메뉴 건너뛰기




Volumn , Issue , 2009, Pages 999-1005

Adaptive security provision for increased energy efficiency in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SECURITY; BIT PADDING; DATA ENCRYPTION; DISTANCE VECTOR; ENCRYPTION AND DECRYPTION; LINK COST; MULTI-PATH; NS-2 SIMULATIONS; ON-DEMAND; OPTIMIZATION APPROACH; OPTIMIZATION STRATEGY; RESOURCE EFFICIENCIES; SECURE ROUTING; SECURITY MEASURE; TRUST LEVEL;

EID: 77951265748     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2009.5355022     Document Type: Conference Paper
Times cited : (13)

References (28)
  • 2
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • August
    • C-Y. Chong and S.P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247-1256, August 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.-Y.1    Kumar, S.P.2
  • 4
    • 13944283393 scopus 로고    scopus 로고
    • A Survey on Routing Protocols for Wireless Sensor Networks
    • May
    • K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Elsevier Journal of Ad Hoc Networks, Vol. 3, No. 3, pp. 325-349, May 2005.
    • (2005) Elsevier Journal of Ad Hoc Networks , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 8
    • 77949974817 scopus 로고    scopus 로고
    • PLUS: Parameterised Localised Trust Management-based Security Framework for Sensor Networks
    • Z. Yao, D. Kim, Y. Doh, "PLUS: Parameterised Localised Trust Management-based Security Framework for Sensor Networks," Int'l Journal of Sensor Networks, Vol. 3, No. 4, pp. 224-236, 2008.
    • (2008) Int'l Journal of Sensor Networks , vol.3 , Issue.4 , pp. 224-236
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 9
    • 70350070568 scopus 로고    scopus 로고
    • Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
    • to appear a pre-publication version is available at
    • R. Shaikh, et al., "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, to appear (a pre-publication version is available at http://doi.ieeecomputersociety.org/10.1109/TPDS.2008.258).
    • IEEE Transactions on Parallel and Distributed Systems
    • Shaikh, R.1
  • 10
    • 33745820773 scopus 로고    scopus 로고
    • Trust Management for Resilient Wireless Sensor Networks
    • Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC'05), Korea, December
    • J. Hur, Y. Lee, S.-M. Hong and H. Yoon, "Trust Management for Resilient Wireless Sensor Networks," in the Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC'05), Lecture Notes in Computer Science, Vol. 3935 pp. 56-68, Korea, December 2005.
    • (2005) Lecture Notes in Computer Science , vol.3935 , pp. 56-68
    • Hur, J.1    Lee, Y.2    Hong, S.-M.3    Yoon, H.4
  • 11
    • 18144417809 scopus 로고    scopus 로고
    • Energy and QoS aware Routing for Wireless Sensor Networks
    • July
    • K. Akkaya and M. Younis, "Energy and QoS aware Routing for Wireless Sensor Networks," Cluster Computing, Vol. 8, No. 2-3, pp. 179-188, July 2005.
    • (2005) Cluster Computing , vol.8 , Issue.2-3 , pp. 179-188
    • Akkaya, K.1    Younis, M.2
  • 16
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A Lightweight Security Protocol for Wireless Sensor Networks
    • August
    • T. Park and K. G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks", ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, pp. 634-660, August 2004.
    • (2004) ACM Transactions on Embedded Computing Systems , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 18
    • 3042647758 scopus 로고    scopus 로고
    • A Survey of Secure Wireless Ad Hoc Routing
    • May- June
    • H. Yih-Chun, A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security & Privacy, Vol. 2, No. 3, pp. 28 - 39, May- June 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 28-39
    • Yih-Chun, H.1    Perrig, A.2
  • 19
    • 21144452079 scopus 로고    scopus 로고
    • Collaborative Trust-based Secure Routing in Multihop Ad hoc Networks
    • Proceedings of IFIP Networking Conference (NETWORKING'04), Athènes, Greece, May
    • N. Pissinou, T. Ghosh, and K. Makki, "Collaborative Trust-based Secure Routing in Multihop Ad hoc Networks," in the Proceedings of IFIP Networking Conference (NETWORKING'04), Lecture Notes in Computer Science, Vol. 3042, Athènes, Greece, May 2004.
    • (2004) Lecture Notes in Computer Science , vol.3042
    • Pissinou, N.1    Ghosh, T.2    Makki, K.3
  • 24
    • 0032108018 scopus 로고    scopus 로고
    • Finding the k Shortest Paths
    • February
    • D. Eppstein, "Finding the k Shortest Paths," SIAM Journal on Computing, Vol. 28, No. 2, pp. 652-673 , February 1999.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.2 , pp. 652-673
    • Eppstein, D.1
  • 27
    • 0029195850 scopus 로고
    • Propagation Measurements and Models for Wireless Communications Channels
    • January
    • J. Andresen, T. Rappaport, S. Yoshida, "Propagation Measurements and Models for Wireless Communications Channels," IEEE Communications Magazine, Vol. 33, No. 1, pp. 42-49, January1995.
    • (1995) IEEE Communications Magazine , vol.33 , Issue.1 , pp. 42-49
    • Andresen, J.1    Rappaport, T.2    Yoshida, S.3
  • 28
    • 85088357047 scopus 로고
    • The RC5 Encryption Algorithm
    • Proceedings of the Leuven Workshop on Fast Software Encryption, Leuven, Belgium, December
    • R. L. Rivest, "The RC5 Encryption Algorithm," in the Proceedings of the Leuven Workshop on Fast Software Encryption, Lecture Notes in Computer Science 1008, Leuven, Belgium, December 1994.
    • (1994) Lecture Notes in Computer Science , vol.1008
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.