메뉴 건너뛰기




Volumn , Issue , 2009, Pages

CAT: Building couples to early detect node compromise attack in wireless sensor networks

Author keywords

Couple building; Node compromise attack; Wireless sensor networks

Indexed keywords

COMPROMISED NODES; EXTENSIVE SIMULATIONS; HIGH DETECTION RATE; LATE STAGE; NODE COMPROMISE; NODE COMPROMISE ATTACK; PROTECTION MEASURES; THREE STAGES;

EID: 77951598972     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2009.5425922     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 2
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, 2002.
    • (2002) ACM CCS'02
    • Eschenauer, L.1    Gligor, V.D.2
  • 6
    • 36849045829 scopus 로고    scopus 로고
    • Detection and handling of mac layer misbehavior in wireless networks
    • P. Kyasanur and H. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks," in IEEE DSN, 2003.
    • (2003) IEEE DSN
    • Kyasanur, P.1    Vaidya, H.2
  • 9
    • 36849064844 scopus 로고    scopus 로고
    • Catching moles in sensor networks
    • Jun
    • F. Ye, H. Yang, and Z. Liu, "Catching moles in sensor networks," in IEEE ICDCS'07, Jun, 2007.
    • (2007) IEEE ICDCS'07
    • Ye, F.1    Yang, H.2    Liu, Z.3
  • 10
    • 33748537883 scopus 로고    scopus 로고
    • Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
    • Oct.
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms," in SOSP, Oct. 2005.
    • (2005) SOSP
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    Van Doorn, L.5    Khosla, P.6
  • 11
    • 85002390908 scopus 로고    scopus 로고
    • Reflection as a mechanism for software integrity verfication
    • D. Spinellis, "Reflection as a mechanism for software integrity verfication," in ACM Trans. Inf. Syst. Secu., Vol, 3, No, 1, 2000.
    • (2000) ACM Trans. Inf. Syst. Secu. , vol.3 , Issue.1
    • Spinellis, D.1
  • 12
    • 47249110641 scopus 로고    scopus 로고
    • Distributed software-based attestation for node compromise detection in sensor networks
    • October
    • Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed software-based attestation for node compromise detection in sensor networks," in IEEE SRDS, October 2007.
    • (2007) IEEE SRDS
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 13
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • SPOTS Track April
    • A. Liu and P. Ning, "TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN 2008, SPOTS Track, pp. 245-256, April 2008.
    • (2008) IPSN 2008 , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 15
    • 84941637905 scopus 로고    scopus 로고
    • Signing on a Postcard
    • Financial Cryptography - FC 2000, Springer-Verlag
    • D. Nacache and J. Stern, "Signing on a Postcard," in Financial Cryptography - FC 2000, LNCS 1962, pp. 121-135, Springer-Verlag, 2001.
    • (2001) LNCS , vol.1962 , pp. 121-135
    • Nacache, D.1    Stern, J.2
  • 16
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • X. Du, Y. Xiao, M. Guizani, and H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Networks 2007; 5(1): 24-34.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.