메뉴 건너뛰기




Volumn , Issue , 2009, Pages 566-573

Reporter node determination of replicated node detection in wireless sensor networks

Author keywords

Algorithm; Node compromising attack; Node replication attack; Security; Wireless sensor networks

Indexed keywords

ANALYSIS AND SIMULATION; COMPROMISED NODES; DETECTION RATES; DOS ATTACKS; LARGE SCALE SENSOR NETWORK; MALICIOUS CODES; NODE COMPROMISING ATTACK; NODE DETECTION; NODE REPLICATION ATTACK; SECRET KEY; SECURITY; SYBIL ATTACK;

EID: 70349103764     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1516241.1516340     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 1
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryptionwithout pairings
    • D. Boneh, C. Gentry, and M. Hamburg. Space-efficient identity based encryptionwithout pairings. In IEEE FOCS, pp. 647-657, 2007.
    • (2007) IEEE FOCS , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 2
    • 29844437116 scopus 로고    scopus 로고
    • Localization and routing in sensor networks by local angle information
    • J. Bruck, J. Gao, and A. A. Jiang. Localization and routing in sensor networks by local angle information. In ACM MOBIHOC, pp. 181-192, 2005.
    • (2005) ACM MOBIHOC , pp. 181-192
    • Bruck, J.1    Gao, J.2    Jiang, A.A.3
  • 3
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In INFOCOM, pp. 1917-1928, 2005.
    • (2005) INFOCOM , pp. 1917-1928
    • Capkun, S.1    Hubaux, J.-P.2
  • 5
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • M. Conti, R. Di Pietro, L. Mancini, and A. Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In ACM MobiHoc, pp. 80-89, 2007.
    • (2007) ACM MobiHoc , pp. 80-89
    • Conti, M.1    Di Pietro, R.2    Mancini, L.3    Mei, A.4
  • 6
    • 33750311730 scopus 로고    scopus 로고
    • Secure cooperative channel establishment inwireless sensor networks
    • M. Conti, R. D. Pietro, and L. V. Mancini. Secure cooperative channel establishment inwireless sensor networks. In IEEE PERCOMW, pp. 327-331, 2006.
    • (2006) IEEE PERCOMW , pp. 327-331
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3
  • 7
    • 84944414611 scopus 로고    scopus 로고
    • Reinform: Reliable information forwarding using multiple paths in sensor networks
    • B. Deb, S. Bhatnagar, and B. Nath. Reinform: Reliable information forwarding using multiple paths in sensor networks. In 28th IEEE LCN, p. 406, 2003.
    • (2003) 28th IEEE LCN , pp. 406
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 8
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 9
    • 35548948372 scopus 로고    scopus 로고
    • Secure probabilistic location verification in randomly deployed wireless sensor networks
    • E. Ekici, J. McNair, and D. Al-Abri. Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw., 6(2):195-209, 2008.
    • (2008) Ad Hoc Netw , vol.6 , Issue.2 , pp. 195-209
    • Ekici, E.1    McNair, J.2    Al-Abri, D.3
  • 10
    • 0013043106 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor networks
    • D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. SIGMOBILE Mob. Comput. Commun. Rev., 5(4):11-25, 2001.
    • (2001) SIGMOBILE Mob. Comput. Commun. Rev , vol.5 , Issue.4 , pp. 11-25
    • Ganesan, D.1    Govindan, R.2    Shenker, S.3    Estrin, D.4
  • 11
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM, pp. 243-254, 2000.
    • (2000) ACM MOBICOM , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MOBICOM, pp. 255-265, 2000.
    • (2000) ACM MOBICOM , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 13
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In ACM IPSN, pp. 259-268, 2004.
    • (2004) ACM IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 14
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating dos attacks against broadcast authentication in wireless sensor networks
    • 1-35
    • P. Ning, A. Liu, and W. Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1):1-35, 2008.
    • (2008) ACM Trans. Sen. Netw , vol.4 , Issue.1
    • Ning, P.1    Liu, A.2    Du, W.3
  • 15
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE S&P, pp. 49-63, 2005.
    • (2005) IEEE S&P , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84 on Advances in cryptology, pp. 47-53, 1985.
    • (1985) CRYPTO 84 on Advances in cryptology , pp. 47-53
    • Shamir, A.1
  • 17
    • 34547442398 scopus 로고    scopus 로고
    • Stardust: A flexible architecture for passive localization in wireless sensor networks
    • R. Stoleru, P. Vicaire, T. He, and J. A. Stankovic. Stardust: A flexible architecture for passive localization in wireless sensor networks. In ACM SENSYS, pp. 57-70, 2006.
    • (2006) ACM SENSYS , pp. 57-70
    • Stoleru, R.1    Vicaire, P.2    He, T.3    Stankovic, J.A.4
  • 18
    • 33746077211 scopus 로고    scopus 로고
    • On supporting distributed collaboration in sensor networks
    • G. Wang, W. Zhang, G. Cao, and T. Porta. On supporting distributed collaboration in sensor networks. In IEEE MILCOM, 2003.
    • (2003) IEEE MILCOM
    • Wang, G.1    Zhang, W.2    Cao, G.3    Porta, T.4
  • 19
    • 55549085625 scopus 로고    scopus 로고
    • Location verification algorithms forwireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Y. Wei, Z. Yu, and Y. Guan. Location verification algorithms forwireless sensor networks. In IEEE ICDCS, p. 70, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) IEEE ICDCS , pp. 70
    • Wei, Y.1    Yu, Z.2    Guan, Y.3
  • 20
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 21
    • 33144479525 scopus 로고    scopus 로고
    • H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261-273, 2006.
    • H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261-273, 2006.
  • 22
    • 48649109631 scopus 로고    scopus 로고
    • Efficient distributed detection of node replication attacks in sensor networks
    • B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy. Efficient distributed detection of node replication attacks in sensor networks. In IEEE ACSAC, pp. 257-267, 2007.
    • (2007) IEEE ACSAC , pp. 257-267
    • Zhu, B.1    Addada, V.G.K.2    Setia, S.3    Jajodia, S.4    Roy, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.