메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Resilient cluster leader election for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA AGGREGATION; EVALUATION RESULTS; HOSTILE ENVIRONMENTS; LEADER ELECTION; LOAD-BALANCING; MALICIOUS ATTACK; NETWORK OPERATIONS; SENSOR CLUSTER; SUBSTANTIAL ENERGY; SYMMETRIC KEYS;

EID: 70449578908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2009.5168966     Document Type: Conference Paper
Times cited : (31)

References (20)
  • 2
    • 38349181460 scopus 로고    scopus 로고
    • Secure distributed cluster formation in wireless sensor networks
    • DOI 10.1109/ACSAC.2006.46, 4041161, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • K. Sun, P. Peng, P. Ning, and C. Wang, "Secure distributed cluster formation in wireless sensor networks," in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), 2006, pp. 131-140. (Pubitemid 351232909)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 131-140
    • Sun, K.1    Peng, P.2    Ning, P.3    Wang, C.4
  • 3
    • 33845869923 scopus 로고    scopus 로고
    • Analysis and evaluation of secos, a protocol for energy efficient and secure communication in sensor networks
    • I. Khalil, S. Bagchi, and N. Shroff, "Analysis and evaluation of secos, a protocol for energy efficient and secure communication in sensor networks," Ad Hoc Networks., vol.5, no.3, pp. 360-391, 2007.
    • (2007) Ad Hoc Networks. , vol.5 , Issue.3 , pp. 360-391
    • Khalil, I.1    Bagchi, S.2    Shroff, N.3
  • 4
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive security design with malicious node detection in cluster-based sensor networks
    • M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, "Adaptive security design with malicious node detection in cluster-based sensor networks," Comput. Commun., vol.30, no.11-12, pp. 2385-2400, 2007.
    • (2007) Comput. Commun. , vol.30 , Issue.11-12 , pp. 2385-2400
    • Hsieh, M.-Y.1    Huang, Y.-M.2    Chao, H.-C.3
  • 6
    • 70449571153 scopus 로고    scopus 로고
    • Nonmanipulable aggregator node election for wireless sensor networks
    • Jan.
    • M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, "Nonmanipulable aggregator node election for wireless sensor networks," in ICST WiOpt, Jan. 2007.
    • (2007) ICST WiOpt
    • Sirivianos, M.1    Westhoff, D.2    Armknecht, F.3    Girao, J.4
  • 8
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol.35, no.10, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 14
    • 0000886528 scopus 로고
    • Algorithm 235: Random permutation
    • R. Durstenfeld, "Algorithm 235: Random permutation," Commun. ACM, vol.7, no.7, p. 420, 1964.
    • (1964) Commun. ACM , vol.7 , Issue.7 , pp. 420
    • Durstenfeld, R.1
  • 16
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wirel. Netw., vol.13, no.1, pp. 27-59, 2007.
    • (2007) Wirel. Netw. , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 18
    • 84858246079 scopus 로고    scopus 로고
    • Crossbow Technology Inc.
    • Crossbow Technology Inc., "Wireless sensor networks," http://www.xbow.com/Products/productdetails.aspx?sid=156.
    • Wireless Sensor Networks


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.