메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1-6

Trust-based secure aggregation in wireless sensor networks

Author keywords

Resilient sensor networks; Secure aggregation; Security; Trust evaluation

Indexed keywords

NETWORK SECURITY;

EID: 77956432336     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, Security and Privacy in Sensor Networks, IEEE Computer 2003.
    • (2003) IEEE Computer
    • Chan, H.1    Perrig, A.2
  • 10
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized criticality and stochastic learning based intrusion detectum system for wireless sensor networks
    • MILCOM '03.2003 IEEE
    • S.S. Doumit, D.P. Agrawal, Self-Organized Criticality and Stochastic learning based intrusion detectum system for wireless sensor networks, Military Communications Conference, 2003. MILCOM '03.2003 IEEE, pp.609-614.
    • (2003) Military Communications Conference , pp. 609-614
    • Doumit, S.S.1    Agrawal, D.P.2
  • 11
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkely, California May 11-14
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, Berkely, California, May 11-14 2003, pp. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 15
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • Oakland, California May
    • S. Zhu, S. Setia, S. Jajodia, P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004.
    • (2004) Proceedings of IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 16
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE INFOCOM 2004.
    • (2004) Proceedings of IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Zhang, L.3
  • 19
    • 33144467507 scopus 로고    scopus 로고
    • Robust statistical methods for securing wireless localization in sensor networks
    • Los Angeles April
    • Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN 2005, Los Angeles, April 2005.
    • (2005) IPSN 2005
    • Li, Z.1    Trappe, W.2    Zhang, Y.3    Nath, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.