메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1773-1781

Fast detection of replica node attacks in mobile sensor networks using sequential analysis

Author keywords

[No Author keywords available]

Indexed keywords

DETECTION CAPABILITY; MOBILE SENSOR NETWORKS; NODE DETECTION; SENSOR LOCATION; SEQUENTIAL ANALYSIS; SEQUENTIAL PROBABILITY RATIO TEST; SIMULATION EXPERIMENTS; STATIC SENSOR NETWORKS;

EID: 70349684548     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062097     Document Type: Conference Paper
Times cited : (78)

References (14)
  • 1
    • 25644450392 scopus 로고    scopus 로고
    • Perfect Simulation and Stationary of a Class of Moblity Models
    • pages
    • J.-Y. L. Boudec and M. Vojnović. Perfect Simulation and Stationary of a Class of Moblity Models. In IEEE INFOCOM, pages:2743-2754, 2005.
    • (2005) IEEE INFOCOM , pp. 2743-2754
    • Boudec, J.-Y.L.1    Vojnović, M.2
  • 3
    • 37849004592 scopus 로고    scopus 로고
    • A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
    • pages
    • M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In ACM Mobihoc, pages:80-89, 2007.
    • (2007) ACM Mobihoc , pp. 80-89
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3    Mei, A.4
  • 5
    • 11244273945 scopus 로고    scopus 로고
    • Localization for Mobile Sensor Networks
    • pages
    • L. Hu and D. Evans. Localization for Mobile Sensor Networks. In ACM Mobicom, pages:45-57, 2004.
    • (2004) ACM Mobicom , pp. 45-57
    • Hu, L.1    Evans, D.2
  • 7
    • 51249109865 scopus 로고    scopus 로고
    • TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
    • Technical Report TR-2007-36, North Carolina State University, Department of Computer Science, November
    • A. Liu and P. Ning. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In Technical Report TR-2007-36, North Carolina State University, Department of Computer Science, November 2007.
    • (2007)
    • Liu, A.1    Ning, P.2
  • 9
    • 27544460282 scopus 로고    scopus 로고
    • Distributed Detection of Node Replication Attacks in Sensor Networks
    • pages:, May
    • B. Parno, A. Perrig, and V.D. Gligor. Distributed Detection of Node Replication Attacks in Sensor Networks. In IEEE Symposium on Security and Privacy, pages:49-63, May 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.D.3
  • 10
    • 33749987832 scopus 로고    scopus 로고
    • Attack-resilient Time Synchronization for Wireless Sensor Networks
    • January
    • H. Song, S. Zhu, and G. Cao. Attack-resilient Time Synchronization for Wireless Sensor Networks. Ad Hoc Networks, 5(1):112-125, January 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 112-125
    • Song, H.1    Zhu, S.2    Cao, G.3
  • 11
    • 34547282118 scopus 로고    scopus 로고
    • TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks
    • pages
    • K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou. TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks. In ACM CCS, pages:264-271, 2006.
    • (2006) ACM CCS , pp. 264-271
    • Sun, K.1    Ning, P.2    Wang, C.3    Liu, A.4    Zhou, Y.5
  • 12
    • 51849154670 scopus 로고    scopus 로고
    • Real-time Detection of Clone Attacks in Wireless Sensor Networks
    • pages
    • K. Xing, F. Liu, X. Cheng, and H.C. Du. Real-time Detection of Clone Attacks in Wireless Sensor Networks. In IEEE ICDCS, pages:3-10, 2008.
    • (2008) IEEE ICDCS , pp. 3-10
    • Xing, K.1    Liu, F.2    Cheng, X.3    Du, H.C.4
  • 14
    • 51849154205 scopus 로고    scopus 로고
    • Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control
    • pages
    • H. Wang, B. Sheng, C.C. Tan, and Q. Li. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. In IEEE ICDCS, pages:11-18, 2008.
    • (2008) IEEE ICDCS , pp. 11-18
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    Li, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.