메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 273-278

Detecting compromised nodes in wireless sensor networks

Author keywords

Algorithm; Compromise; Detection; Intrusion; Sensor networks

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; DEMODULATION; NETWORK SECURITY; SOFTWARE DESIGN;

EID: 35148897382     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2007.236     Document Type: Conference Paper
Times cited : (27)

References (10)
  • 2
    • 4243082091 scopus 로고    scopus 로고
    • Security in Wireless Sensor Networks
    • June
    • Adrian Perrig, John Stankovic, and David Wagner, "Security in Wireless Sensor Networks," Communications of the ACM, Vol. 47, No. 6, June 2004, pp. 53 - 57.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 3
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Dec
    • Elaine Shi and Adrian Perrig, "Designing Secure Sensor Networks," IEEE Wireless Communications, Vol. 11, No. 6, Dec. 2004, pp. 38-43.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 5
    • 80053424324 scopus 로고    scopus 로고
    • Intrusion Detection and Failure Recovery in Sensor Nodes
    • Tagungsband INFORMATIK 2005, Workshop Proceedings, Heidelberg, Germany, September, Springer-Verlag
    • Harald Vogt, Matthias Ringwald, and Mario Strasser, "Intrusion Detection and Failure Recovery in Sensor Nodes," in Tagungsband INFORMATIK 2005, Workshop Proceedings, LNCS, Heidelberg, Germany, September 2005. Springer-Verlag.
    • (2005) LNCS
    • Vogt, H.1    Ringwald, M.2    Strasser, M.3
  • 6
    • 33745639957 scopus 로고    scopus 로고
    • Node Compromise in Sensor Networks: The Need for Secure Systems
    • Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder
    • Carl Hartung, James Balasalle, and Richard Han, "Node Compromise in Sensor Networks: The Need for Secure Systems," Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder.
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 7
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion Detection in Wireless Ad Hoc Networks
    • Feb
    • Amitabh Mishra, Ketan Nadkami, and Animesh Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, Vol. 11, No. 1, Feb. 2004, pp. 48 - 60.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkami, K.2    Patcha, A.3
  • 9
    • 33747302351 scopus 로고    scopus 로고
    • Ilker Onat and land Ali Miri, An Intrusion Detection System for Wireless Sensor Networks, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005, 3, 2005, pp. 253 - 259.
    • Ilker Onat and land Ali Miri, "An Intrusion Detection System for Wireless Sensor Networks," IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005, Vol. 3, 2005, pp. 253 - 259.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.