메뉴 건너뛰기




Volumn 4, Issue 1, 2008, Pages

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Author keywords

Broadcast authentication; DoS attacks; Security; Sensor networks

Indexed keywords

BROADCAST AUTHENTICATION; DENIAL OF SERVICES; DOS ATTACKS; SENSOR NODES;

EID: 41849094781     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1325651.1325652     Document Type: Article
Times cited : (141)

References (47)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Proceedings of the 8th International Workshop on Security Protocols
    • AURA, T., NIKANDER, P., AND LEIWO, J. 2001. DOS-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, Lecture Notes in Computer Science, vol. 2133, 170-177.
    • (2001) Lecture Notes in Computer Science , vol.2133 , pp. 170-177
    • AURA, T.1    NIKANDER, P.2    LEIWO, J.3
  • 4
    • 67749141631 scopus 로고    scopus 로고
    • Wormhole-based anti-jamming techniques in sensor networks (to appear)
    • CAGALJ, M., CAPKUN, S., AND HUBAUX, J.-P. 2006. Wormhole-based anti-jamming techniques in sensor networks (to appear). IEEE Trans. Mobile Comput.
    • (2006) IEEE Trans. Mobile Comput
    • CAGALJ, M.1    CAPKUN, S.2    HUBAUX, J.-P.3
  • 6
    • 41849134466 scopus 로고    scopus 로고
    • CHIPCON. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver. http://www.chipcon.com/files/CC2420_Data_Sheet_1_4.pdf.
    • CHIPCON. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver. http://www.chipcon.com/files/CC2420_Data_Sheet_1_4.pdf.
  • 8
    • 13244263673 scopus 로고    scopus 로고
    • CROSSBOW TECHNOLOGY INC
    • CROSSBOW TECHNOLOGY INC. Wireless sensor networks. http://www.xbow.com/Products/Wireless_Sensor.Networks.htm.
    • Wireless sensor networks
  • 12
    • 84943235829 scopus 로고
    • Pricing via processing, or, combatting junk mail
    • Proceedings of Advances in Cryptology CRYPTO'92
    • DWORK, C. AND NAOR, M. 1992. Pricing via processing, or, combatting junk mail. In Proceedings of Advances in Cryptology (CRYPTO'92). Lecture Notes in Computer Science, vol. 740, 139-147.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 139-147
    • DWORK, C.1    NAOR, M.2
  • 20
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • HU, Y., PERHIG, A., AND JOHNSON, D. 2003. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM'03.
    • (2003) Proceedings of INFOCOM , vol.3
    • HU, Y.1    PERHIG, A.2    JOHNSON, D.3
  • 21
    • 41849141706 scopus 로고    scopus 로고
    • IEEE COMPUTER SOCIETY. 2003. IEEE 802.15.4: IEEE standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.
    • IEEE COMPUTER SOCIETY. 2003. IEEE 802.15.4: IEEE standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks - specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.
  • 22
    • 13944275489 scopus 로고    scopus 로고
    • INTEL RESEARCH
    • INTEL RESEARCH. Intel mote, http://www.intel.com/ research/exploratory/motes.htm.
    • Intel mote
  • 26
    • 41849106603 scopus 로고    scopus 로고
    • LIU, A, KAMPANAKIS, P, AND NINO, P. TinyECC: Elliptic curve cryptography for sensor networks version 0.3
    • LIU, A., KAMPANAKIS, P., AND NINO, P. TinyECC: Elliptic curve cryptography for sensor networks (version 0.3). http://discovery.csc.ncsu.edu/software/TinyECC/.
  • 28
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level μTESLA: Broadcast authentication for distributed sensor networks
    • LIU, D. AND NING, P. 2004. Multi-level μTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3, 4, 800-836.
    • (2004) ACM Trans. Embed. Comput. Syst. 3 , vol.4 , pp. 800-836
    • LIU, D.1    NING, P.2
  • 35
    • 1542625909 scopus 로고    scopus 로고
    • Efficient multicast stream authentication using erasure codes
    • PARK, J., CHONG, E., AND SIEGEL, H. 2003. Efficient multicast stream authentication using erasure codes. ACMTrans. Inform, Syst. Secur. 6, 2, 258-285.
    • (2003) ACMTrans. Inform, Syst. Secur , vol.6 , Issue.2 , pp. 258-285
    • PARK, J.1    CHONG, E.2    SIEGEL, H.3
  • 44
    • 0036377260 scopus 로고    scopus 로고
    • Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks
    • STOJMENOVIC, I., SEDDIGH, M., AND ZUNIC, J. 2002. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Trans. Parall. Distrib. Syst. 13, 1, 14-25.
    • (2002) IEEE Trans. Parall. Distrib. Syst , vol.13 , Issue.1 , pp. 14-25
    • STOJMENOVIC, I.1    SEDDIGH, M.2    ZUNIC, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.