메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Topology control for secured coverage in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

HYBRID SENSORS; SENSOR NETWORKS; SENSORS; TELECOMMUNICATION EQUIPMENT; TOPOLOGY;

EID: 50249132548     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2007.4428757     Document Type: Conference Paper
Times cited : (19)

References (17)
  • 1
    • 78951488729 scopus 로고    scopus 로고
    • Intrusion detection in sensor networks: A non-cooperative game approach
    • A. Agah, S. Das, K. Basu, and M. Asadi. Intrusion detection in sensor networks: A non-cooperative game approach. Proc. of ICWN'06. 2006, pp. 29-36.
    • (2006) Proc. of ICWN'06 , pp. 29-36
    • Agah, A.1    Das, S.2    Basu, K.3    Asadi, M.4
  • 4
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    • S. Buchegger and J. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. Proc. of PDP'02. 2002, pp. 403-410.
    • (2002) Proc. of PDP'02 , pp. 403-410
    • Buchegger, S.1    Boudec, J.2
  • 5
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic ad-hoc networks
    • S. Buchegger and J. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic ad-hoc networks. Proc. of MobiHoc'02. 2002, pp. 226-236.
    • (2002) Proc. of MobiHoc'02 , pp. 226-236
    • Buchegger, S.1    Boudec, J.2
  • 7
    • 10744232231 scopus 로고    scopus 로고
    • Energy-efficient area monitoring for sensor networks
    • Feb
    • J. Carle and D. Simplot-Ryl. Energy-efficient area monitoring for sensor networks. Computer. Vol. 37, Issue 2, Feb. 2004, pp. 40-46.
    • (2004) Computer , vol.37 , Issue.2 , pp. 40-46
    • Carle, J.1    Simplot-Ryl, D.2
  • 9
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • F. Hu and N. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks. Vol. 3, No. 1, 2005, pp. 69-89.
    • (2005) Ad Hoc Networks , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.2
  • 10
    • 50249109858 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, and D. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science. June 2002, available at http://citeseer.ist.psu.edu/hu02wormhole. html.
    • Y. Hu, A. Perrig, and D. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science. June 2002, available at http://citeseer.ist.psu.edu/hu02wormhole. html.
  • 11
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karloff and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks. Vol. 1, Nos. 2-3, 2003, pp. 293-315.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karloff, C.1    Wagner, D.2
  • 14
    • 25644454458 scopus 로고    scopus 로고
    • SMART: A scan-based movement-assisted sensor deployment method in wireless sensor networks
    • March
    • J. Wu and S. Yang. SMART: A scan-based movement-assisted sensor deployment method in wireless sensor networks. Proc. of INFOCOM 2005. Vol. 4, March 2005, pp. 2313-2324.
    • (2005) Proc. of INFOCOM 2005 , vol.4 , pp. 2313-2324
    • Wu, J.1    Yang, S.2
  • 15
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: Attack and defense strategies. IEEE Network. Vol. 20, No. 3. 2006, pp. 41-47.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.