메뉴 건너뛰기




Volumn , Issue , 2008, Pages 332-340

Secure data collection scheme in wireless sensor network with mobile sink

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; FUNCTIONS; HYBRID SENSORS; PROBABILITY; RISK ASSESSMENT; ROUTING PROTOCOLS; SECURITY OF DATA; SENSOR NETWORKS; SENSORS; TECHNICAL PRESENTATIONS; TELECOMMUNICATION NETWORKS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51749110873     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2008.31     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 0242527321 scopus 로고    scopus 로고
    • The Shared Wireless Infostation Model-A New Ad Hoc Networking Paradigm ( or Where there Is a Whale, there Is a Way)
    • T. Small and Z. Haas, "The Shared Wireless Infostation Model-A New Ad Hoc Networking Paradigm ( or Where there Is a Whale, there Is a Way)," Proc. ACM MobiHoc, 2003.
    • (2003) Proc. ACM MobiHoc
    • Small, T.1    Haas, Z.2
  • 5
    • 4444277059 scopus 로고    scopus 로고
    • A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks
    • W. Zhao, M. Ammar, and E. Zegura, "A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks," Proc. ACM MobiHoc, 2004.
    • (2004) Proc. ACM MobiHoc
    • Zhao, W.1    Ammar, M.2    Zegura, E.3
  • 10
    • 33750316239 scopus 로고    scopus 로고
    • Communciation Power Optimization in a Sensor network with a Path-Constrained Mobile Observer
    • August
    • A. Chakrabarti, A. Sabharwal, and B. Aazhang, "Communciation Power Optimization in a Sensor network with a Path-Constrained Mobile Observer," ACM Transactions on Sensor Networks, vol. 2, no. 3, pp.297-324, August 2006
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.3 , pp. 297-324
    • Chakrabarti, A.1    Sabharwal, A.2    Aazhang, B.3
  • 12
    • 0022793132 scopus 로고
    • How to Construct Random Functions
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of ACM, vol. 33, no. 4, pp. 210-217, 1986.
    • (1986) Journal of ACM , vol.33 , Issue.4 , pp. 210-217
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 13
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Commuincation
    • November
    • L. Lamport, "Password Authentication with Insecure Commuincation," Communications of the ACM, vol, 24, no. 11, pp. 770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 14
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
    • Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. WMCSA, 2002.
    • (2002) Proc. WMCSA
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 17
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
    • Y. Hu, A. Perrig, and Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. InfoCom, 2003.
    • (2003) Proc. InfoCom
    • Hu, Y.1    Perrig, A.2    Johnson3
  • 19
    • 0013138682 scopus 로고    scopus 로고
    • Secure Routing for Mobile Ad Hoc Networks
    • P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," Proc. CNDS, 2002.
    • (2002) Proc. CNDS
    • Papadimitratos, P.1    Haas, Z.J.2
  • 24
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 25
    • 3543100577 scopus 로고    scopus 로고
    • Statistical Enroute Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu, and Zhang, "Statistical Enroute Filtering of Injected False Data in Sensor Networks," IEEE InfoCom, 2004.
    • (2004) IEEE InfoCom
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.