메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2446-2457

Statistical En-route Filtering of injected false data in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; EN-ROUTE FILTERING MECHANISM (SEF); SENSOR NETWORKS;

EID: 3543100577     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2004.1354666     Document Type: Conference Paper
Times cited : (337)

References (29)
  • 1
    • 8344275191 scopus 로고    scopus 로고
    • SPINS: Security suite for sensor networks
    • V. Wen, A. Perrig, and R. Szewczyk, "SPINS: Security Suite for Sensor Networks," in ACM MOIBCOM, 2001.
    • (2001) ACM MOIBCOM
    • Wen, V.1    Perrig, A.2    Szewczyk, R.3
  • 2
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in ACM CCS, 2002.
    • (2002) ACM CCS
    • Eschenauer, L.1    Gligor, V.D.2
  • 4
    • 1842643245 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," in IEEE ICNP, 2001.
    • (2001) IEEE ICNP
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 6
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • September
    • D. W. Carman, P. S. Kruus, and B. J. Matt, "Constraints and Approaches for Distributed Sensor Network Security," NAI Labs, Tech. Rep. 00-010, September 2000.
    • (2000) NAI Labs, Tech. Rep. , Issue.10
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 7
    • 2442529460 scopus 로고    scopus 로고
    • GRAdient broadcast: A robust data delivery protocol for large scale sens or networks
    • March 2005
    • F. Ye, G. Zhong, S. Lu, and L. Zhang, "GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sens or Networks," ACM Wireless Networks (WINET), vol. 11, no. 2, March 2005.
    • ACM Wireless Networks (WINET) , vol.11 , Issue.2
    • Ye, F.1    Zhong, G.2    Lu, S.3    Zhang, L.4
  • 8
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Crypto, 1996.
    • (1996) Crypto
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 10
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 13, no. 7, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7
    • Bloom, B.1
  • 14
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks," in ACM MOBICOM, 2000.
    • (2000) ACM MOBICOM
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 15
    • 3042822813 scopus 로고    scopus 로고
    • A two-tier data dissemination model for large-scale wireless sensor networks
    • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks," in ACM MOIBCOM, 2002.
    • (2002) ACM MOIBCOM
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang, L.5
  • 17
    • 0037630649 scopus 로고    scopus 로고
    • PEAS: A robust energy conserving protocol for long-lived sensor networks
    • F. Ye, G. Zhong, S. Lu, and L. Zhang, "PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks," in ICDCS, 2003.
    • (2003) ICDCS
    • Ye, F.1    Zhong, G.2    Lu, S.3    Zhang, L.4
  • 18
    • 8344222988 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," in IEEE SPNA, 2002.
    • (2002) IEEE SPNA
    • Karlof, C.1    Wagner, D.2
  • 19
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, October 2002.
    • (2002) IEEE Computer
    • Wood, A.1    Stankovic, J.2
  • 23
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks," in ACM MOBICOM, 2002.
    • (2002) ACM MOBICOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 26
    • 0036980295 scopus 로고    scopus 로고
    • Self-organized network layer security in mobile ad hoc networks
    • H. Yang, X. Meng, and S. Lu, "Self-organized Network Layer Security in Mobile Ad Hoc Networks," in WiSe, 2002.
    • (2002) WiSe
    • Yang, H.1    Meng, X.2    Lu, S.3
  • 29
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," in ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Park, K.1    Lee, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.