메뉴 건너뛰기




Volumn , Issue , 2008, Pages 664-672

Vulnerability of network traffic under node capture attacks using circuit theoretic analysis

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK TRAFFICS; NODE CAPTURE ATTACKS;

EID: 51349151780     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.41     Document Type: Conference Paper
Times cited : (26)

References (17)
  • 5
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Feb
    • D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
    • (2005) ACM Trans. Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 6
    • 35349015881 scopus 로고    scopus 로고
    • A canonical seed assignment model for key predistribution in wireless sensor networks
    • Oct
    • P. Tague and R. Poovendran, "A canonical seed assignment model for key predistribution in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 3, no. 4, Oct. 2007.
    • (2007) ACM Transactions on Sensor Networks , vol.3 , Issue.4
    • Tague, P.1    Poovendran, R.2
  • 7
    • 34248339107 scopus 로고    scopus 로고
    • Modeling adaptive node capture attacks in multi-hop wireless networks
    • Aug
    • _, "Modeling adaptive node capture attacks in multi-hop wireless networks," Ad Hoc Networks, vol. 5, no. 6, pp. 801-814, Aug. 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 9
    • 1842815876 scopus 로고    scopus 로고
    • Security based on network topology against the wiretapping attack
    • Feb
    • K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communication, vol. 11, no. 1, pp. 68-71, Feb. 2004.
    • (2004) IEEE Wireless Communication , vol.11 , Issue.1 , pp. 68-71
    • Jain, K.1
  • 11
    • 13944283393 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • May
    • K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 36149066759 scopus 로고
    • On methods for the construction of networks dual to nonplanar networks
    • Nov
    • A. Bloch, "On methods for the construction of networks dual to nonplanar networks," Proceedings of the Physical Society, vol. 58, no. 6, pp. 677-694, Nov. 1946.
    • (1946) Proceedings of the Physical Society , vol.58 , Issue.6 , pp. 677-694
    • Bloch, A.1
  • 16
    • 0000951232 scopus 로고
    • Worst-case analysis of greedy heuristics for integer programming with nonnegative data
    • Nov
    • G. Dobson, "Worst-case analysis of greedy heuristics for integer programming with nonnegative data," Mathematics of Operations Research, vol. 7, no. 4, pp. 515-531, Nov. 1982.
    • (1982) Mathematics of Operations Research , vol.7 , Issue.4 , pp. 515-531
    • Dobson, G.1
  • 17
    • 0000301097 scopus 로고
    • Greedy heuristic for the set-covering problem
    • Aug
    • V. Chvatel, "Greedy heuristic for the set-covering problem," Mathematics of Operations Research, vol. 4, no. 3, pp. 233-235, Aug. 1979.
    • (1979) Mathematics of Operations Research , vol.4 , Issue.3 , pp. 233-235
    • Chvatel, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.