메뉴 건너뛰기




Volumn , Issue , 2006, Pages 59-70

A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks

Author keywords

Packet dropping attacks; Reliable delivery; Secure routing; Sensor network security

Indexed keywords

COMPUTER SIMULATION; NETWORK ROUTING; NETWORK SECURITY; PACKET LOSS; TELECOMMUNICATION LINKS;

EID: 34547528552     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180345.1180353     Document Type: Conference Paper
Times cited : (39)

References (47)
  • 1
  • 2
    • 0014814325 scopus 로고
    • Space/Time Trade-offs in Hash Coding with Allowable Errors
    • Burton H. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol. 13, 422-426, 1970
    • (1970) Communication of the ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 84944414611 scopus 로고    scopus 로고
    • ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks
    • Oct
    • B. Deb, S. Bhatnagar, and B. Nath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks, IEEE Local Computer Networks (LCN 2003), pp. 406-415, Oct. 2003.
    • (2003) IEEE Local Computer Networks (LCN , pp. 406-415
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 9
    • 0004194997 scopus 로고    scopus 로고
    • K. Fall and K. Varadhan editors, The VINT project, LBL, Feb
    • K. Fall and K. Varadhan (editors), NS notes and documentation, The VINT project, LBL, Feb 2000, http://www.isi.edu/nsnam/ns/
    • (2000) NS notes and documentation
  • 13
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41-47, Nov. 2002.
    • L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41-47, Nov. 2002.
  • 14
    • 33745639957 scopus 로고    scopus 로고
    • Node Compromise in Sensor Networks: The Need for Secure Systems
    • Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan
    • C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan. 2005
    • (2005)
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 16
    • 34547517686 scopus 로고    scopus 로고
    • W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174.185, 1999.
    • W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174.185, 1999.
  • 18
    • 84879386002 scopus 로고    scopus 로고
    • Load Balanced, Energy-Aware Communications for Mars Sensor Networks
    • X. Hong, M. Gerla, W. Hanbiao, and L. Clare, Load Balanced, Energy-Aware Communications for Mars Sensor Networks, IEEE Aerospace Conference, vol.3, 1109-1115, 2002.
    • (2002) IEEE Aerospace Conference , vol.3 , pp. 1109-1115
    • Hong, X.1    Gerla, M.2    Hanbiao, W.3    Clare, L.4
  • 25
    • 33847326821 scopus 로고    scopus 로고
    • DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks
    • Sep
    • I. Khalil, S. Bagchi, and C. Nina-Rotaru, DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks, IEEE SecureComm 2005, pp. 89-100, Sep. 2005
    • (2005) IEEE SecureComm , pp. 89-100
    • Khalil, I.1    Bagchi, S.2    Nina-Rotaru, C.3
  • 26
    • 11244314074 scopus 로고    scopus 로고
    • A Priority-Based Multi-Path Routing Protocol for Sensor Networks
    • Y. Liu and W. K.G. Seah, A Priority-Based Multi-Path Routing Protocol for Sensor Networks, 15th IEEE International Symposium on Volume 1, 216-220, 2004
    • (2004) 15th IEEE International Symposium on , vol.1 , pp. 216-220
    • Liu, Y.1    Seah, W.K.G.2
  • 29
    • 34547527115 scopus 로고    scopus 로고
    • 2 RC: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks
    • ACM SIGBED, Jan
    • 2 RC: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks, ACM SIGBED Review, Vol. 2, Jan 2005.
    • (2005) Review , vol.2
    • Morcos, H.1    Matta, I.2    Bestavros, A.3
  • 30
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil Attack in Sensor Networks: Analysis and Defenses
    • Apr
    • J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, IEEE IPSN'04, pp. 259-268, Apr. 2004.
    • (2004) IEEE IPSN'04 , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 33
    • 4243082091 scopus 로고    scopus 로고
    • A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53-57, Jun. 2004
    • A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53-57, Jun. 2004
  • 36
    • 35048900024 scopus 로고
    • Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks
    • IEEE March 2003 2003
    • D. Tian and N.D. Georganas, Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks, IEEE Wireless Communications and Networking (WCNC 2003), IEEE Volume 3, 1923-1929, March 2003
    • (1923) IEEE Wireless Communications and Networking (WCNC , vol.3
    • Tian, D.1    Georganas, N.D.2
  • 38
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct
    • A. Wood and J. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, Vol.35, 54-62, Oct. 2002
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 39
    • 29844441128 scopus 로고    scopus 로고
    • Toward Resilient Security in Wireless Sensor Networks
    • May
    • H.Yang, F. Ye, Y. Yuan, S. Lu and W. Arbough, Toward Resilient Security in Wireless Sensor Networks, ACM MobiHoc'05, 34-45, May 2005
    • (2005) ACM MobiHoc'05 , pp. 34-45
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4    Arbough, W.5
  • 40
    • 34547505521 scopus 로고    scopus 로고
    • Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006
    • Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006
  • 41
    • 3543100577 scopus 로고    scopus 로고
    • Statictial En-route Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu and L. Zhang, Statictial En-route Filtering of Injected False Data in Sensor Networks, IEEE INFOCOM, 2004
    • (2004) IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 44
    • 25844473466 scopus 로고    scopus 로고
    • Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
    • March
    • W. Zhang and G. Cao, Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach, IEEE INFOCOM'05. Vol. 1, 503-514, March 2005
    • (2005) IEEE INFOCOM'05 , vol.1 , pp. 503-514
    • Zhang, W.1    Cao, G.2
  • 47


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.