메뉴 건너뛰기




Volumn , Issue , 2009, Pages 620-624

S-SPIN: A provably secure routing protocol for wireless sensor networks

Author keywords

Provable security; Routing protocol; Wireless sensor netwrok

Indexed keywords

FORGERY ATTACKS; FORMAL SECURITY; PROVABLE SECURITY; PROVABLY SECURE; WIRELESS SENSOR NETWROK;

EID: 70349510591     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSN.2009.8     Document Type: Conference Paper
Times cited : (15)

References (11)
  • 1
    • 34547461706 scopus 로고    scopus 로고
    • Modelling adversaries and security objectives for routing protocols in wireless sensor networks
    • Oct
    • G. Acs, L. Buttyan, I. Vajda, "Modelling adversaries and security objectives for routing protocols in wireless sensor networks," In Proceedings of ACM SASN, Oct. 2006.
    • (2006) Proceedings of ACM SASN
    • Acs, G.1    Buttyan, L.2    Vajda, I.3
  • 2
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • November
    • G. Acs, L. Buttyan, I. Vajda, "Provably secure on-demand source routing in mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, November 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11
    • Acs, G.1    Buttyan, L.2    Vajda, I.3
  • 3
    • 50249162045 scopus 로고    scopus 로고
    • The security proof of a link-state routing protocol for wireless sensor networks
    • MASS
    • G. Acs, L. Buttyan, I. Vajda, "The security proof of a link-state routing protocol for wireless sensor networks," Mobile Adhoc and Sensor Systems, 2007. MASS 2007.
    • (2007) Mobile Adhoc and Sensor Systems, 2007
    • Acs, G.1    Buttyan, L.2    Vajda, I.3
  • 4
    • 27544440245 scopus 로고    scopus 로고
    • INSENS: Intrus ion-tolerant routing in wireless sensor sensor networks,
    • Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, November
    • J. Deng, R. Han, and S. Mishra, "INSENS: intrus ion-tolerant routing in wireless sensor sensor networks," Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, November 2002.
    • (2002)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 5
    • 85035363269 scopus 로고    scopus 로고
    • Adaptive protocols for information dissemination in wireless sensor networks
    • Seattle, WA, Aug
    • W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks," In Proceedings of 5th ACM/IEEE Mobicom, Seattle, WA, Aug. 1999.
    • (1999) Proceedings of 5th ACM/IEEE Mobicom
    • Heinzelman, W.1    Kulik, J.2    Balakrishnan, H.3
  • 6
    • 0036499227 scopus 로고    scopus 로고
    • Negotiation-based protocols for disseminating information in wireless sensor networks
    • J. Kulik, W. R. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor networks," Wireless Networks, vol. 8, 2002.
    • (2002) Wireless Networks , vol.8
    • Kulik, J.1    Heinzelman, W.R.2    Balakrishnan, H.3
  • 10
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • J. N. Al-Karaki, A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication, vol. 11, pp. 6-28, 2004.
    • (2004) IEEE Wireless Communication , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 11
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • Chris Karlof and David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, pp. 293-315, 2004.
    • (2004) Ad Hoc Networks , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.