메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1985-1990

Securing time-synchronization protocols in sensor networks: Attack detection and self-healing

Author keywords

[No Author keywords available]

Indexed keywords

ABNORMALITY DETECTION; ATTACK DETECTION; MALICIOUS ENTITY; MALICIOUS NODES; SECURITY PROBLEMS; SELF-HEALING; SYNCHRONIZATION PROTOCOLS; THREE PHASIS; TIME SYNCHRONIZATION; VARIOUS ATTACKS;

EID: 67249114800     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2008.ECP.383     Document Type: Conference Paper
Times cited : (9)

References (14)
  • 1
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks." Comm. ACM, vol. 47, no. 6, pp. 53-57, 2004.
    • (2004) Comm. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 2
    • 33144489185 scopus 로고    scopus 로고
    • Secure and resilient clock synchronization in wireless sensor networks
    • Feb
    • K. Sun, P. Ning, and C. Wang, "Secure and resilient clock synchronization in wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2
    • Sun, K.1    Ning, P.2    Wang, C.3
  • 3
    • 33749987832 scopus 로고    scopus 로고
    • Attack-resilient time synchronization for wireless sensor networks
    • H. Song, S. Zhu, and G. Cao, "Attack-resilient time synchronization for wireless sensor networks." Elsevier Journal of Ad Hoc Networks, vol.5, no. 1, 2007.
    • (2007) Elsevier Journal of Ad Hoc Networks , vol.5 , Issue.1
    • Song, H.1    Zhu, S.2    Cao, G.3
  • 7
  • 9
    • 13944269967 scopus 로고    scopus 로고
    • Clock synchronization for wireless sensor networks: A survey
    • May
    • B. Sundararaman, U. Buy, and A. Kshemkalyani, "Clock synchronization for wireless sensor networks: A survey," Ad-hoc Networks, vol. 3, no. 3, pp. 281-323, May 2005.
    • (2005) Ad-hoc Networks , vol.3 , Issue.3 , pp. 281-323
    • Sundararaman, B.1    Buy, U.2    Kshemkalyani, A.3
  • 10
    • 0041973497 scopus 로고    scopus 로고
    • Packetleashes: A defense against wormhole attacks in wireless networks
    • Apr
    • Y.-C. Hu, A. Perrig, and D.B.Johnson, "Packetleashes: A defense against wormhole attacks in wireless networks." in Proc. IEEE Inforcom,Apr. 2003.
    • (2003) Proc. IEEE Inforcom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 67249131856 scopus 로고    scopus 로고
    • P. Levis, N. Lee, M. Welsh, and D. Culler, Tossim: Accurate and scalable simulation of entire tinyos applications. in Proc. the First ACM Conference on Embedded Networked Sensor Systems (SenSys03),Los Angeles, CA.
    • P. Levis, N. Lee, M. Welsh, and D. Culler, "Tossim: Accurate and scalable simulation of entire tinyos applications." in Proc. the First ACM Conference on Embedded Networked Sensor Systems (SenSys03),Los Angeles, CA.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.