메뉴 건너뛰기




Volumn 8, Issue , 2006, Pages 3414-3419

SAS: A simple anonymity scheme for clustered wireless sensor networks

Author keywords

Anonymity; Authentication; Clustering; Confidentiality; Privacy; Pseudonym; Wireless sensor networks

Indexed keywords

AUTHENTICATION; CLUSTERING ALGORITHMS; DATA STORAGE EQUIPMENT; NETWORK PROTOCOLS; NETWORK ROUTING;

EID: 42549171566     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255600     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 12
    • 2442445104 scopus 로고    scopus 로고
    • A cluster based secure routing scheme for wireless ad hoc networks
    • Phoenix, Arizona
    • R. Poosarla, H. Deng, A. Ojha, and D. P. Agarwal. A cluster based secure routing scheme for wireless ad hoc networks. In IEEE IPCCC, 2004, pages 171-175, Phoenix, Arizona, 2004.
    • (2004) IEEE IPCCC , pp. 171-175
    • Poosarla, R.1    Deng, H.2    Ojha, A.3    Agarwal, D.P.4
  • 13
    • 22944492132 scopus 로고    scopus 로고
    • AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
    • X. Wu and B. K. Bhargava. AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol. In IEEE Trans. Mob. Comput., volume 4, pages 335-348, 2005.
    • (2005) IEEE Trans. Mob. Comput , vol.4 , pp. 335-348
    • Wu, X.1    Bhargava, B.K.2
  • 15
    • 4544285741 scopus 로고    scopus 로고
    • Distributed clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach
    • O. Younis and S. Fahmy. Distributed clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. In IEEE, INFOCOM 2004, volume 1, pages 629-640, 2004.
    • (2004) IEEE, INFOCOM 2004 , vol.1 , pp. 629-640
    • Younis, O.1    Fahmy, S.2
  • 18
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-274, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-274
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.