메뉴 건너뛰기




Volumn , Issue , 2007, Pages 9-16

Practical algorithm for data security (PADS) in wireless sensor networks

Author keywords

Data stream; Security; Sensor networks

Indexed keywords

DATA STREAMS; INJECTED MESSAGES; PRACTICAL ALGORITHM FOR DATA SECURITY (PADS);

EID: 35548961420     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1254850.1254853     Document Type: Conference Paper
Times cited : (19)

References (22)
  • 1
    • 0013277491 scopus 로고    scopus 로고
    • A topology discovery algorithm for sensor networks with applications to network management
    • DCS-TR-441, Rutgers University, May
    • B. Deb, S. Bhatnagar, and B. Nath. A topology discovery algorithm for sensor networks with applications to network management. DCS Technical Report DCS-TR-441, Rutgers University, May 2001.
    • (2001) DCS Technical Report
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 4
    • 33646918331 scopus 로고    scopus 로고
    • G. Guimaraes, E. Souto, D. Sadok, and J. Kelner. Evaluation of security mechanisms in wireless sensor networks, icw, 00:428-433, 2005.
    • G. Guimaraes, E. Souto, D. Sadok, and J. Kelner. Evaluation of security mechanisms in wireless sensor networks, icw, 00:428-433, 2005.
  • 7
    • 35548973198 scopus 로고    scopus 로고
    • C. T. Inc. MPR400/410/420 MICA2 Mote. Datasheet 2005.
    • C. T. Inc. MPR400/410/420 MICA2 Mote. Datasheet 2005.
  • 9
    • 20344392154 scopus 로고    scopus 로고
    • Benchmarking block ciphers for wireless sensor networks (extended abstract)
    • electronic edition, Fort Lauderdale, Florida, Oct, IEEE Computer Society Press, Los Alamitos, California
    • Y. Law, J. Doumen, and P. Hartel. Benchmarking block ciphers for wireless sensor networks (extended abstract). In 1st Int. Conf. on Mobile Ad-hoc and Sensor Systems, page electronic edition, Fort Lauderdale, Florida, Oct 2004. IEEE Computer Society Press, Los Alamitos, California.
    • (2004) 1st Int. Conf. on Mobile Ad-hoc and Sensor Systems
    • Law, Y.1    Doumen, J.2    Hartel, P.3
  • 10
    • 35548955296 scopus 로고    scopus 로고
    • P. Levis. Tossim: A simulator for tinyos networks
    • P. Levis. Tossim: A simulator for tinyos networks.
  • 11
    • 31844452363 scopus 로고    scopus 로고
    • P. Levis, D. Gay, and . Culler. Active sensor networks. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI '05), Boston, MA, USA, May 2005.
    • P. Levis, D. Gay, and . Culler. Active sensor networks. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI '05), Boston, MA, USA, May 2005.
  • 16
    • 14844321322 scopus 로고    scopus 로고
    • Gathering correlated data in sensor networks
    • October
    • P. V. Rickenbach and R. Wattenhofer. Gathering correlated data in sensor networks. In DIALM-POMC, pages 60-66, October 2004.
    • (2004) DIALM-POMC , pp. 60-66
    • Rickenbach, P.V.1    Wattenhofer, R.2
  • 17
    • 84872291479 scopus 로고    scopus 로고
    • Resilient rights protection for sensor streams
    • R. Sion, M. Atallah, and S. Prabhakar. Resilient rights protection for sensor streams. In VLDB, pages 732-743, 2004.
    • (2004) VLDB , pp. 732-743
    • Sion, R.1    Atallah, M.2    Prabhakar, S.3
  • 19
    • 47749093823 scopus 로고    scopus 로고
    • Exploring message authentication in sensor networks
    • Proceedings of ESAS 2004 1st European Workshop on Security in Ad Hoc and Sensor Networks, Heidelberg, Germany, Aug, Springer-Verlag
    • H. Vogt. Exploring message authentication in sensor networks. In Proceedings of ESAS 2004 (1st European Workshop on Security in Ad Hoc and Sensor Networks), LNCS, Heidelberg, Germany, Aug. 2004. Springer-Verlag.
    • (2004) LNCS
    • Vogt, H.1
  • 20
    • 33646824919 scopus 로고    scopus 로고
    • H. Xu, L. Huang, Y. Wan, and B. Xu. Accurate time synchronization for wireless sensor networks. In X. Jia, J. Wu, and Y. He, editors, MSN, 3794 of Lecture Notes in Computer Science, pages 153-163. Springer, 2005.
    • H. Xu, L. Huang, Y. Wan, and B. Xu. Accurate time synchronization for wireless sensor networks. In X. Jia, J. Wu, and Y. He, editors, MSN, volume 3794 of Lecture Notes in Computer Science, pages 153-163. Springer, 2005.
  • 22
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • IEEE Computer Society
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-271. IEEE Computer Society, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.