메뉴 건너뛰기




Volumn , Issue , 2008, Pages 193-200

KAEF: An en-route scheme of filtering false data in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION METHODS; COMPROMISED NODES; EN ROUTES; EN-ROUTE FILTERING; ENERGY SAVINGS; FALSE DATA INJECTION ATTACKS; FALSE DATUM; KEY CHAINS; NODE COMPROMISE; SECURITY CHALLENGES;

EID: 62849119348     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2008.4745144     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 1
    • 0036688074 scopus 로고    scopus 로고
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci. A Survey on Sensor Networks. In IEEE Communications Magazine, 40(8): 102-114, 2002.
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci. A Survey on Sensor Networks. In IEEE Communications Magazine, 40(8): 102-114, 2002.
  • 5
    • 0038443119 scopus 로고    scopus 로고
    • Next Generation Security for Wireless: Elliptic Curve Cryptography
    • S. Vanstone. Next Generation Security for Wireless: Elliptic Curve Cryptography. In Computers & Security, 22(5): 412-415, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 412-415
    • Vanstone, S.1
  • 6
    • 33750904440 scopus 로고    scopus 로고
    • Unleashing Public-key Cryptography in Wireless Sensor Networks
    • J. Lopez. Unleashing Public-key Cryptography in Wireless Sensor Networks. In Journal of Computer Security, 14(5): 469-482, 2006.
    • (2006) Journal of Computer Security , vol.14 , Issue.5 , pp. 469-482
    • Lopez, J.1
  • 7
    • 3543100577 scopus 로고    scopus 로고
    • Statistical En-route Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu and L. Zhang. Statistical En-route Filtering of Injected False Data in Sensor Networks. In Proceedings of IEEE INFOCOM '04, pp. 2446-2457, 2004.
    • (2004) Proceedings of IEEE INFOCOM '04 , pp. 2446-2457
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 8
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-hop Authentication Scheme for Filtering False Data in Sensor Networks
    • S. Zhu, S. Setia, S. Jajodia and P. Ning. An Interleaved Hop-by-hop Authentication Scheme for Filtering False Data in Sensor Networks. In IEEE Symposium on Security and Privacy, pp. 259-271, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 9
    • 38549177436 scopus 로고    scopus 로고
    • A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks
    • Z. Yu and Y Guan. A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In Proceedings of IEEE INFOCOM '06, pp. 1-12, 2006.
    • (2006) Proceedings of IEEE INFOCOM '06 , pp. 1-12
    • Yu, Z.1    Guan, Y.2
  • 10
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport. Password Authentication with Insecure Communication. In Communications of the ACM, 24(11): 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 34548850872 scopus 로고    scopus 로고
    • A. A. Abbasi and M. Younis. A Survey on Clustering Algorithms for Wireless Sensor Networks. In Computer Communications, 30(14-15): 2826-2841, 2007.
    • A. A. Abbasi and M. Younis. A Survey on Clustering Algorithms for Wireless Sensor Networks. In Computer Communications, 30(14-15): 2826-2841, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.