메뉴 건너뛰기




Volumn , Issue , 2007, Pages 494-503

Sybil attack detection in a hierarchical sensor network

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; FINANCIAL DATA PROCESSING; PUBLIC KEY CRYPTOGRAPHY; SENSORS; TELECOMMUNICATION EQUIPMENT; TELECOMMUNICATION NETWORKS;

EID: 51349121571     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOM.2007.4550372     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 33751088577 scopus 로고    scopus 로고
    • SecRout: A Secure Routing Protocol for Sensor Networks
    • April, extended version to appear in Intl journal of Distributed Sensor Networks
    • Jian Yin and Sanjay Madria. SecRout: A Secure Routing Protocol for Sensor Networks. In Proceedings of IEEE AINA, April 2006, extended version to appear in Intl journal of Distributed Sensor Networks, 2007.
    • (2006) Proceedings of IEEE AINA
    • Yin, J.1    Madria, S.2
  • 2
    • 14344254253 scopus 로고    scopus 로고
    • A Secure Hierarchical Model for Sensor Network
    • March
    • M. Tubaishat, J. Yin, B. Panja, and S. Madria. A Secure Hierarchical Model for Sensor Network. ACM SIGMOD Record, Vol. 33, No. 1, March, 2004.
    • (2004) ACM SIGMOD Record , vol.33 , Issue.1
    • Tubaishat, M.1    Yin, J.2    Panja, B.3    Madria, S.4
  • 3
    • 0013277491 scopus 로고    scopus 로고
    • A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management
    • September
    • Budhaditya Deb, Sudeept Bhatnagar, and Badri Nath. A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management. In IEEE CAS workshop, September 2002.
    • (2002) IEEE CAS workshop
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 6
    • 33845416881 scopus 로고    scopus 로고
    • A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks
    • June
    • Jian Yin, Sanjay Madria. A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. In Proceedings of IEEE SUTC, June 2006.
    • (2006) Proceedings of IEEE SUTC
    • Yin, J.1    Madria, S.2
  • 14
    • 51349163783 scopus 로고    scopus 로고
    • Castro and Liskov. Practical Byzantine Fault Tolerance. In OSDI: Symposium on Operating Systems Design and Implementation. USENIX Association, Co-sponsored By IEEE TCOS and ACM SIGOPS, 1999.
    • Castro and Liskov. Practical Byzantine Fault Tolerance. In OSDI: Symposium on Operating Systems Design and Implementation. USENIX Association, Co-sponsored By IEEE TCOS and ACM SIGOPS, 1999.
  • 15
    • 0029530159 scopus 로고
    • A Routing Protocol for Finding Two Node-disjoint Paths in Computer Networks
    • November
    • K. Ishida, Y. Kakuda, and T. Kikuno. A Routing Protocol for Finding Two Node-disjoint Paths in Computer Networks. In International Conference on Network Protocols, November 1992, pp. 340-347
    • (1992) International Conference on Network Protocols , pp. 340-347
    • Ishida, K.1    Kakuda, Y.2    Kikuno, T.3
  • 16
    • 1542317083 scopus 로고    scopus 로고
    • M. Kochhal, L. Schwiebert, and S. Gupta. Role-based Hierarchical Self Organization for wireless ad hoc sensor networks. In Proceedings of the 2nd ACM international Conference on Wireless Sensor Networks and Applications (San Diego, CA, USA, September 19-19, 2003). WSNA '03. ACM Press, New York, NY, 98-107.
    • M. Kochhal, L. Schwiebert, and S. Gupta. Role-based Hierarchical Self Organization for wireless ad hoc sensor networks. In Proceedings of the 2nd ACM international Conference on Wireless Sensor Networks and Applications (San Diego, CA, USA, September 19-19, 2003). WSNA '03. ACM Press, New York, NY, 98-107.
  • 19
    • 51349159044 scopus 로고    scopus 로고
    • http://hypertextbook.com/facts/2001/KhalidaNisimova.sht ml
  • 21
    • 10944257465 scopus 로고    scopus 로고
    • Robot and Sensor Networks for First Responders
    • October-December
    • Vijay Kumar, Daniela Rus, Sanjiv Singh. Robot and Sensor Networks for First Responders. IEEE Pervasive Computing, vol. 03, no. 4, pp. 24-33, October-December, 2004.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 24-33
    • Kumar, V.1    Rus, D.2    Singh, S.3
  • 24
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • November
    • L. Lamport. Password Authentication with Insecure Communication. In Communications of the ACM, 24(11):770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.