메뉴 건너뛰기




Volumn 201, Issue , 2006, Pages 38-49

Authenticated query flooding in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

BASE STATIONS; SECURITY OF DATA; SENSOR NETWORKS; SENSOR NODES;

EID: 33845544481     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-33406-8_4     Document Type: Article
Times cited : (8)

References (22)
  • 3
    • 0032661699 scopus 로고    scopus 로고
    • Multicast security: A taxonomy and some efficient constructions
    • In New York, NY, March IEEE
    • Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, and Benny Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proc. IEEE INFOCOM'99, volume 2, pages 708-716, New York, NY, March 1999. IEEE.
    • (1999) Proc. IEEE INFOCOM'99 , vol.2 , pp. 708-716
    • Canetti, R.1    Garay, J.2    Itkis, G.3    Micciancio, D.4    Naor, M.5    Pinkas, B.6
  • 4
    • 33845534306 scopus 로고    scopus 로고
    • Crossbow, Inc. MICA2 data sheet. Available at
    • Crossbow, Inc. MICA2 data sheet. Available at http://www.xbow.com/ Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf.
  • 16
    • 84901201715 scopus 로고    scopus 로고
    • Telos revision B datasheet
    • moteiv Corp. Available at
    • moteiv Corp. Telos revision B datasheet. Available at http://www.moteiv.com/products/docs/telos-revb-datasheet.pdf.
  • 17
    • 0028479881 scopus 로고
    • Connectivity properties of a random radio network
    • August
    • J. Ni and S. Chandler. Connectivity properties of a random radio network. IEE Communications, 141:389-296, August 1994.
    • (1994) IEE Communications , vol.141 , pp. 296-389
    • Ni, J.1    Chandler, S.2
  • 19
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Ronald L. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, pages 86-96, 1994.
    • (1994) Fast Software Encryption , pp. 86-96
    • Rivest, R.L.1
  • 20
    • 24644449780 scopus 로고    scopus 로고
    • Efficient cooperative signatures: A novel authentication scheme for sensor networks
    • In number 3450 in LNCS April
    • Stefaan Seys and Bart Preneel. Efficient cooperative signatures: A novel authentication scheme for sensor networks. In 2nd International Conference on Security in Pervasive Computing, number 3450 in LNCS, pages 86-100, April 2005.
    • (2005) 2nd International Conference on Security in Pervasive Computing , pp. 86-100
    • Seys, S.1    Preneel, B.2
  • 21
    • 1042289031 scopus 로고    scopus 로고
    • The number of neighbors needed for connectivity of wireless networks
    • Feng Xue and P. R. Kumar. The number of neighbors needed for connectivity of wireless networks. Wirel. Netw., 10(2): 169-181, 2004.
    • (2004) Wirel. Netw. , vol.10 , Issue.2 , pp. 169-181
    • Xue, F.1    Kumar, P.R.2
  • 22
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • In November
    • Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In IEEE International Conference on Network Protocols, November 2003.
    • (2003) IEEE International Conference on Network Protocols
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.