메뉴 건너뛰기




Volumn 29, Issue 2, 2006, Pages 216-230

INSENS: Intrusion-tolerant routing for wireless sensor networks

Author keywords

Fault tolerance; Intrusion tolerance; Secure routing; Security; Sensor network

Indexed keywords

CODES (SYMBOLS); COMPUTER SIMULATION; FAULT TOLERANT COMPUTER SYSTEMS; NETWORK PROTOCOLS; TREES (MATHEMATICS); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 30344482882     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2005.05.018     Document Type: Article
Times cited : (161)

References (33)
  • 1
    • 30344485824 scopus 로고    scopus 로고
    • TinyOS website, http://webs.cs.berkeley.edu/tos/.
  • 2
    • 33744923367 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • To appear in
    • K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, To appear in Journal of Ad Hoc Networks.
    • Journal of Ad Hoc Networks
    • Akkaya, K.1    Younis, M.2
  • 5
    • 3943055289 scopus 로고
    • An intrusion tolerant security server for an open distributed system
    • Toulouse, France
    • L. Blain, Y. Deswarte, An intrusion tolerant security server for an open distributed system, In First European Symposium in Computer Security, Toulouse, France, 1990.
    • (1990) First European Symposium in Computer Security
    • Blain, L.1    Deswarte, Y.2
  • 7
    • 84944457899 scopus 로고    scopus 로고
    • Rapid prototyping of mobile input devices using wireless sensor nodes
    • Monterey, CA, USA, October
    • J. Carlson, R. Han, S. Lao, C. Narayan, S.S. ghani, Rapid prototyping of mobile input devices using wireless sensor nodes, In WMCSA'03, Monterey, CA, USA, October 2003.
    • (2003) WMCSA'03
    • Carlson, J.1    Han, R.2    Lao, S.3    Narayan, C.4    Ghani, S.S.5
  • 8
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • March
    • H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, In Proceedings of IEEE Infocom, March 2005.
    • (2005) Proceedings of IEEE Infocom
    • Chan, H.1    Perrig, A.2
  • 10
    • 30344445246 scopus 로고    scopus 로고
    • Enhancing base station security in wireless sensor networks
    • Department of Computer Science, University of Colorado, April
    • J. Deng, R. Han, S. Mishra. Enhancing base station security in wireless sensor networks, Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado, April 2003.
    • (2003) Technical Report , vol.CU-CS-951-03
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 12
    • 4544340566 scopus 로고    scopus 로고
    • Security support for in-network processing in wireless sensor networks
    • First ACM Workshop on Security of Ad Hoc and Sensor Networks, in association with the Fairfax, VA, USA, October
    • J. Deng, R. Han, S. Mishra, Security support for in-network processing in wireless sensor networks, In First ACM Workshop on Security of Ad Hoc and Sensor Networks, in association with the 10th ACM Conference on Computer and Communications Security, Fairfax, VA, USA, October 2003.
    • (2003) 10th ACM Conference on Computer and Communications Security
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 14
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • First International Workshop on Peer-to-Peer Systems Cambridge, MA, USA, Springer, Berlin, March
    • J. Douceur, The sybil attack, In First International Workshop on Peer-to-Peer Systems, volume 2429 of Lecture Notes in Computer Science, Cambridge, MA, USA, Springer, Berlin, March 2002.
    • (2002) Lecture Notes in Computer Science , vol.2429
    • Douceur, J.1
  • 18
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • San Diego, CA, USA, September
    • Y. Hu, A. Perrig, D. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, In Second ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, USA, September 2003.
    • (2003) Second ACM Workshop on Wireless Security (WiSe'03)
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 20
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Secure routing in wireless sensor networks: Attacks and countermeasures Ad Hoc Networks 1 2-3 2003
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3
  • 21
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington DC, USA, October
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, In CCS'03, Washington DC, USA, October 2003.
    • (2003) CCS'03
    • Liu, D.1    Ning, P.2
  • 28
    • 0036930216 scopus 로고    scopus 로고
    • Quantifying the cost of providing intrusion tolerance in group communication systems
    • Washington DC, USA, June
    • H.V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, W.H. Sanders, Quantifying the cost of providing intrusion tolerance in group communication systems, In DSN'02, Washington DC, USA, June 2002.
    • (2002) DSN'02
    • Ramasamy, H.V.1    Pandey, P.2    Lyons, J.3    Cukier, M.4    Sanders, W.H.5
  • 29
    • 0036929535 scopus 로고    scopus 로고
    • Developing a heterogeneous intrusion tolerant corba system
    • Washington DC, USA, June
    • D. Sames, B. Matt, B. Niebuhr, G. Tally, B. Whitmore, D. Bakken, Developing a heterogeneous intrusion tolerant corba system. In DSN'02, Washington DC, USA, June 2002.
    • (2002) DSN'02
    • Sames, D.1    Matt, B.2    Niebuhr, B.3    Tally, G.4    Whitmore, B.5    Bakken, D.6
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood Denial of service in sensor networks IEEE Computer 35 10 2002 54 62
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1
  • 32
    • 85084160265 scopus 로고    scopus 로고
    • Building intrusion tolerant applications
    • Washington DC, USA, August
    • T.J. Wu, M. MalKin, D. Boneh, Building intrusion tolerant applications, In Eighth USENIX Security Symposium, Washington DC, USA, August 1999, pp. 79-91.
    • (1999) Eighth USENIX Security Symposium , pp. 79-91
    • Wu, T.J.1    Malkin, M.2    Boneh, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.