메뉴 건너뛰기




Volumn , Issue , 2004, Pages 73-77

A lightweight protocol for data integrity in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; CRYPTOGRAPHY; DATA REDUCTION; PACKET NETWORKS; SENSOR DATA FUSION;

EID: 28844504683     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/issnip.2004.1417440     Document Type: Conference Paper
Times cited : (5)

References (34)
  • 2
    • 85074375621 scopus 로고    scopus 로고
    • Next century challenges: Scalable coordination in sensor networks
    • Aug.
    • D. Estrin and R. Govindan, "Next Century Challenges: Scalable Coordination in Sensor Networks." in Proc. ACM/IEEE Conf. Mobicom'99, pp. 263-270, Aug. 1999.
    • (1999) Proc. ACM/IEEE Conf. Mobicom'99 , pp. 263-270
    • Estrin, D.1    Govindan, R.2
  • 3
    • 0345851236 scopus 로고    scopus 로고
    • Embedding the internet: Amorphous computing
    • May
    • H. Abelson et. al., "Embedding the Internet: Amorphous Computing." in Communications of ACM, Vol. 43. No. 5, pp. 74-82. May 2000.
    • (2000) Communications of ACM , vol.43 , Issue.5 , pp. 74-82
    • Abelson, H.1
  • 4
    • 0002331353 scopus 로고    scopus 로고
    • Embedding the internet: Embedded computation meets the world wide web
    • May
    • G. Borriello, R. Want, "Embedding the Internet: Embedded Computation Meets the World Wide Web." in Communications of ACM, Vol. 43, No. 5, pp. 59-66, May 2000.
    • (2000) Communications of ACM , vol.43 , Issue.5 , pp. 59-66
    • Borriello, G.1    Want, R.2
  • 5
    • 0345851235 scopus 로고    scopus 로고
    • Embedding the internet:Wireless integrated network sensors
    • May
    • G. J. Pottie, W. J. Kaiser. "Embedding the Internet:Wireless Integrated Network Sensors," in Communications of ACM, Vol. 43, No. 5, pp. 51-58, May 2000.
    • (2000) Communications of ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 6
    • 0002804192 scopus 로고    scopus 로고
    • Embedding the internet: Embedding robots into the internet
    • May
    • G. S. Sukhatme, M. J. Mataric, "Embedding the Internet: Embedding Robots into the Internet," in Communications of ACM, Vol. 43, No. 5, pp. 67-73, May 2000.
    • (2000) Communications of ACM , vol.43 , Issue.5 , pp. 67-73
    • Sukhatme, G.S.1    Mataric, M.J.2
  • 7
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks." IEEE Computer, pp. 54-62, October 2002.
    • (2002) IEEE Computer , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad-hoc networks
    • L. Zhou and Z. Haas, "Securing Ad-Hoc Networks, IEEE Network Magazine, Vol. 13, No. 6, pp. 24-30, 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 9
    • 28844477840 scopus 로고    scopus 로고
    • NAI Lab, www.nai.com/nai_labs/asp_set/crypto/crypt_senseit.asp
  • 13
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad-hoc networks, in ICNP. 2001, pp. 251-260.
    • (2001) ICNP , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 14
    • 15844404847 scopus 로고    scopus 로고
    • Secure ad-hoc on-demand distance vector (SAODV) routing
    • Message-ID: 3BC17B40.BBF52E09@nokia.com, October 8
    • M. G. Zapata, "Secure ad-hoc on-demand distance vector (SAODV) routing", IETF MANET Mailing List, Message-ID: 3BC17B40.BBF52E09@nokia.com, Available at ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail, October 8, 2001.
    • (2001) IETF MANET Mailing List
    • Zapata, M.G.1
  • 16
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • J. Binkley and W. Trost, "Authenticated ad hoc routing at the link layer for mobile systems", Wireless Networks, vol. 7, no. 2, pp. 139-145, 2001.
    • (2001) Wireless Networks , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1    Trost, W.2
  • 17
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad-hoc networks
    • Electrical Engineering and Computer Science, August
    • B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad-hoc networks", Electrical Engineering and Computer Science, University of Michigan, Tech. Rep. UM-CS-2001-037, August 2001.
    • (2001) University of Michigan, Tech. Rep. , vol.UM-CS-2001-037
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 20
    • 0004118152 scopus 로고    scopus 로고
    • Ariadne: "A secure on-demand routing protocol for ad hoc networks"
    • Department of Computer Science. December
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, Ariadne: "A secure on-demand routing protocol for ad hoc networks", Department of Computer Science, Rice University, Tech. Rep. TR01-383. December 2001.
    • (2001) Rice University, Tech. Rep. , vol.TR01-383
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 28
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • RFC 2104. "HMAC: Keyed-Hashing for Message Authentication." http://www.ietf.org/rfc/rfc2104.tx
    • RFC , vol.2104
  • 32
    • 0041472588 scopus 로고    scopus 로고
    • An energy-efficient hierarchical clustering algorithm for wireless sensor networks
    • April
    • S. Bandyopadhyay and E. Coyle, "An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks, in Proceedings", of IEEE INFOCOM 2003, April 2003.
    • (2003) Proceedings of IEEE INFOCOM 2003
    • Bandyopadhyay, S.1    Coyle, E.2
  • 34
    • 0141621108 scopus 로고    scopus 로고
    • GS3: Scalable self-configuration and self-healing in wireless sensor networks
    • November 15
    • Hongwei Zhang, Anish Arora, "GS3: Scalable Self-configuration and Self-healing in Wireless Sensor Networks". Computer Networks (Elsevier), 43(4):459-480. November 15, 2003.
    • (2003) Computer Networks (Elsevier) , vol.43 , Issue.4 , pp. 459-480
    • Zhang, H.1    Arora, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.