메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 847-854

MAC layer security of 802.15.4-compliant networks

Author keywords

[No Author keywords available]

Indexed keywords

CODES (STANDARDS); MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; SYSTEMS ANALYSIS;

EID: 33750297757     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MAHSS.2005.1542881     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 2
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Oct.
    • H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 3
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor network
    • Dec.
    • E. Shi and A. Perrig, "Designing secure sensor network," IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, Dec. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 4
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 5
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May-June
    • Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 28-39, May-June 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 10
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, DC, Aug.
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. 12th USENIX Security Symposium, Washington, DC, Aug. 2003.
    • (2003) Proc. 12th USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 14
    • 19544394976 scopus 로고    scopus 로고
    • Analysis of 802.15.4 beacon enabled PAN in saturation mode
    • San Jose, CA, July
    • J. Mišić, S. Shan, and V. B. Mišić, "Analysis of 802.15.4 beacon enabled PAN in saturation mode," in Proc. SPECTS 2004, San Jose, CA, July 2004.
    • (2004) Proc. SPECTS 2004
    • Mišić, J.1    Shan, S.2    Mišić, V.B.3
  • 15
    • 33750292888 scopus 로고    scopus 로고
    • Access delay and throughput for uplink transmissions in ieee 802.15.4 pan
    • to appear
    • J. Mišić and V. B. Mišić, "Access delay and throughput for uplink transmissions in ieee 802.15.4 pan," Elsevier Computer Communications, vol. to appear, 2005.
    • (2005) Elsevier Computer Communications
    • Mišić, J.1    Mišić, V.B.2
  • 16
    • 2442538308 scopus 로고    scopus 로고
    • San Jose, CA
    • RSoft Design, Inc., Artifex v.4.4.2, San Jose, CA, 2003.
    • (2003) Artifex V.4.4.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.