메뉴 건너뛰기




Volumn 9, Issue 7, 2010, Pages 913-926

Localized multicast: Efficient and distributed replica detection in large-scale sensor networks

Author keywords

Distributed protocol; Efficiency; Node replication attack detection; Wireless sensor networks security

Indexed keywords

ATTACK DETECTION; COMPROMISED NODES; DISTRIBUTED APPROACHES; DISTRIBUTED PROTOCOLS; EFFICIENT DETECTION; LARGE SCALE SENSOR NETWORK; MEMORY COST; MULTICASTS; PHYSICAL PROTECTION; SENSOR APPLICATIONS; SMALL NUMBER OF SENSORS;

EID: 77952973912     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.40     Document Type: Article
Times cited : (83)

References (18)
  • 2
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, 2007.
    • (2007) Proc. ACM MobiHoc , pp. 80-89
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 7
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM MobiCom, pp. 243-254, 2000.
    • (2000) Proc. ACM MobiCom , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 9
    • 3042704872 scopus 로고    scopus 로고
    • Efficient flooding with passive clustering (pc) in Ad Hoc networks
    • T.J. Kwon and M. Gerla, "Efficient Flooding with Passive Clustering (PC) in Ad Hoc Networks," ACM SIGCOMM Computer Comm. Rev., vol.32, no.1, pp. 44-56, 2002.
    • (2002) ACM SIGCOMM Computer Comm. Rev. , vol.32 , Issue.1 , pp. 44-56
    • Kwon, T.J.1    Gerla, M.2
  • 10
    • 0035865898 scopus 로고    scopus 로고
    • Flooding in wireless Ad Hoc networks
    • H. Lim and C. Kim, "Flooding in Wireless Ad Hoc Networks," Computer Comm., vol.24, nos. 3/4, pp. 353-363, 2000.
    • (2000) Computer Comm. , vol.24 , Issue.3-4 , pp. 353-363
    • Lim, H.1    Kim, C.2
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile Ad Hoc networks
    • S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, 2000.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 16
    • 13244292297 scopus 로고    scopus 로고
    • Location-aided flooding: An energy-efficient data dissemination protocol for wireless sensor networks
    • Jan.
    • H. Sabbineni and K. Chakrabarty, "Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks," IEEE Trans. Computers, vol.54, no.1, pp. 36-46, Jan. 2005.
    • (2005) IEEE Trans. Computers , vol.54 , Issue.1 , pp. 36-46
    • Sabbineni, H.1    Chakrabarty, K.2
  • 18
    • 48649109631 scopus 로고    scopus 로고
    • Efficient distributed detection of node replication attacks in sensor networks
    • Computer Security Applications Conf. (ACSAC '07)
    • B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. 23rd Ann. Computer Security Applications Conf. (ACSAC '07), 2007.
    • (2007) Proc. 23rd Ann.
    • Zhu, B.1    Addada, V.G.K.2    Setia, S.3    Jajodia, S.4    Roy, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.