메뉴 건너뛰기




Volumn 7, Issue 8, 2009, Pages 1476-1488

Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks

Author keywords

Replica node detection; Security in wireless sensor networks

Indexed keywords

ANALYSIS AND SIMULATION; DEPLOYMENT KNOWLEDGE; DEPLOYMENT SCENARIOS; DETECTION CAPABILITY; DISTRIBUTED DETECTION; REPLICA NODE DETECTION; SECURITY IN WIRELESS SENSOR NETWORKS; SEVERAL PROTOCOLS; STORAGE OVERHEAD;

EID: 67650432140     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.04.008     Document Type: Article
Times cited : (58)

References (22)
  • 2
    • 0038487088 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
  • 4
    • 37849004592 scopus 로고    scopus 로고
    • A Randomized, Efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • September
    • M. Conti, R.D. Pietro, L.V. Mancini, A. Mei. A Randomized, Efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, in: ACM Mobihoc, September 2007, pp. 80-89.
    • (2007) ACM Mobihoc , pp. 80-89
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3    Mei, A.4
  • 5
    • 39049083533 scopus 로고    scopus 로고
    • F. Delgosha, F. Fekri, Threshold key-establishment in distributed sensor networks using a multivariate scheme, in: IEEE INFOCOM, April 2006, pp. 1-12.
    • F. Delgosha, F. Fekri, Threshold key-establishment in distributed sensor networks using a multivariate scheme, in: IEEE INFOCOM, April 2006, pp. 1-12.
  • 6
    • 8344262333 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE INFOCOM, March 2004, pp. 586-597.
    • W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE INFOCOM, March 2004, pp. 586-597.
  • 7
    • 67650385906 scopus 로고    scopus 로고
    • W. Du, L. Fang, P. Ning, LAD: localization anomaly detection for wireless sensor networks. in: IEEE IPDPS, April 2005.
    • W. Du, L. Fang, P. Ning, LAD: localization anomaly detection for wireless sensor networks. in: IEEE IPDPS, April 2005.
  • 8
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • May
    • W. Du, R. Wang, P. Ning, An efficient scheme for authenticating public keys in sensor networks, in: ACM MobiHoc, May 2005, pp. 58-67.
    • (2005) ACM MobiHoc , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3
  • 9
    • 33144472210 scopus 로고    scopus 로고
    • Secure time synchronization service for sensor networks
    • September
    • S. Ganeriwal, S. Čapkun, C.C. Han, M.B. Srivastava, Secure time synchronization service for sensor networks, in: ACM WiSe, September 2005, pp. 97-106.
    • (2005) ACM WiSe , pp. 97-106
    • Ganeriwal, S.1    Čapkun, S.2    Han, C.C.3    Srivastava, M.B.4
  • 11
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: The need for secure systems
    • Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder, January
    • C. Hartung, J. Balasalle, R. Han, Node compromise in sensor networks: the need for secure systems, in: Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder, January 2005.
    • (2005)
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 12
    • 33144467507 scopus 로고    scopus 로고
    • Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 91-98.
    • Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 91-98.
  • 13
    • 51249087814 scopus 로고    scopus 로고
    • A. Liu, P. Ning. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), SPOTS Track, April 2008, pp. 245-256.
    • A. Liu, P. Ning. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), SPOTS Track, April 2008, pp. 245-256.
  • 14
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pariwise keys in distributed sensor networks, in: ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 52-61.
    • D. Liu, P. Ning, Establishing pariwise keys in distributed sensor networks, in: ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 52-61.
  • 15
    • 33144467903 scopus 로고    scopus 로고
    • D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 99-106.
    • D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, pp. 99-106.
  • 16
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks
    • WiSe, September
    • D. Liu, P. Ning, W. Du, Group-based key pre-distribution in wireless sensor networks, in: ACM Workshop on Wireless Security (WiSe), September 2005, pp. 11-20.
    • (2005) ACM Workshop on Wireless Security , pp. 11-20
    • Liu, D.1    Ning, P.2    Du, W.3
  • 17
    • 27544460282 scopus 로고    scopus 로고
    • B. Parno, A. Perrig, V.D. Gligor, Distributed detection of node replication attacks in sensor networks, in: IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
    • B. Parno, A. Perrig, V.D. Gligor, Distributed detection of node replication attacks in sensor networks, in: IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
  • 18
    • 33749987832 scopus 로고    scopus 로고
    • Attack-resilient time synchronization for wireless sensor networks
    • Song H., Zhu S., and Cao G. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5 1 (2007) 112-125
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 112-125
    • Song, H.1    Zhu, S.2    Cao, G.3
  • 19
    • 34547282118 scopus 로고    scopus 로고
    • K. Sun, P. Ning, C. Wang, A. Liu, Y. Zhou, TinySeRSync: secure and resilient time synchronization in wireless sensor networks, in: ACM CCS, October 2006, pp. 264-277.
    • K. Sun, P. Ning, C. Wang, A. Liu, Y. Zhou, TinySeRSync: secure and resilient time synchronization in wireless sensor networks, in: ACM CCS, October 2006, pp. 264-277.
  • 20
    • 51849154205 scopus 로고    scopus 로고
    • H. Wang, B. Sheng, C.C. Tan, Q. Li, Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control, in: IEEE ICDCS, 2008, pp. 11-18.
    • H. Wang, B. Sheng, C.C. Tan, Q. Li, Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control, in: IEEE ICDCS, 2008, pp. 11-18.
  • 21
    • 37849028668 scopus 로고    scopus 로고
    • A random perturbation-based scheme for pairwise key establishment in sensor networks
    • September
    • W. Zhang, M. Tran, S. Zhu, G. Cao, A random perturbation-based scheme for pairwise key establishment in sensor networks, in: ACM Mobihoc, September 2007, pp. 90-99.
    • (2007) ACM Mobihoc , pp. 90-99
    • Zhang, W.1    Tran, M.2    Zhu, S.3    Cao, G.4
  • 22
    • 48649109631 scopus 로고    scopus 로고
    • B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in: ACSAC, December 2007, pp. 257-267.
    • B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, S. Roy, Efficient distributed detection of node replication attacks in sensor networks, in: ACSAC, December 2007, pp. 257-267.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.