메뉴 건너뛰기




Volumn 3, Issue 3, 2007, Pages

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks

Author keywords

Authentication; Filtering false data; Interleaved hop by hop; Sensor networks

Indexed keywords

BASE STATIONS; COMPUTER CRIME; DATA PROCESSING; SYSTEMS ANALYSIS; WIRELESS SENSOR NETWORKS;

EID: 34548390509     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1267060.1267062     Document Type: Article
Times cited : (61)

References (28)
  • 2
    • 84945327416 scopus 로고
    • Xor macs: New methods for message authentication using finite pseudorandom functions
    • BELLARE, M., GUERIN, R., AND ROGAWAY, P. 1995. Xor macs: New methods for message authentication using finite pseudorandom functions. In Proceedings of CRYPTo'95.
    • (1995) Proceedings of CRYPTo'95
    • BELLARE, M.1    GUERIN, R.2    ROGAWAY, P.3
  • 3
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Advances in Cryptology, Proceedings of EUROCRYPT84, Springer-Verlag, Berlin, Germany
    • BLOM, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology, Proceedings of EUROCRYPT84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335-338.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • BLOM, R.1
  • 4
    • 85028765277 scopus 로고
    • Perfectlysecure key distribution for dynamic conferences
    • Advances in Cryptology, Proceedings of CRYPTO'92, Springer-Verlag, Berlin, Germany
    • BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology, Proceedings of CRYPTO'92. Lecture Notes in Computer Science, vol. 740. Springer-Verlag, Berlin, Germany, 471-486.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • BLUNDO, C.1    SANTIS, A.D.2    HERZBERG, A.3    KUTTEN, S.4    VACCARO, U.5    YUNG, M.6
  • 5
    • 25844435733 scopus 로고    scopus 로고
    • Pike: Peer intermediaries for key establishment in sensor networks
    • CHAN, H. AND PERRIG, A. 2005. Pike: Peer intermediaries for key establishment in sensor networks. In Proceedings of Infocom'05.
    • (2005) Proceedings of Infocom , vol.5
    • CHAN, H.1    PERRIG, A.2
  • 10
  • 11
    • 0022793132 scopus 로고
    • How to construct random functions
    • Mach
    • GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. 1986. How to construct random functions. J. Assoc. Comput. Mach. 33, 4, 210-217.
    • (1986) J. Assoc. Comput , vol.33 , Issue.4 , pp. 210-217
    • GOLDREICH, O.1    GOLDWASSER, S.2    MICALI, S.3
  • 16
    • 0019634370 scopus 로고
    • Password authentication with insecure communication communication
    • LAMPORT, L. 1981. Password authentication with insecure communication communication. Commun. ACM 24, 11, 770-772.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • LAMPORT, L.1
  • 19
    • 16644374371 scopus 로고    scopus 로고
    • LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1 (Feb.), 1-77.
    • LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1 (Feb.), 1-77.
  • 23
    • 0036793924 scopus 로고    scopus 로고
    • WOOD, A. AND STANKOVIC, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10 (Oct.), 54-62.
    • WOOD, A. AND STANKOVIC, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10 (Oct.), 54-62.
  • 25
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • YE, F., LUO, H., LU, S., AND ZHANG, L. 2004. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom'04.
    • (2004) Proceedings of IEEE Infocom , vol.4
    • YE, F.1    LUO, H.2    LU, S.3    ZHANG, L.4
  • 26
    • 34548452284 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • YI, Y., WANG, X., ZHU, S., AND CAO, G. 2006. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM Mobihoc.
    • (2006) Proceedings of ACM Mobihoc
    • YI, Y.1    WANG, X.2    ZHU, S.3    CAO, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.