메뉴 건너뛰기




Volumn 3935 LNCS, Issue , 2006, Pages 56-68

Trust management for resilient wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; DATA PRIVACY; INFORMATION MANAGEMENT; SENSORS; UTILITY PROGRAMS;

EID: 33745820773     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734727_7     Document Type: Conference Paper
Times cited : (26)

References (22)
  • 4
    • 33744985257 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, NEST 2003.
    • NEST 2003
    • Karlof, C.1    Wagner, D.2
  • 7
    • 18844457825 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • B. Przydatek, D. Song, A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003.
    • SenSys 2003
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 10
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
    • MILCOM '03. 2003 IEEE
    • S.S. Doumit, D.P. Agrawal, Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.609-614.
    • (2003) Military Communications Conference , pp. 609-614
    • Doumit, S.S.1    Agrawal, D.P.2
  • 12
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkely, California, May 11-14
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, Berkely, California, May 11-14 2003, pp. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 16
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • Oakland, California, May
    • S. Zhu, S. Setia, S. Jajodia, P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004.
    • (2004) Proceedings of IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 17
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE INFOCOM 2004.
    • Proceedings of IEEE INFOCOM 2004
    • Ye, F.1    Luo, H.2    Zhang, L.3
  • 20
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • Los Angeles, April
    • Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN 2005, Los Angeles, April 2005.
    • (2005) IPSN 2005
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.