메뉴 건너뛰기




Volumn , Issue , 2006, Pages 49-58

Modelling adversaries and security objectives for routing protocols in wireless sensor networks

Author keywords

Adversary model; Provable security; Routing protocols; Sensor networks; Simulatability

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; FUNCTIONAL ANALYSIS; NETWORK SECURITY; TELECOMMUNICATION SERVICES; WIRELESS SENSOR NETWORKS;

EID: 34547461706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180345.1180352     Document Type: Conference Paper
Times cited : (23)

References (18)
  • 7
    • 34547468120 scopus 로고    scopus 로고
    • IEEE Standard for Information technology, Telecommunications and information exchange between systems-Local and metropolitan area networks, Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks LR-WPANs, 2003
    • IEEE Standard for Information technology - Telecommunications and information exchange between systems-Local and metropolitan area networks - Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), 2003.
  • 8
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publisher
    • D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181. Kluwer Academic Publisher, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 9
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • J. N. Al-Karaki and A. E. Kamal. Routing techniques in wireless sensor networks: a survey. In IEEE Wireless Communications, Volume 11, pp. 6-28, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 10
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof, D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Ad Hoc. Networks, Volume 1, 2003.
    • (2003) Ad Hoc. Networks , vol.1
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.