메뉴 건너뛰기




Volumn , Issue , 2009, Pages 193-200

A practical secure neighbor verification protocol for Wireless Sensor networks

Author keywords

Design; Experimentation; Security

Indexed keywords

EXPERIMENTATION; FUNDAMENTAL BUILDING BLOCKS; NEIGHBOR DISCOVERY; PROOF OF CONCEPT; SECURITY; SPECIALIZED HARDWARE; VERIFICATION PROTOCOL; WIRELESS COMMUNICATIONS; WIRELESS NETWORKING; WORMHOLE ATTACK;

EID: 70349157241     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514274.1514302     Document Type: Conference Paper
Times cited : (42)

References (21)
  • 1
    • 70349101351 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless sensor networks
    • Technical Report, Computer Science and Engineering School, UNSW, The Network Research Laboratory
    • H. Alzaid, S. Abanmi, S. Kanhere, and C. T. Chou. Detecting wormhole attacks in wireless sensor networks. Technical Report, Computer Science and Engineering School - UNSW, The Network Research Laboratory, 2006.
    • (2006)
    • Alzaid, H.1    Abanmi, S.2    Kanhere, S.3    Chou, C.T.4
  • 2
    • 33745736659 scopus 로고    scopus 로고
    • Statistical wormhole detection in sensor networks
    • R. Molva, G. Tsudik, and D. Westhoff, editors, ESAS, of, Springer
    • L. Buttyán, L. Dóra, and I. Vajda. Statistical wormhole detection in sensor networks. In R. Molva, G. Tsudik, and D. Westhoff, editors, ESAS, volume 3813 of Lecture Notes in Computer Science, pages 128-141. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3813 , pp. 128-141
    • Buttyán, L.1    Dóra, L.2    Vajda, I.3
  • 3
    • 46149096001 scopus 로고    scopus 로고
    • Truelink: A practical countermeasure to the wormhole attack in wireless networks
    • J. Eriksson, S. V. Krishnamurthya, and M. Faloutsos. Truelink: A practical countermeasure to the wormhole attack in wireless networks. In ICNP'06, 2006.
    • (2006) ICNP'06
    • Eriksson, J.1    Krishnamurthya, S.V.2    Faloutsos, M.3
  • 5
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In IEEE INFOCOM, 2003.
    • (2003) IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 9
    • 42649100347 scopus 로고    scopus 로고
    • Detecting and avoiding wormhole attacks in wireless ad hoc networks
    • April
    • F. Nait-Abdesselam, B. Bensaou, and T. Taleb. Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 46(4), April 2008.
    • (2008) Communications Magazine, IEEE , vol.46 , Issue.4
    • Nait-Abdesselam, F.1    Bensaou, B.2    Taleb, T.3
  • 10
    • 33144467802 scopus 로고    scopus 로고
    • P. Papadimitratos and Z. Haas. Secure Data Communication in Mobile Ad Hoc Networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, 24(2):343-356, 2006.
    • P. Papadimitratos and Z. Haas. Secure Data Communication in Mobile Ad Hoc Networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, 24(2):343-356, 2006.
  • 11
    • 33845916834 scopus 로고    scopus 로고
    • A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks
    • R. Poovendran and L. Lazos. A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks. ACM/Kluwer Wireless Networks, 13(1), 2005.
    • (2005) ACM/Kluwer Wireless Networks , vol.13 , Issue.1
    • Poovendran, R.1    Lazos, L.2
  • 12
    • 58049188696 scopus 로고    scopus 로고
    • Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
    • M. Poturalski, P. Papadimitratos, and J.-P. Hubaux. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility. In ACM ASIACCS 2008.
    • ACM ASIACCS 2008
    • Poturalski, M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 15
    • 70349156883 scopus 로고    scopus 로고
    • A Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks
    • Technical report, EPFL LCA-REPORT-2008-020
    • R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux. A Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks. Technical report, EPFL LCA-REPORT-2008-020, 2008.
    • (2008)
    • Shokri, R.1    Poturalski, M.2    Ravot, G.3    Papadimitratos, P.4    Hubaux, J.-P.5
  • 16
    • 70349085860 scopus 로고    scopus 로고
    • A. Srinivasan and J. Wu. A Survey on Secure Localization in Wireless Sensor Networks. Encyclopedia of Wireless and Mobile Communications, 2008.
    • A. Srinivasan and J. Wu. A Survey on Secure Localization in Wireless Sensor Networks. Encyclopedia of Wireless and Mobile Communications, 2008.
  • 18
    • 11244309139 scopus 로고    scopus 로고
    • Visualization of wormholes in sensor networks
    • W. Wang and B. Bhargava. Visualization of wormholes in sensor networks. In ACM WiSe, 2004.
    • (2004) ACM WiSe
    • Wang, W.1    Bhargava, B.2
  • 19
    • 33744927512 scopus 로고    scopus 로고
    • Sensor field localization: A deployment and empirical analysis
    • Technical Report UCB//CSD-04-1349, Univ. of California, Berkeley
    • K. Whitehouse, F. Jiang, A. Woo, C. Karlof, and D. Culler. Sensor field localization: a deployment and empirical analysis. Technical Report UCB//CSD-04-1349, Univ. of California, Berkeley, 2004.
    • (2004)
    • Whitehouse, K.1    Jiang, F.2    Woo, A.3    Karlof, C.4    Culler, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.