메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A trust establishment scheme for cluster-based sensor networks

Author keywords

Bayesian formulation; Network security; Reputation; Sensor network; Trust

Indexed keywords

BAYESIAN FORMULATION; CLUSTER HEAD; CLUSTER NODES; CLUSTER-BASED SENSOR NETWORKS; CRYPTOGRAPHIC KEY; HOSTILE ENVIRONMENTS; NODE REVOCATION; SECURE NETWORKS; TRUST AND REPUTATION; TRUST ESTABLISHMENT; TRUST VALUES;

EID: 73149121962     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICOM.2009.5302528     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 2
    • 34548043694 scopus 로고    scopus 로고
    • A.Boukerch, L.Xu, K.EL-Khatib. Trust-based security for wirelss ad hoc and sensor networks.In:Computer Communications 30(2007)pp 2413-2427.
    • A.Boukerch, L.Xu, K.EL-Khatib. Trust-based security for wirelss ad hoc and sensor networks.In:Computer Communications 30(2007)pp 2413-2427.
  • 4
    • 73149104548 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. RFC2704, The KeyNote Trust Management System Version 2. 1999
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. RFC2704 - The KeyNote Trust Management System Version 2. 1999.
  • 5
    • 73149090959 scopus 로고    scopus 로고
    • N. Li, J. Mitchell, W. Winsborough. Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland
    • N. Li, J. Mitchell, W. Winsborough. Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland.
  • 6
    • 14844315770 scopus 로고    scopus 로고
    • S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In:Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pp. 66-77, Oct 2004.
    • S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In:Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pp. 66-77, Oct 2004.
  • 7
    • 44849093503 scopus 로고    scopus 로고
    • S. Ganeriwal, L.Balzano, and M. Srivastava. Reputation-based framework for high integrity sensor networks. In: ACM Transactions on Sensor Network,4,No.3,Article 15,Publication date :May 2008.
    • S. Ganeriwal, L.Balzano, and M. Srivastava. Reputation-based framework for high integrity sensor networks. In: ACM Transactions on Sensor Network,Vol.4,No.3,Article 15,Publication date :May 2008.
  • 8
    • 33745679191 scopus 로고    scopus 로고
    • Behavior-based trust in wireless sensor network
    • Berlin: Springer
    • L.Huang, L. Li, and Q.Tan. Behavior-based trust in wireless sensor network. In: APWeb workshops (pp. 214-223). Berlin: Springer(2006).
    • (2006) APWeb workshops , pp. 214-223
    • Huang, L.1    Li, L.2    Tan, Q.3
  • 9
    • 33845719807 scopus 로고    scopus 로고
    • eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
    • Wei-Tsung Su,Ko-Ming Chang,Yau-Hwang Kuo. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. In: Computer Networks 51(2007) pp.1151-1168
    • (2007) Computer Networks , vol.51 , pp. 1151-1168
    • Su, W.-T.1    Chang, K.-M.2    Kuo, Y.-H.3
  • 10
    • 0033877788 scopus 로고    scopus 로고
    • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), January 2000, pp. 3005-3014.
    • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), January 2000, pp. 3005-3014.
  • 11
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive security design with malicious node detection in cluster-based sensor networks
    • M.Y.Hsieh, Y.M.Huang, H.C.Chao. Adaptive security design with malicious node detection in cluster-based sensor networks. In: Computer Communication 30, 2385-2400(2007).
    • (2007) Computer Communication , vol.30 , pp. 2385-2400
    • Hsieh, M.Y.1    Huang, Y.M.2    Chao, H.C.3
  • 13
    • 73149115947 scopus 로고    scopus 로고
    • KNORR, E. M. and NG, R. T. Finding intensional knowledge of Distance-based Outliers. In:Proceedings of the 25th International Conference on Very Large Data Bases. pp.211-222(1999).
    • KNORR, E. M. and NG, R. T. Finding intensional knowledge of Distance-based Outliers. In:Proceedings of the 25th International Conference on Very Large Data Bases. pp.211-222(1999).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.