 13-17 March 2006.
[16] R. M. S. Silva, N. S. A. Pereira, M. S. Nunes "Applicability Drawbacks of Probabilistic Key
Management Schemes for Real World Applications of Wireless Sensor Networks", Proceedings of
the Third International Conference on Wireless and Mobile Communications (ICWMC'07), IEEE
2007.