메뉴 건너뛰기




Volumn 4773 LNCS, Issue , 2007, Pages 457-465

An effective secure routing for false data injection attack in wireless sensor network

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; NETWORK PROTOCOLS; NETWORK ROUTING; NETWORK SECURITY;

EID: 38148998731     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75476-3_46     Document Type: Conference Paper
Times cited : (10)

References (16)
  • 2
    • 3042704828 scopus 로고    scopus 로고
    • Applying Video Sensor Networks to Nearshore Environment Monitoring
    • Holman, R., Stanley, J., Ozkan-Haller, T.: Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Computing 2(4), 14-21 (2003)
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.4 , pp. 14-21
    • Holman, R.1    Stanley, J.2    Ozkan-Haller, T.3
  • 4
    • 38149103124 scopus 로고    scopus 로고
    • Estrin, D., et al.: Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks.UCLA Computer Science Department Technical Report,UCLA-CSD TR-01-0023 (May 2001)
    • Estrin, D., et al.: Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks.UCLA Computer Science Department Technical Report,UCLA-CSD TR-01-0023 (May 2001)
  • 5
    • 38149081257 scopus 로고    scopus 로고
    • Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient. energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review(MC2R) 1(2) (2002)
    • Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient. energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review(MC2R) 1(2) (2002)
  • 6
    • 27544440245 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing in wireless sensor networks
    • Technical Report CUCS-939-02, Department of Computer Science, University of Colorado
    • Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado (2002)
    • (2002)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 7
    • 3543100577 scopus 로고    scopus 로고
    • Statistical En-Route Filtering of Injected False Datasensor Networks
    • Hong Kong
    • Ye, F., et al.: Statistical En-Route Filtering of Injected False Datasensor Networks. In: Proc. IEEE INFOCOM, Hong Kong (2004)
    • (2004) Proc. IEEE INFOCOM
    • Ye, F.1
  • 8
    • 3142751481 scopus 로고    scopus 로고
    • On supporting Distributed Collaboration Sensor Networks
    • Wang, G., et al.: On supporting Distributed Collaboration Sensor Networks. In: Proc. MILCOM (2003)
    • (2003) Proc. MILCOM
    • Wang, G.1
  • 9
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
    • Oakland, CA, pp, May
    • Zhu, S., et al.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259-271 (May 2004)
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 259-271
    • Zhu, S.1
  • 10
    • 33845708421 scopus 로고    scopus 로고
    • A survey on wireless multimedia sensor networks
    • Akyildiz, K.R.: A survey on wireless multimedia sensor networks. Computer Networks 51(4), 921-960 (2007)
    • (2007) Computer Networks , vol.51 , Issue.4 , pp. 921-960
    • Akyildiz, K.R.1
  • 14
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • Merkle, R.: Secure communication over insecure channels. Communications of the ACM 21(4), 294-299 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 15
    • 43949105457 scopus 로고    scopus 로고
    • Group key distribution via local collaboration in wireless sensor networks
    • Santa Clara, CA September
    • Chadha, A., Lius, Y., Das, S.: Group key distribution via local collaboration in wireless sensor networks. In: Proceedings of IEEE SECON 2005, Santa Clara, CA (September 2005)
    • (2005) Proceedings of IEEE SECON
    • Chadha, A.1    Lius, Y.2    Das, S.3
  • 16
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Perrig, A., Sivalingam, R., et al.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521-534 (2002)
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Sivalingam, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.