메뉴 건너뛰기




Volumn , Issue , 2006, Pages 113-122

Autonomous and distributed node recovery in wireless sensor networks

Author keywords

Intrusion detection; Node recovery; Sensor networks; Wireless

Indexed keywords

ALGORITHMS; COMPUTER AIDED SOFTWARE ENGINEERING; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; INTRUSION DETECTION; WIRELESS SENSOR NETWORKS;

EID: 34547478759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180345.1180360     Document Type: Conference Paper
Times cited : (15)

References (23)
  • 2
    • 18744385858 scopus 로고    scopus 로고
    • Jist: An efficient approach to simulation using virtual machines: Research articles
    • R. Barr, Z. J. Haas, and R. van Renesse. Jist: an efficient approach to simulation using virtual machines: Research articles. Softw. Pract. Exper., 35(6):539-576, 2005.
    • (2005) Softw. Pract. Exper , vol.35 , Issue.6 , pp. 539-576
    • Barr, R.1    Haas, Z.J.2    van Renesse, R.3
  • 4
    • 34547395740 scopus 로고    scopus 로고
    • Chipcon AS, Oslo, Norway. Single Chip Very Low Power RF Transceiver, Rev. 2.1, Apr. 2002. http://www.chipcon.com/.
    • Chipcon AS, Oslo, Norway. Single Chip Very Low Power RF Transceiver, Rev. 2.1, Apr. 2002. http://www.chipcon.com/.
  • 5
    • 32144435943 scopus 로고    scopus 로고
    • A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Q2SWinet '05: Proceedings of the 1st A CM international workshop on Quality of service & security in wireless and mobile networks, pages 16-23, New York, NY, USA, 2005. ACM Press.
    • A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Q2SWinet '05: Proceedings of the 1st A CM international workshop on Quality of service & security in wireless and mobile networks, pages 16-23, New York, NY, USA, 2005. ACM Press.
  • 7
    • 34547395249 scopus 로고    scopus 로고
    • P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler. Towards secure network programming and recovery in wireless sensor networks. Technical Report UCB/EECS-2005-7, Electrical Engineering and Computer Sciences University of California at Berkeley, Oct. 2005.
    • P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler. Towards secure network programming and recovery in wireless sensor networks. Technical Report UCB/EECS-2005-7, Electrical Engineering and Computer Sciences University of California at Berkeley, Oct. 2005.
  • 9
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: The need for secure systems
    • Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado, Jan
    • C. Hartung, J. Balasalle, and R. Han. Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado, Jan. 2005.
    • (2005)
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 10
  • 12
    • 33751090748 scopus 로고    scopus 로고
    • Distributed IDSs for enhancing security in mobile wireless sensor networks
    • P. Inverardi, L. Mostarda, and A. Navarra. Distributed IDSs for enhancing security in mobile wireless sensor networks. AINA, 2:116-120, 2006.
    • (2006) AINA , vol.2 , pp. 116-120
    • Inverardi, P.1    Mostarda, L.2    Navarra, A.3
  • 14
    • 33847326821 scopus 로고    scopus 로고
    • Dicas: Detection, diagnosis and isolation of control attacks in sensor networks
    • 00:89-100
    • I. Khalil, S. Bagchi, and C. Nina-Rotaru. Dicas: Detection, diagnosis and isolation of control attacks in sensor networks, securecomm, 00:89-100, 2005.
    • (2005) securecomm
    • Khalil, I.1    Bagchi, S.2    Nina-Rotaru, C.3
  • 16
    • 27944469190 scopus 로고    scopus 로고
    • Mnp: Multihop network reprogramming service for sensor networks
    • 00:7-16
    • S. S. Kulkami and L. Wang. Mnp: Multihop network reprogramming service for sensor networks, icdcs, 00:7-16, 2005.
    • (2005) icdcs
    • Kulkami, S.S.1    Wang, L.2
  • 17
    • 1442337671 scopus 로고    scopus 로고
    • Impala: A middleware system for managing autonomic, parallel sensor systems
    • T. Liu and M. Martonosi. Impala: a middleware system for managing autonomic, parallel sensor systems. SIGPLAN Not., 38(10):107-118, 2003.
    • (2003) SIGPLAN Not , vol.38 , Issue.10 , pp. 107-118
    • Liu, T.1    Martonosi, M.2
  • 19
    • 34547437214 scopus 로고    scopus 로고
    • N. B. of Standards. Security Requirements for Cryptographic Modules. National Bureau of Standards, Dec. 2002.
    • N. B. of Standards. Security Requirements for Cryptographic Modules. National Bureau of Standards, Dec. 2002.
  • 23
    • 80053424324 scopus 로고    scopus 로고
    • Intrusion detection and failure recovery in sensor nodes
    • Tagungsband INFORMATIK 2005, Workshop Proceedings, Heidelberg, Germany, Sept, Springer-Verlag
    • H. Vogt, M. Ringwald, and M. Strasser. Intrusion detection and failure recovery in sensor nodes. In Tagungsband INFORMATIK 2005, Workshop Proceedings, LNCS, Heidelberg, Germany, Sept. 2005. Springer-Verlag.
    • (2005) LNCS
    • Vogt, H.1    Ringwald, M.2    Strasser, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.