메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages

Statistical trast establishment in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS.; CONFIDENCE INTERVAL; DISTRIBUTED APPROACHES; DYNAMIC SCALING; EXTENSIVE SIMULATIONS; HIGH CONFIDENCE; INTERNATIONAL CONFERENCES; MEMORY OVERHEADS; PARALLEL AND DISTRIBUTED SYSTEMS; REDUCED ENERGY; RESOURCE LIMITATIONS; SENSOR NODE; SENSOR NODES; TRUST RELATIONSHIPS; WIRELESS SENSORS;

EID: 48049097061     PISSN: 15219097     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPADS.2007.4447736     Document Type: Conference Paper
Times cited : (71)

References (21)
  • 1
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 4
    • 0006497460 scopus 로고    scopus 로고
    • Caching trust rather than content
    • Online, Available
    • M. Sathyanarayanan, "Caching trust rather than content," Operating Systems Review, vol. 34, no. 4, pp. 32-33, 2000. [Online]. Available: citeseer.ist.psu.edu/satyanarayanan00caching.html
    • (2000) Operating Systems Review , vol.34 , Issue.4 , pp. 32-33
    • Sathyanarayanan, M.1
  • 8
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • February
    • G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318-328, February 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 9
    • 36949013183 scopus 로고    scopus 로고
    • Drbts: Distributed reputationbased beacon trust system
    • A. Srinivasan, J. Teitelbaum, and J. Wu, "Drbts: Distributed reputationbased beacon trust system." in DASC, 2006, pp. 277-283.
    • (2006) DASC , pp. 277-283
    • Srinivasan, A.1    Teitelbaum, J.2    Wu, J.3
  • 10
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y. L. Sun, W. Yu, Z. Han, and K. Lui, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 305-317, 2006.
    • (2006) Selected Areas in Communications, IEEE Journal on , vol.24 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Lui, K.4
  • 11
    • 27544433189 scopus 로고    scopus 로고
    • M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. C. Hu, Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks, dsn, 00, pp. 672-681, 2005.
    • M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. C. Hu, "Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks," dsn, vol. 00, pp. 672-681, 2005.
  • 12
    • 32144459886 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • November
    • C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proceedings of Sensys 2004, November 2004.
    • (2004) Proceedings of Sensys 2004
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 15
    • 48049095097 scopus 로고    scopus 로고
    • Realizing robust user authentication in sensor networks
    • N. G. Zinaida Benenson and O. Raivio, "Realizing robust user authentication in sensor networks," in RealWSN, 2005.
    • (2005) RealWSN
    • Zinaida Benenson, N.G.1    Raivio, O.2
  • 16
    • 33646569085 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper)
    • V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper)," in PerCom, 2005, pp. 247-256.
    • (2005) PerCom , pp. 247-256
    • Gupta, V.1    Millard, M.2    Fung, S.3    Zhu, Y.4    Gura, N.5    Eberle, H.6    Shantz, S.C.7
  • 18
    • 48049124861 scopus 로고    scopus 로고
    • A visual basic program giving weighted confidence intervals for mean and variance,
    • 1581, June
    • D. Krause and C. Withers, "A visual basic program giving weighted confidence intervals for mean and variance," Industrial Research Limited Report 1581, June 2004.
    • (2004) Industrial Research Limited Report
    • Krause, D.1    Withers, C.2
  • 19
    • 48049106564 scopus 로고    scopus 로고
    • J. M. Bland and S. Kerry, Weighted comparison of means, BMJ, 1998.
    • J. M. Bland and S. Kerry, "Weighted comparison of means," BMJ, 1998.
  • 20
    • 84866469313 scopus 로고    scopus 로고
    • Serloc: Robust localization for wireless sensor networks
    • L. Lazos and R. Poovendran, "Serloc: Robust localization for wireless sensor networks," ACM Trans. Sen. Netw., vol. 1, no. 1, pp. 73-100, 2005.
    • (2005) ACM Trans. Sen. Netw , vol.1 , Issue.1 , pp. 73-100
    • Lazos, L.1    Poovendran, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.