无线传感器网络安全技术 研究方向总结 Wirele Sensor Networks Security由刀豆文库小编整理,希望给你工作、学习、生活带来方便,猜你可能喜欢“无限传感器实训总结”。
无线传感器网络安全技术 研究方向总结 Wirele Sensor Networks Security
After finishing the literature in the Wirele Sensor Network(WSN)security area, the security architecture(security map)of security iues in WSN is drawn as in the following figure: Also, the security areas in WSN can be categorized into seven categories.Details about these categories are listed in the following table:
Categories Sub-categories Publications Survey.Generic [1] [2] [3] [4][5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Secure Routing [17] [18] Secure Aggregation [19] [20] Secure Localization [21] [22]
Cryptography.Asymmetric [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] Symmetric [36] [37] [38]
Secure Data Aggregation[55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71]
Key Management.Probabilistic [96] [97] [98] [99] [100] [101] [99] [102] [103] [104] [105] [106] [107] [108] [109] Deterministic [110] [111] [112]
Location Aware Security.Location Verification [113] [114] [115] [116] [117] [118] [119] [120] [121] [122] [123] [124] [125]
Attacks
Sybil [72] [73] [74] [75] [76] [75] Wormhole [77] [78] [79] [80] [81] [82] [83] [84] [85] [86] DOS [87] [88] [89] [90] [91] Node Replication [92] Node Compromise [93] [94] [95]
Hint: this table is still under ongoing update/review and can be downloaded in pdf format from here.Please update us with any miing publications.All the contact details can be found in the top right menu.References:
[1] Lidong Zhou and Zygmunt J.Haas.Securing ad hoc networks.IEEE Network, 13(6):24-30, 1999.[2] Frank Stajano and Ro J.Anderson.The resurrecting duckling: Security iues for ad-hoc wirele networks.In Bruce Christianson, Bruno Crispo, James A.Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194.Springer, 1999.[3] M.Chen, W.Cui, V.Wen, and A.Woo.Security and deployment iues in a sensor network, 2000.[4] David Carman, Peter Kruus, and Brian Matt.Constraints and approaches for distributed sensor network security.Technical Report 00-010, NAI Labs, 2000.[5] Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, and Mani B.Srivastava.On communication security in wirele ad-hoc sensor networks.In WETICE, pages 139-144.IEEE Computer Society, 2002.[6] Adrian Perrig, John A.Stankovic, and David Wagner.Security in wirele sensor networks.Comm..ACM, 47(6):53-57, 2004.[7] Naveen Sastry and David Wagner.Security considerations for ieee 802.15.4 networks.In Jakobon and Perrig [126], pages 32-42.[8] Fei Hu and Neeraj K.Sharma.Security considerations in ad hoc sensor networks.Ad Hoc Networks, 3(1):69-89, 2005.[9] K.Jones, Ashraf Wadaa, Stephan Olariu, Larry Wilson, and Mohamed Eltoweiy.Towards a new paradigm for securing wirele sensor networks.In Christian Hempelmann and Victor Raskin, editors, NSPW, pages 115-121.ACM, 2003.[10] Tanveer Zia and Albert Y.Zomaya.A secure triple-key management scheme for wirele sensor networks.In INFOCOM [127].[11] Rodrigo Roman, M.Carmen Fernández Gago, and Javier Lopez.A survey on the applicability of trust management systems for wirele sensor networks.In Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), pages 25-30, Istanbul, Turkey, 2007.IEEE.[12] Rodrigo Roman, Cristina Alcaraz, and Javier Lopez.A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes.MONET, 12(4):231-244, 2007.[13] Rodrigo Roman, M.Carmen Fernández Gago, and Javier Lopez.Featuring trust and reputation management systems for constrained hardware devices.In F.Davide, editor, Autonomics, volume 302 of ACM International Conference Proceeding Series, page 6.ACM, 2007.[14] Rodrigo Roman, Jianying Zhou, and Javier Lopez.On the security of wirele sensor networks.In Osvaldo Gervasi, Marina L.Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngsong Mun, David Taniar, and Chih Jeng Kenneth Tan, editors, ICCSA(3), volume 3482 of Lecture Notes in Computer Science, pages 681-690.Springer, 2005.