메뉴 건너뛰기




Volumn , Issue , 2008, Pages 150-154

Agent-based trust management model for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; FINANCIAL DATA PROCESSING; HYBRID SENSORS; MECHANISMS; SENSORS; TELECOMMUNICATION EQUIPMENT; WELL FLOODING; WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 51249105170     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MUE.2008.65     Document Type: Conference Paper
Times cited : (30)

References (15)
  • 2
    • 37349084148 scopus 로고    scopus 로고
    • Haiguang Chen, Huafeng Wu , Xi Zhou , Chuanshan Gao, Reputation-based Trust in Wireless Sensor Networks ,2007 International Conference on Multimedia and Ubiquitous Engineering (MUE2007) pp. 603-607, April , 2007,Seoul, Korea.
    • Haiguang Chen, Huafeng Wu , Xi Zhou , Chuanshan Gao, Reputation-based Trust in Wireless Sensor Networks ,2007 International Conference on Multimedia and Ubiquitous Engineering (MUE2007) pp. 603-607, April , 2007,Seoul, Korea.
  • 6
    • 3543100577 scopus 로고    scopus 로고
    • Statistical Enroute Detection and Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu, L. Zhang. "Statistical Enroute Detection and Filtering of Injected False Data in Sensor Networks". In Proceedings of IEEE Infocom, 2004.
    • (2004) Proceedings of IEEE Infocom
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 7
    • 4243199653 scopus 로고    scopus 로고
    • The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
    • In the, April
    • J. Deng, R. Han and S. Mishra. "The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks". In the Proceedings of IPSN, April, 2003.
    • (2003) Proceedings of IPSN
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 8
    • 14844319049 scopus 로고    scopus 로고
    • TinySec: Link Layer Encryption for Tiny Devices
    • To appear in
    • C. Karlof, N. Sastry, D. Wagner. "TinySec: Link Layer Encryption for Tiny Devices". To appear in ACM SenSys, 2004.
    • (2004) ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 9
    • 37349069617 scopus 로고    scopus 로고
    • Location & Identity based Secure Event Report Generation for Sensor Networks
    • NESL Techanical Report, May
    • S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B.Srivastava. "Location & Identity based Secure Event Report Generation for Sensor Networks". NESL Techanical Report, May 2004.
    • (2004)
    • Ganeriwal, S.1    Kumar, R.2    Han, C.C.3    Lee, S.4    Srivastava, M.B.5
  • 11
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks", IEEE Wireless Communications, vol. 11, no. 1, pp. 48-60, Feb 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 14
    • 51249103352 scopus 로고    scopus 로고
    • S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks).Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
    • S. Buchegger and J.-Y. Le Boudec. "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks)".Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.