메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 109-113

Selective forwarding attack detection using watermark in WSNs

Author keywords

Security; Selective forwarding attack; Trust value; Watermark; WSN

Indexed keywords

ATTACK DETECTION; CHANNEL ERROR; DATA-FORWARDING; DETECTION ACCURACY; EXTENSIVE SIMULATIONS; MALICIOUS NODES; MESSAGE FORWARDING; MULTI PATH ROUTING; SECURE DATA; TRUST VALUES;

EID: 70449718997     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCCM.2009.5268016     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 7
    • 70449702519 scopus 로고    scopus 로고
    • Detecting selective forwarding attacks in wireless sensor networks
    • B. Yu, B. Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 67, 2006, pp: 1218-1230.
    • (2006) Journal of Parallel and Distributed Computing , vol.67 , pp. 1218-1230
    • Yu, B.1    Xiao, B.2
  • 10
    • 34547266421 scopus 로고    scopus 로고
    • An energy efficient multipath routing protocol for wireless sensor networks
    • Y. Lu, V.Wong, An energy efficient multipath routing protocol for wireless sensor networks. International Journal of Communication Systems.2007,pp:747-766
    • (2007) International Journal of Communication Systems , pp. 747-766
    • Lu, Y.1    Wong, V.2
  • 12
    • 84944414611 scopus 로고    scopus 로고
    • ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks
    • B. Deb, S. Bhatnagar, and B. Nath, "ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks," IEEE Local Computer Networks, 2003, pp: 406-415.
    • (2003) IEEE Local Computer Networks , pp. 406-415
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 14
    • 33746617289 scopus 로고    scopus 로고
    • ID Modulation: Embedding Sensor Data in an RFID Timeseries
    • J. Smith, B. Jiang. ID Modulation: Embedding Sensor Data in an RFID Timeseries. 7th Information hiding, 2005, pp: 234-246.
    • (2005) 7th Information hiding , pp. 234-246
    • Smith, J.1    Jiang, B.2
  • 15
    • 33645671682 scopus 로고    scopus 로고
    • R. Sion, M. Atallah, S. Prabhakar.Rights, Protection for Discrete Numeric Streams, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 18, no. 5, 2006, pp: 1-16.
    • R. Sion, M. Atallah, S. Prabhakar.Rights, "Protection for Discrete Numeric Streams," IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol. 18, no. 5, 2006, pp: 1-16.
  • 17
    • 0242665588 scopus 로고    scopus 로고
    • J. Feng, M. Potkonjak, Real-time watermarking techniques for sensor networks, Security and Watermarking of Multimedia Contents V, Santa clara CA, 5020, 2003, pp: 391-40J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., 2. Oxford: Clarendon, 1892, pp.68-73.
    • J. Feng, M. Potkonjak, "Real-time watermarking techniques for sensor networks," Security and Watermarking of Multimedia Contents V, Santa clara CA, vol. 5020, 2003, pp: 391-40J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.