[15] Rodrigo Roman, Cristina Alcaraz, and Javier Lopez.The role of wirele sensor networks in the area of critical information infrastructure protection.Information Security Technical Report, 12(1):24-31, 2007.[16] Tanveer Zia and Albert Zomaya.A security framework for wirele sensor networks.In In the proceedings of the IEEE Sensors Applications Symposium(SAS06), pages 49-53, Houston, Texas, 2007.IEEE.[17] Chris Karlof and David Wagner.Secure routing in wirele sensor networks: attacks and countermeasures.Ad Hoc Networks, 1(2-3):293-315, 2003.[18] Yih Chun Hu and Adrian Perrig.A survey of secure wirele ad hoc routing.IEEE Security and Privacy, 2(3):28-39, 2004.[19] Hani Alzaid, Ernest Foo, and Juan Manuel Gonzalez Nieto.Secure data aggregation in wirele sensor network: a survey.In Ljiljana Brankovic and Mirka Miller, editors, Sixth Australasian Information Security Conference(AISC 2008), volume 81 of CRPIT, pages 93-105, Wollongong, NSW, Australia, 2008.ACS.[20] Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan, and Naixue Xiong.Secure data aggregation in wirele sensor networks: A survey.In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT '06), pages 315-320, Washington, DC, USA, 2006.IEEE Computer Society.[21] Avinash Srinivasan and Jie Wu.A survey on secure localization in wirele sensor networks, 2007.[22] Tanveer Zia and Albert Zomaya.Secure localization in wirele sensor networks.In In the proceedings of the Asian Conference on Communication Systems and Networks(AsiaCSN 2007), pages-, Phuket, Thailand, 2007.[23] Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede.Low-cost elliptic curve cryptography for wirele sensor networks.In Buttyán et al.[128], pages 6-17.[24] Erik-Oliver Blaÿ and Martina Zitterbart.Towards acceptable public-key encryption in sensor networks.In Soraya Kouadri Mostéfaoui and Zakaria Maamar, editors, IWUC, pages 88-93.INSTICC Pre, 2005.[25] Leif Uhsadel, Axel Poschmann, and Christof Paar.Enabling full-size public-key algorithms on 8-bit sensor nodes.In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, ESAS, volume 4572 of Lecture Notes in Computer Science, pages 73-86.Springer, 2007.[26] Ronald J.Watro, Derrick Kong, Sue fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus.Tinypk: securing sensor networks with public key technology.In Setia and Swarup [129], pages 59-64.[27] Mathias Bohge and Wade Trappe.An authentication framework for hierarchical ad hoc sensor networks.In Maughan and Perrig [130], pages 79-87.[28] Gunnar Gaubatz, Jens-Peter Kaps, and Berk Sunar.Public key cryptography in sensor networksOrlando, FL, USA, Proceedings.IEEE Computer Society, 2003.[133] Ian F.Akyildiz, Deborah Estrin, David E.Culler, and Mani B.Srivastava, editors.Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003.ACM, 2003.[134] Sergio Palazzo, Marco Conti, and Raghupathy Sivakumar, editors.Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006.ACM, 2006.[135] Sanjeev Setia and Vipin Swarup, editors.Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003.ACM, 2003.[136] Cauligi S.Raghavendra and Krishna M.Sivalingam, editors.Proceedings of the First ACM International Workshop on Wirele Sensor Networks and Applications, WSNA 2002, Atlanta, Georgia, USA, September 28, 2002.ACM, 2002.[137] Masayuki Abe and Virgil D.Gligor, editors.Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008.ACM, 2008.[138] 2005 IEEE Symposium on Security and Privacy(S&P 2005), 8-11 May 2005, Oakland, CA, USA.IEEE Computer Society, 2005.[139] INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA.IEEE, 2005.[140] Proceedings of the Fourth International Symposium on Information Proceing in Sensor Networks, IPSN 2005, April 25-27, 2005, UCLA, Los Angeles, California, USA.IEEE, 2005.本文来自CSDN博客,转载请标明出处http://blog.csdn.net/dingherry/archive/2009/12/06/4950267.aspx
: