메뉴 건너뛰기




Volumn 7, Issue 6, 2009, Pages 1051-1063

SeRWA: A secure routing protocol against wormhole attacks in sensor networks

Author keywords

Routing; Security; Sensor networking; Wormhole attack

Indexed keywords

AVAILABLE ENERGIES; AVERAGE ENERGIES; COST ANALYSIS; DATA MESSAGES; DIRECTIONAL ANTENNAS; FALSE POSITIVES; MEMORY USAGES; NEIGHBOR DISCOVERIES; REMOTE LOCATIONS; ROUTE DISCOVERIES; ROUTE REQUESTS; ROUTING; SECURE ROUTING PROTOCOLS; SECURITY; SENSOR NETWORKING; SIMULATION RESULTS; SPECIAL HARDWARES; SYNCHRONIZED CLOCKS; WORMHOLE ATTACK;

EID: 64449088975     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2008.09.005     Document Type: Article
Times cited : (55)

References (25)
  • 1
    • 33751088577 scopus 로고    scopus 로고
    • SecRout: A secure routing protocol for sensor networks
    • Jian Yin, Sanjay Madria, SecRout: a secure routing protocol for sensor networks, in: Proceedings of IEEE AINA, 2006.
    • (2006) Proceedings of IEEE AINA
    • Yin, J.1    Madria, S.2
  • 3
    • 3543060953 scopus 로고    scopus 로고
    • A topology discovery algorithm for sensor networks with applications to network management
    • Budhaditya Deb, Sudeept Bhatnagar, Badri Nath, A topology discovery algorithm for sensor networks with applications to network management, in: IEEE CAS Workshop, 2002.
    • (2002) IEEE CAS Workshop
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 6
    • 33845416881 scopus 로고    scopus 로고
    • A hierarchical secure routing protocol against black hole attacks in sensor networks
    • Jian Yin, Sanjay Madria, A hierarchical secure routing protocol against black hole attacks in sensor networks, in: Proceedings of IEEE SUTC, 2006.
    • (2006) Proceedings of IEEE SUTC
    • Yin, J.1    Madria, S.2
  • 10
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • United States Military Academy, West Point, NY
    • Peng Ning, Kun Sun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, in: Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY, 2003.
    • (2003) Proceedings of the 2003 IEEE Workshop on Information Assurance
    • Ning, P.1    Sun, K.2
  • 12
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Poovendran R., and Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET) 13 1 (2007) 27-59
    • (2007) ACM Journal on Wireless Networks (WINET) , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 20
    • 3042783638 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: ACM CCS 2003, 2003, pp. 42-51.
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: ACM CCS 2003, 2003, pp. 42-51.
  • 22
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: ACM CCS 2003, 2003, pp. 52-61.
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: ACM CCS 2003, 2003, pp. 52-61.
  • 24
    • 64449087051 scopus 로고    scopus 로고
    • .
  • 25
    • 64449084493 scopus 로고    scopus 로고
    • .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.