메뉴 건너뛰기




Volumn 4017 LNCS, Issue , 2006, Pages 167-177

Security in wireless sensor networks: Considerations and experiments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ENERGY RESOURCES; MONITORING; SECURITY OF DATA;

EID: 33746687870     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11796435_18     Document Type: Conference Paper
Times cited : (17)

References (26)
  • 5
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and counter-measures
    • Karloff, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and counter-measures. Elsevier Ad Hoc Networks 1 (2003) 293-315
    • (2003) Elsevier Ad Hoc Networks , vol.1 , pp. 293-315
    • Karloff, C.1    Wagner, D.2
  • 6
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Comm. 11 (2004) 38-43
    • (2004) IEEE Wireless Comm. , vol.11 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 8
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35 (2002) 54-62
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 11
    • 84941147765 scopus 로고    scopus 로고
    • IEEE: lEEE Std. 802.15.4 (2003)
    • IEEE: lEEE Std. 802.15.4. (2003)
  • 16
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and RSA on 8-bit CPUs
    • Joye, M., Quisquater, J.J., eds.: Springer
    • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Joye, M., Quisquater, J.J., eds.: Lecture Notes in Computer Science. Volume 3156. Springer (2004) 119-132
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 18
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanism for large-scale distributed sensor networks
    • Washington D.C., USA
    • Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanism for large-scale distributed sensor networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS'03), Washington D.C., USA (2003) 62-72
    • (2003) Proc. 10th ACM Conf. Computer and Comm. Security (CCS'03) , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 21
    • 0003237987 scopus 로고
    • The Kerberos network authentication service (V5)
    • Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). RFC 1510 (1993)
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, C.2
  • 26
    • 13244276908 scopus 로고    scopus 로고
    • Raghavendra, C.S., Sivalingam, K.M., Znati, T., eds.: Springer
    • Raghavendra, C.S., Sivalingam, K.M., Znati, T., eds.: Wireless Sensor Networks. 1 edn. Springer (2004)
    • (2004) Wireless Sensor Networks. 1 Edn.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.