메뉴 건너뛰기




Volumn , Issue , 2004, Pages 637-646

Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER PROGRAMMING; COMPUTER SIMULATION; FAULT TOLERANT COMPUTER SYSTEMS; ROUTERS; SECURITY SYSTEMS; SENSORS; SOFTWARE ENGINEERING; TELECOMMUNICATION TRAFFIC;

EID: 4544298056     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (162)

References (23)
  • 1
    • 84891797725 scopus 로고    scopus 로고
    • Tinyos website. http://webs.cs.berkeley.edu/tos/.
    • Tinyos Website
  • 3
    • 4544319085 scopus 로고    scopus 로고
    • U. A. F. ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense. Argus
    • U. A. F. ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense. Argus. http://www.globalsecurity.org/intell/systems/ arguss.htm.
  • 4
    • 3943055289 scopus 로고
    • An intrusion tolerant security server for an open distributed system
    • Toulouse, France
    • L. Blain and Y. Deswarte. An intrusion tolerant security server for an open distributed system. In 1st European Symposium in Computer Security, Toulouse, France 1990.
    • (1990) 1st European Symposium in Computer Security
    • Blain, L.1    Deswarte, Y.2
  • 6
    • 84944457899 scopus 로고    scopus 로고
    • Rapid prototyping of mobile input devices using wireless sensor nodes
    • Monterey, California, USA, October
    • J. Carlson, R. Han, and et.al. Rapid prototyping of mobile input devices using wireless sensor nodes. In WMCSA'03, Monterey, California, USA, October 2003.
    • (2003) WMCSA'03
    • Carlson, J.1    Han, R.2
  • 8
    • 4243199653 scopus 로고    scopus 로고
    • The performance evaluation of intrusion-tolerant routing in wireless sensor networks
    • Palo Alto, CA, USA, April
    • J. Deng, R. Han, and S. Mishra. The performance evaluation of intrusion-tolerant routing in wireless sensor networks. In IPSN'03, Palo Alto, CA, USA, April 2003.
    • (2003) IPSN'03
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 12
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • February
    • D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of ACM, 42(2), February 1999.
    • (1999) Communications of ACM , vol.42 , Issue.2
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 14
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • San Diego, CA, USA, September
    • Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, USA, September 2003.
    • (2003) 2nd ACM Workshop on Wireless Security (WiSe'03)
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • September
    • C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), September 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3
    • Karlof, C.1    Wagner, D.2
  • 16
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washingon D.C, USA, October
    • D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS'03, Washingon D.C, USA, October 2003.
    • (2003) CCS'03
    • Liu, D.1    Ning, P.2
  • 20
    • 0036930216 scopus 로고    scopus 로고
    • Quantifying the cost of providing intrusion tolerance in group communication systems
    • Washington D.C, USA, June
    • H. V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, and W. H. Sanders. Quantifying the cost of providing intrusion tolerance in group communication systems. In DSN'02, Washington D.C, USA, June 2002.
    • (2002) DSN'02
    • Ramasamy, H.V.1    Pandey, P.2    Lyons, J.3    Cukier, M.4    Sanders, W.H.5
  • 21
    • 0036929535 scopus 로고    scopus 로고
    • Developing a heterogeneous intrusion tolerant corba system
    • Washington D.C, USA, June
    • D. Sames, B. Matt, B. Niebuhr, G. Tally, B. Whitmore, and D. Bakken. Developing a heterogeneous intrusion tolerant corba system. In DSN'02, Washington D.C, USA, June 2002.
    • (2002) DSN'02
    • Sames, D.1    Matt, B.2    Niebuhr, B.3    Tally, G.4    Whitmore, B.5    Bakken, D.6
  • 22
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 23
    • 85084160265 scopus 로고    scopus 로고
    • Building intrusion tolerant applications
    • Washington D.C, USA, August
    • T. J. Wu, M. MalKin, and D. Boneh. Building intrusion tolerant applications. In 8th USENIX Security Symposium, pages 79-91, Washington D.C, USA, August 1999.
    • (1999) 8th USENIX Security Symposium , pp. 79-91
    • Wu, T.J.1    Malkin, M.2    Boneh, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.