메뉴 건너뛰기




Volumn , Issue , 2007, Pages

The security proof of a link-state routing protocol for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

HYBRID SENSORS; LAWS AND LEGISLATION; NETWORK PROTOCOLS; NETWORK ROUTING; ROUTING PROTOCOLS; SENSORS; WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50249162045     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2007.4428765     Document Type: Conference Paper
Times cited : (14)

References (10)
  • 1
    • 34547461706 scopus 로고    scopus 로고
    • Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks
    • Oct
    • G. Ács, L. Buttyán, and I. Vajda. Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks. In Proceedings of ACM SASN, Oct. 2006.
    • (2006) Proceedings of ACM SASN
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 2
    • 85008543309 scopus 로고    scopus 로고
    • Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
    • November
    • G. Ács, L. Buttyán, and I. Vajda. Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. In IEEE Transactions on Mobile Computing, Vol. 5, No. 11, November 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 3
    • 27544440245 scopus 로고    scopus 로고
    • INSENS: Intrusion-Tolerant Routing in Wireless Sensor Sensor Networks
    • Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, November
    • J. Deng, R. Han, and S. Mishra. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Sensor Networks. Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, November 2002.
    • (2002)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 5
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof, D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Ad Hoc Networks, Volume 1, 2003.
    • (2003) Ad Hoc Networks , vol.1
    • Karlof, C.1    Wagner, D.2
  • 8
    • 51749101324 scopus 로고    scopus 로고
    • How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
    • San Jose, CA, October
    • P. Papadimitratos, Z.J. Haas, and J.-P. Hubaux. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET. In Proceedings of IEEE CS BroadNets 2006, San Jose, CA, October 2006.
    • (2006) Proceedings of IEEE CS BroadNets 2006
    • Papadimitratos, P.1    Haas, Z.J.2    Hubaux, J.-P.3
  • 10
    • 34547477757 scopus 로고    scopus 로고
    • A. D. Wood, L. Fang, J. A. Stankovic, and T. He. SIGF: A family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of ACM SASN, Oct. 2006.
    • A. D. Wood, L. Fang, J. A. Stankovic, and T. He. SIGF: A family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of ACM SASN, Oct. 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.