메뉴 건너뛰기




Volumn , Issue , 2005, Pages 49-63

Distributed detection of node replication attacks in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK DATA; SENSOR NETWORKS;

EID: 27544460282     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2005.8     Document Type: Conference Paper
Times cited : (555)

References (37)
  • 3
    • 17444385861 scopus 로고    scopus 로고
    • Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
    • C. Blundo, L. Mattos, and D. Stinson. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Advances in Cryptology (CRYPTO), 1996.
    • (1996) Advances in Cryptology (CRYPTO)
    • Blundo, C.1    Mattos, L.2    Stinson, D.3
  • 12
    • 84978422134 scopus 로고    scopus 로고
    • Fine-grained network time synchronization using reference broadcasts
    • J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. SIGOPS Oper. Syst. Rev., 2002.
    • (2002) SIGOPS Oper. Syst. Rev.
    • Elson, J.1    Girod, L.2    Estrin, D.3
  • 20
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • Feb.
    • D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of Network and Distributed System Security Symposium (NDSS), Feb. 2003.
    • (2003) Proceedings of Network and Distributed System Security Symposium (NDSS)
    • Liu, D.1    Ning, P.2
  • 25
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology (CRYPTO), 1988.
    • (1988) Advances in Cryptology (CRYPTO)
    • Merkle, R.1
  • 28
    • 18844435123 scopus 로고    scopus 로고
    • GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information
    • Nov.
    • J. Newsome and D. Song. GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information. In ACM Conference on Embedded Networked Sensor Systems (SenSys), Nov. 2003.
    • (2003) ACM Conference on Embedded Networked Sensor Systems (SenSys)
    • Newsome, J.1    Song, D.2
  • 33
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Apr. Special Issue on Computer Network Security
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, Apr. 1999. Special Issue on Computer Network Security.
    • (1999) Computer Networks
    • Smith, S.W.1    Weingart, S.2
  • 34
    • 0004231341 scopus 로고
    • Society for Industrial and Applied Mathematics (SIAM)
    • H. Solomon. Geometric Probability. Society for Industrial and Applied Mathematics (SIAM), 1978.
    • (1978) Geometric Probability
    • Solomon, H.1
  • 35
    • 0003259063 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • Internet Engineering Task Force, June
    • D. Wallner, E. Harder, and R. Agee. Key management for multicast: Issues and architectures. Internet Request for Comment RFC 2627, Internet Engineering Task Force, June 1999.
    • (1999) Internet Request for Comment RFC , vol.2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 36
    • 23044524214 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A survey of attacks and defenses
    • Aug.
    • S. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses. In Cryptographic Hardware and Embedded Systems (CHES), Aug. 2000.
    • (2000) Cryptographic Hardware and Embedded Systems (CHES)
    • Weingart, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.