메뉴 건너뛰기




Volumn , Issue , 2008, Pages 3-10

Real-time detection of clone attacks in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

CLONING; COMPUTER SYSTEMS; INTERNET; PROBABILITY; RISK ASSESSMENT; SENSORS; WIRELESS SENSOR NETWORKS;

EID: 51849154670     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2008.55     Document Type: Conference Paper
Times cited : (135)

References (16)
  • 1
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkim and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE Infocom'05, 2005.
    • (2005) IEEE Infocom'05
    • Capkim, S.1    Hubaux, J.-P.2
  • 2
    • 8344222870 scopus 로고    scopus 로고
    • Tps: A timebased positioning scheme for outdoor sensor networks
    • Hong Kong China
    • X. Cheng, A. Thaeler, G. Xue, and D. Chen. Tps: A timebased positioning scheme for outdoor sensor networks. In IEEE INFOCOM, Hong Kong China, 2004.
    • (2004) IEEE INFOCOM
    • Cheng, X.1    Thaeler, A.2    Xue, G.3    Chen, D.4
  • 3
    • 51349148059 scopus 로고    scopus 로고
    • Set: Detecting node clones in sensor networks
    • H. Choi, S. Zhu, and T. Laporta. Set: Detecting node clones in sensor networks. In SecureComm'07, 2007.
    • (2007) SecureComm'07
    • Choi, H.1    Zhu, S.2    Laporta, T.3
  • 4
    • 25844521520 scopus 로고    scopus 로고
    • Localized faulttolerant event boundary detection in sensor networks
    • Miami, Florida
    • M. Ding, D. Chen, K. Xing, and X. Cheng. Localized faulttolerant event boundary detection in sensor networks. In IEEE INFOCOM, Miami, Florida, 2005.
    • (2005) IEEE INFOCOM
    • Ding, M.1    Chen, D.2    Xing, K.3    Cheng, X.4
  • 6
    • 34547461705 scopus 로고    scopus 로고
    • Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
    • M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari. Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In SASN'06, pages 91-100, 2006.
    • (2006) SASN'06 , pp. 91-100
    • Kefayati, M.1    Rabiee, H.R.2    Miremadi, S.G.3    Khonsari, A.4
  • 7
    • 36849045829 scopus 로고    scopus 로고
    • Detection and handling of mac layer misbehavior in wireless networks
    • P. Kyasanur and N. H. Vaidya. Detection and handling of mac layer misbehavior in wireless networks. In IEEE DSN, 2002.
    • (2002) IEEE DSN
    • Kyasanur, P.1    Vaidya, N.H.2
  • 8
    • 34548364110 scopus 로고    scopus 로고
    • Insider attacker detection in wireless sensor networks
    • Anchorage, Alaska
    • F. Liu, X. Cheng, and D. Chen. Insider attacker detection in wireless sensor networks. In IEEE INFOCOM'07, Anchorage, Alaska, 2007.
    • (2007) IEEE INFOCOM'07
    • Liu, F.1    Cheng, X.2    Chen, D.3
  • 9
    • 51849136657 scopus 로고    scopus 로고
    • Tpss: A timebased positioning scheme for sensor networks with short range beacons
    • ZhangJiaJie, Hunan, China
    • F. Liu, X. Cheng, D. Hua, and D. Chen. Tpss: A timebased positioning scheme for sensor networks with short range beacons. In ICCNMC'05, ZhangJiaJie, Hunan, China, 2005.
    • (2005) ICCNMC'05
    • Liu, F.1    Cheng, X.2    Hua, D.3    Chen, D.4
  • 10
    • 0000308593 scopus 로고    scopus 로고
    • A simple construction of d-disjunct matrices with certain constant weights
    • A. J. Macula. A simple construction of d-disjunct matrices with certain constant weights. Discrete Math., 162(1-3):311-312, 1996.
    • (1996) Discrete Math , vol.162 , Issue.1-3 , pp. 311-312
    • Macula, A.J.1
  • 11
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom'00, pages 255-265, 2000.
    • (2000) MobiCom'00 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 12
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In SP'05, pages 49-63, 2005.
    • (2005) SP'05 , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 13
    • 51849123437 scopus 로고    scopus 로고
    • A. Thaeler, M. Ding, and X. Cheng. itps: An improved location discovery scheme for sensor networks with long range beacons. In Special Issue of JPDC, 2004.
    • A. Thaeler, M. Ding, and X. Cheng. itps: An improved location discovery scheme for sensor networks with long range beacons. In Special Issue of JPDC, 2004.
  • 14
    • 37749047810 scopus 로고    scopus 로고
    • Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks
    • K. Xing, X. Cheng, L. Ma, and Q. Liang. Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks. In MobiCom'07, pages 15-26, 2007.
    • (2007) MobiCom'07 , pp. 15-26
    • Xing, K.1    Cheng, X.2    Ma, L.3    Liang, Q.4
  • 15
    • 33748089962 scopus 로고    scopus 로고
    • Sdap: A secure hopby-hop data aggregation protocol for sensor networks
    • Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap: a secure hopby-hop data aggregation protocol for sensor networks. In MobiHoc'06, pages 356-367, 2006.
    • (2006) MobiHoc'06 , pp. 356-367
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 16
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.