메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1499-1504

AICN: An efficient algorithm to identify compromised nodes in wireless sensor network

Author keywords

Identify compromised nodes; Security; Wireless sensor network

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTER NETWORKS; HYBRID SENSORS; MILITARY APPLICATIONS; RELIABILITY; SENSORS; TELECOMMUNICATION EQUIPMENT; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51249084123     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2008.290     Document Type: Conference Paper
Times cited : (11)

References (24)
  • 2
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor networks: Research challenges
    • I. Akyildiz and I. Kasimoglu, "Wireless sensor and actor networks: research challenges", Ad Hoc Networks, Vol. 2, No. 4, pp. 351-367, 2004.
    • (2004) Ad Hoc Networks , vol.2 , Issue.4 , pp. 351-367
    • Akyildiz, I.1    Kasimoglu, I.2
  • 3
    • 33747130666 scopus 로고    scopus 로고
    • Wireless underground sensor networks: Research challenges
    • I. Akyildiz and E. Stuntebeck, "Wireless underground sensor networks: research challenges", Ad Hoc Networks, Vol. 4, No. 6, pp. 669-686, 2006.
    • (2006) Ad Hoc Networks , vol.4 , Issue.6 , pp. 669-686
    • Akyildiz, I.1    Stuntebeck, E.2
  • 8
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • October
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks", in Proc. ACM CCS 2003, October 2003, pp. 62-72.
    • (2003) Proc. ACM CCS 2003 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 10
    • 50949094048 scopus 로고    scopus 로고
    • A novel voting mechanism for compromised node revocation in wireless ad hoc networks
    • San Francisco, Nov. 27-Dec. 1
    • X. Lin, H. Zhu, B. Lin, P.-H. Ho, and X. Shen, " A novel voting mechanism for compromised node revocation in wireless ad hoc networks", in IEEE Global Communications Conference (GLOBECOM'06), San Francisco, Nov. 27-Dec. 1, 2006.
    • (2006) IEEE Global Communications Conference (GLOBECOM'06)
    • Lin, X.1    Zhu, H.2    Lin, B.3    Ho, P.-H.4    Shen, X.5
  • 11
    • 51249102091 scopus 로고    scopus 로고
    • Towards compromise-resilient localized authentication architecture for wireless mesh networks
    • Vancouver, British Columbia, August 14-17
    • X. Lin, P.-H. Ho, and X. Shen, "Towards compromise-resilient localized authentication architecture for wireless mesh networks", in Proc. of QShine 2007, Vancouver, British Columbia, August 14-17, 2007.
    • (2007) Proc. of QShine 2007
    • Lin, X.1    Ho, P.-H.2    Shen, X.3
  • 12
    • 29844441128 scopus 로고    scopus 로고
    • Toward resilient security in wireless sensor networks
    • May
    • H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 34-45.
    • (2005) Proc. ACM Mobihoc 2005 , pp. 34-45
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4    Arbaugh, W.5
  • 13
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • March
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks", in Proc. IEEE Infocom 2004, March 2004, pp. 2446-2457.
    • (2004) Proc. IEEE Infocom 2004 , pp. 2446-2457
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 14
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • May
    • W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 58-67.
    • (2005) Proc. ACM Mobihoc 2005 , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3
  • 15
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks", in Proc. ACM Mobihoc 2005, May 2005, pp. 378-389.
    • (2005) Proc. ACM Mobihoc 2005 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 16
    • 33845479472 scopus 로고    scopus 로고
    • Secure cooperative mobile ad hoc networks against injecting traffic attacks
    • September
    • W. Yu and K. Liu, "Secure cooperative mobile ad hoc networks against injecting traffic attacks", in Proc. IEEE SECON 2005, September 2005, pp. 55-64.
    • (2005) Proc. IEEE SECON 2005 , pp. 55-64
    • Yu, W.1    Liu, K.2
  • 17
    • 43849098907 scopus 로고    scopus 로고
    • A trust based framework for secure data aggregation in wireless sensor networks
    • September
    • W. Zhang, S. Das, and Y. Liu, " A trust based framework for secure data aggregation in wireless sensor networks", in Proc. IEEE SECON 2006, September 2006.
    • (2006) Proc. IEEE SECON 2006
    • Zhang, W.1    Das, S.2    Liu, Y.3
  • 18
    • 39049083533 scopus 로고    scopus 로고
    • Threshold key-establishment in distributed sensor networks using a multivariate scheme
    • April
    • F. Delgosha and F. Fekri, " Threshold key-establishment in distributed sensor networks using a multivariate scheme", in Proc. IEEE Infocom 2006, April 2006.
    • (2006) Proc. IEEE Infocom 2006
    • Delgosha, F.1    Fekri, F.2
  • 19
    • 39049089652 scopus 로고    scopus 로고
    • Leveraging channel diversity for key establishment in wireless sensor networks
    • April
    • M. Miller and N. Vaidya, " Leveraging channel diversity for key establishment in wireless sensor networks ", in Proc. IEEE Infocom 2006, April 2006.
    • (2006) Proc. IEEE Infocom 2006
    • Miller, M.1    Vaidya, N.2
  • 20
    • 38549121414 scopus 로고    scopus 로고
    • SRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
    • June
    • X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen and Z. Cao, "SRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks", in Proc. IEEE ICC 2007, June 2007.
    • (2007) Proc. IEEE ICC 2007
    • Lin, X.1    Lu, R.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5    Cao, Z.6
  • 21
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • April
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: providing location-aware end-to-end data security in wireless sensor networks ", in Proc. IEEE Infocom 2006, April 2006, pp. 1-12.
    • (2006) Proc. IEEE Infocom 2006 , pp. 1-12
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 22
    • 43549089535 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • June
    • K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", in Proc. IEEE SECON 2007, June 2007.
    • (2007) Proc. IEEE SECON 2007
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 24
    • 34548365467 scopus 로고    scopus 로고
    • A cooperative intrusion detection system for ad hoc networks
    • October
    • Y. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks", in ACM SASN'03, October 2003.
    • (2003) ACM SASN'03
    • Huang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.