메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Tolerant majority-colluding attacks for secure localization in wireless sensor networks

Author keywords

Localization; Majority colluding attacks; Secure; Wireless sensor networks

Indexed keywords

ALGORITHM COMPLEXITY; COLLUDING ATTACK; COMMUNICATION COST; DISTRIBUTED ALGORITHM; HOSTILE ENVIRONMENTS; LOCALIZATION ALGORITHM; MALICIOUS ATTACK; MINIMUM MEAN SQUARE ERRORS; REPLAY ATTACK; RESOURCE-CONSTRAINED; SECURE LOCALIZATION; SECURE WIRELESS SENSOR NETWORKS; SYBIL ATTACK; WORMHOLE ATTACK;

EID: 73149096489     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICOM.2009.5301363     Document Type: Conference Paper
Times cited : (8)

References (11)
  • 1
    • 4243134153 scopus 로고    scopus 로고
    • System Architecture for Wireless Sensor Networks
    • Ph.D. thesis, University of California, Berkeley, May
    • Hill Jason Lester, "System Architecture for Wireless Sensor Networks", Ph.D. thesis, University of California, Berkeley, May 2004.
    • (2004)
    • Jason Lester, H.1
  • 3
    • 84866469313 scopus 로고    scopus 로고
    • Serloc:Robust localization for wireless sensor networks
    • 1:73-100, August
    • L. Lazos and R. Poovendran, "Serloc:Robust localization for wireless sensor networks", ACM Transactions on Sensor Networks, pp. 1(1):73-100, August 2005.
    • (2005) ACM Transactions on Sensor Networks , pp. 1
    • Lazos, L.1    Poovendran, R.2
  • 6
    • 46849100355 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • Technical Report TR-2004-29, North Carolina State University, Department of Computer Science, 2004, Revised August
    • D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in wireless sensor networks", Technical Report TR-2004-29, North Carolina State University, Department of Computer Science, 2004, Revised August 2005.
    • (2005)
    • Liu, D.1    Ning, P.2    Du, W.3
  • 9
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • IEEE Computer Society Press, Washington
    • Liu DG, Ning P, Du WL. "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks", Proc. of the 25th Int'l Conf. on Distributed Computing Systems (ICDCS), IEEE Computer Society Press, Washington, 2005, pp. 609-691.
    • (2005) Proc. of the 25th Int'l Conf. on Distributed Computing Systems (ICDCS) , pp. 609-691
    • Liu, D.G.1    Ning, P.2    Du, W.L.3
  • 10
    • 46849086689 scopus 로고    scopus 로고
    • Key management for sensor networks
    • D. Liu, P. Ning, and R. Li. TinyKeyMan: Key management for sensor networks. http://discovery.csc.ncsu.edu/software/TinyKeyMan/.
    • TinyKeyMan
    • Liu, D.1    Ning, P.2    Li, R.3
  • 11
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks, IEEE Symposium on Research in Security and Privacy, pp. 197-213, 2003
    • H. Chan, A. Perrig, and D. "Song. Random key predistribution schemes for sensor networks", IEEE Symposium on Research in Security and Privacy, pp. 197-213, 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.