메뉴 건너뛰기




Volumn , Issue , 2008, Pages 836-843

Malicious node detection in wireless sensor networks using weighted trust evaluation

Author keywords

Hierarchical topology; Malicious node detection; Network security; Wireless sensor networks

Indexed keywords

BATTERY LIFETIME; COMMUNICATION OVERHEADS; COMPROMISED NODES; COMPUTING CAPABILITY; DETECTION SCHEME; FLAT TOPOLOGY; HIERARCHICAL NETWORK; HIERARCHICAL TOPOLOGY; HOSTILE ENVIRONMENTS; MALICIOUS NODE DETECTION; MALICIOUS NODES; MEMORY SPACE; TRUST EVALUATION;

EID: 70249102120     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1400549.1400686     Document Type: Conference Paper
Times cited : (131)

References (22)
  • 1
    • 34548355193 scopus 로고    scopus 로고
    • Location-Aware Security Services for Wireless Sensor Networks using Network Coding
    • May
    • E. Ayday, F. Delgosha, and F. Fekri, "Location-Aware Security Services for Wireless Sensor Networks using Network Coding," Infocom, May 2007.
    • (2007) Infocom
    • Ayday, E.1    Delgosha, F.2    Fekri, F.3
  • 2
    • 51249086542 scopus 로고    scopus 로고
    • Robust Distributed Spectrum Sensing in Cognitive Radio Networks,
    • Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech, July
    • R. Chen, J. M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech., July 2006.
    • (2006)
    • Chen, R.1    Park, J.M.2    Bian, K.3
  • 5
    • 85074375621 scopus 로고    scopus 로고
    • Next Century Challenges: Scalable Coordination in Sensor Networks
    • August
    • D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next Century Challenges: Scalable Coordination in Sensor Networks," MOBICOM, August 1999
    • (1999) MOBICOM
    • Estrin, D.1    Govindan, R.2    Heidemann, J.3    Kumar, S.4
  • 6
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," IEEE INFOCOM, 2003
    • (2003) IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 8
    • 32144459886 scopus 로고    scopus 로고
    • TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
    • November
    • C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," A CM Sensys, November 2004.
    • (2004) A CM Sensys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 9
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • Elsevier
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Journal of Ad Hoc Networks, Elsevier, 2003
    • (2003) Journal of Ad Hoc Networks
    • Karlof, C.1    Wagner, D.2
  • 14
    • 70249116660 scopus 로고    scopus 로고
    • From 'small Sensor Networks' to 'Sensor Networks'
    • May
    • S. D. Servetto, "From 'small Sensor Networks' to 'Sensor Networks'", EmNets 2006, May 2006.
    • (2006) EmNets 2006
    • Servetto, S.D.1
  • 16
    • 4143104126 scopus 로고    scopus 로고
    • Sensor Networks: An Overview
    • April
    • M. Tubaishat and S. Madria., "Sensor Networks: an Overview," IEEE Potentials, 22, 2, 20-23, April 2003.
    • (2003) IEEE Potentials , vol.22 , Issue.2 , pp. 20-23
    • Tubaishat, M.1    Madria, S.2
  • 19
    • 8344239614 scopus 로고    scopus 로고
    • Energy-Latency Tradeoffs for Data Gathering in Wireless Sensor Networks
    • Y. Yu, B. Krishnamachari, and V.K. Prasanna, "Energy-Latency Tradeoffs for Data Gathering in Wireless Sensor Networks," IEEEInfocom'04
    • IEEEInfocom'04
    • Yu, Y.1    Krishnamachari, B.2    Prasanna, V.K.3
  • 22
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
    • October
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," CCS'03, October 2003.
    • (2003) CCS'03
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.