메뉴 건너뛰기




Volumn , Issue , 2008, Pages 537-542

Countering sinkhole and black hole attacks on sensor networks using dynamic trust management

Author keywords

Black holes; Dynamic trust management; Multiple attacks; Sensors; Sinkholes

Indexed keywords

COMPUTER NETWORKS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; NETWORK SECURITY; SENSOR NETWORKS; SENSORS; STARS; WIRELESS SENSOR NETWORKS;

EID: 55849152101     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2008.4625768     Document Type: Conference Paper
Times cited : (42)

References (15)
  • 1
    • 33750962384 scopus 로고    scopus 로고
    • *, Uyen Trang Nguyen, Department of Computer Science and Engineering, York University, Toronto. A study of different types of attacks on multicast in mobile ad hoc networks. Proceedings of the ICNICONSMCL'06, 00, 2006.
    • *, Uyen Trang Nguyen, Department of Computer Science and Engineering, York University, Toronto. "A study of different types of attacks on multicast in mobile ad hoc networks". Proceedings of the ICNICONSMCL'06, Volume-00, 2006.
  • 2
    • 84880467894 scopus 로고    scopus 로고
    • The EigenTrust Algorithm for Reputation Management in P2P Networks
    • May 20-24, Budapest, Hungary
    • Sepandar D. Kamvar, Mario T. Schlosser, Hector GarciaMolina "The EigenTrust Algorithm for Reputation Management in P2P Networks", In Proceedings of WWW2003, May 20-24, 2003, Budapest, Hungary.
    • (2003) Proceedings of WWW2003
    • Kamvar, S.D.1    Schlosser, M.T.2    GarciaMolina, H.3
  • 3
    • 55849128847 scopus 로고    scopus 로고
    • *, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, First IEEE International Workshop on Sensor Network Protocols and Applications, 2002.
    • *, David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", First IEEE International Workshop on Sensor Network Protocols and Applications, 2002.
  • 4
    • 85141908321 scopus 로고    scopus 로고
    • Edith C. H. Ngai,1 Jiangchuan Liu,2 and Michael R. Lyu, On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, 12 Jun 2006, IEEE International Conference on Communications, 2006.
    • Edith C. H. Ngai,1 Jiangchuan Liu,2 and Michael R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks", 12 Jun 2006, IEEE International Conference on Communications, 2006.
  • 5
    • 55849114375 scopus 로고    scopus 로고
    • Asad Amir Pirzada and Chris McDonald Circumventing Sinkholes and Wormholes in Wireless Sensor Networks, In IWWAN, 2005.
    • Asad Amir Pirzada and Chris McDonald "Circumventing Sinkholes and Wormholes in Wireless Sensor Networks", In IWWAN, 2005.
  • 7
    • 33847372101 scopus 로고    scopus 로고
    • Increasing the dos attack resiliency in military ad hoc networks
    • Atlantic City, New lersey, USA
    • Jarmo V. E. Mölsä, "Increasing the dos attack resiliency in military ad hoc networks", Proc. IEEE MILCOM, Atlantic City, New lersey, USA, 2005.
    • (2005) Proc. IEEE MILCOM
    • Mölsä, J.V.E.1
  • 10
    • 33748995703 scopus 로고    scopus 로고
    • Detecting Impersonation Attacks in Future Wireless and Mobile Networks
    • Mobile Ad-hoc Networks and Sensors workshop MADNES, Springer Berlin, Heidelberg
    • Michel Barbeau, Jyanthi Hall, and Evangelos Kranakis "Detecting Impersonation Attacks in Future Wireless and Mobile Networks", Mobile Ad-hoc Networks and Sensors workshop (MADNES), Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 4074, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4074
    • Barbeau, M.1    Hall, J.2    Kranakis, E.3
  • 14
    • 33645966740 scopus 로고    scopus 로고
    • Automation And Robotics Research Institute, University of Texas at Arlington
    • F. L. Lewis, Automation And Robotics Research Institute, University of Texas at Arlington. "Wireless Sensor Networks" supported by ARO Research Grant, DAAD 19-02-1-0366.
    • Wireless Sensor Networks
    • Lewis, F.L.1
  • 15
    • 1542317831 scopus 로고    scopus 로고
    • Rushing Attacks and defense in Wireless Ad Hoc Network Routing Protocols
    • San Diego, CA, Sep
    • Yih-Chun Hu, Adrian Perrig, David B. Johnson "Rushing Attacks and defense in Wireless Ad Hoc Network Routing Protocols", ACM Workshop on Wireless Security (WiSe 2003), pp. 30-40, San Diego, CA, Sep 2003.
    • (2003) ACM Workshop on Wireless Security (WiSe , pp. 30-40
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.