메뉴 건너뛰기




Volumn E92-B, Issue 1, 2009, Pages 131-142

SCODE: A secure coordination-based data dissemination tomobile sinks in sensor networks

Author keywords

Routing; Secure routing; Security; Sensor networks; Sink mobility

Indexed keywords

COMPUTER CRIME; ENERGY EFFICIENCY; ENERGY UTILIZATION; INTERNET PROTOCOLS; MILITARY APPLICATIONS; NETWORK PROTOCOLS; NETWORK ROUTING; POWER MANAGEMENT (TELECOMMUNICATION); SECURITY SYSTEMS; SENSOR NETWORKS; SENSOR NODES;

EID: 77952655038     PISSN: 09168516     EISSN: 17451345     Source Type: Journal    
DOI: 10.1587/transcom.E92.B.131     Document Type: Article
Times cited : (8)

References (25)
  • 1
    • 33646589837 scopus 로고    scopus 로고
    • An application-specific protocol architecture for wireless microsensor networks
    • DOI 10.1109/TWC.2002.804190
    • W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Trans. Wireless Commun., vol.1, no.4, pp.660- 670, Oct. 2002. (Pubitemid 44934253)
    • (2002) IEEE Transactions on Wireless Communications , vol.1 , Issue.4 , pp. 660-670
    • Heinzelman, W.B.1    Chandrakasan, A.P.2    Balakrishnan, H.3
  • 3
    • 34548042955 scopus 로고    scopus 로고
    • SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
    • N. Nasser and Y. Chen, "SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks," Comput. Commun.,vol.30, pp.2401-2412, 2007.
    • (2007) Comput. Commun. , vol.30 , pp. 2401-2412
    • Nasser, N.1    Chen, Y.2
  • 4
    • 33751183522 scopus 로고    scopus 로고
    • A secure alternate path routing in sensor networks
    • S.-B. Lee and Y.-H. Choi, "A secure alternate path routing in sensor networks," Comput. Commun., vol.30, pp.153-165, 2006.
    • (2006) Comput. Commun. , vol.30 , pp. 153-165
    • Lee, S.-B.1    Choi, Y.-H.2
  • 8
    • 2442529460 scopus 로고    scopus 로고
    • GRAdient broadcast: A robust data delivery protocol for large scale sensor networks
    • May
    • F. Ye, G. Zhong, S. Lu, and L. Zhang, "GRAdient broadcast: A robust data delivery protocol for large scale sensor networks,"Wirel. Netw., vol.11, no.1, pp.285-298, May 2005.
    • (2005) Wirel. Netw. , vol.11 , Issue.1 , pp. 285-298
    • Ye, F.1    Zhong, G.2    Lu, S.3    Zhang, L.4
  • 9
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A.D. Wood and J.A. Stankovic, "Denial of service in sensor networks," Computer, vol.35, no.10, pp.54-62, Oct. 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 10
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • March
    • J.R. Douceur, "The Sybil attack," Proc. IPTPS, pp.251-260, March 2002.
    • (2002) Proc. IPTPS , pp. 251-260
    • Douceur, J.R.1
  • 11
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • Department of Computer Science, Rice University, June.
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "Wormhole detection in wireless ad hoc networks," Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
    • (2002) Technical Report TR01-384
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • Oct.
    • L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," Proc. ACM Workshop Wireless Security, pp.21-30, Oct. 2004.
    • (2004) Proc. ACM Workshop Wireless Security , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 14
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Nov.
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms forlarge-scale distributed sensor networks," ACMTrans. Sensor Networks, vol.2, no.4, pp.500-528, Nov. 2006.
    • (2006) ACMTrans. Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 17
    • 17444376044 scopus 로고    scopus 로고
    • TTDD: A two-tier data dissemination model for large-scale wireless sensor networks
    • Jan.
    • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "TTDD: A two-tier data dissemination model for large-scale wireless sensor networks," Wirel. Netw., vol.11, no.1-2, pp.161-175, Jan. 2005.
    • (2005) Wirel. Netw. , vol.11 , Issue.1-2 , pp. 161-175
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang, L.5
  • 21
    • 85027174297 scopus 로고    scopus 로고
    • NS-2
    • NS-2, http://www.isi.edu/nsnam/ns/
  • 22
    • 4143054544 scopus 로고    scopus 로고
    • Runtime security composition for sensor networks
    • Oct.
    • Q. Xue and A. Ganz, "Runtime security composition for sensor networks," Proc. IEEE Veh. Technol. Conf., pp.105-111, Oct. 2003.
    • (2003) Proc. IEEE Veh. Technol. Conf. , pp. 105-111
    • Xue, Q.1    Ganz, A.2
  • 23
    • 35448965082 scopus 로고    scopus 로고
    • Two tier secure routing protocol for heterogeneous sensor networks
    • Sept.
    • D. Xiaojiang, G. Mohsen, X. Yang, and C. Hsiao-Hwa, "Two tier secure routing protocol for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol.6, no.9, pp.3395-3401, Sept. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.9 , pp. 3395-3401
    • Xiaojiang, D.1    Mohsen, G.2    Yang, X.3    Hsiao-Hwa, C.4
  • 24
    • 33845544481 scopus 로고    scopus 로고
    • Authenticated query flooding in sensor networks
    • DOI 10.1007/0-387-33406-8-4, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
    • Z. Benenson, F.C. Freiling, E. Hammerschmidt, S. Lucks, and L. Pimenidis, "Authenticated query flooding in sensor networks," Proc. 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, vol.201, pp.38-49, 2006. (Pubitemid 44920641)
    • (2006) IFIP International Federation for Information Processing , vol.201 , pp. 38-49
    • Benenson, Z.1    Freiling, F.C.2    Hammerschmidt, E.3    Lucks, S.4    Pimenidis, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.