메뉴 건너뛰기




Volumn , Issue , 2010, Pages 692-696

Analysis of attack models via unified modeling language in wireless sensor networks: A survey study

Author keywords

Security; Standard attack models; Unified modeling language; Wireless sensor networks

Indexed keywords

ATTACK MODEL; IN-BUILDINGS; RESEARCH PAPERS; SECURITY; SECURITY ATTACKS; SECURITY MODEL; SECURITY PROTOCOLS; SENSITIVE INFORMATIONS; STANDARD MODEL; STANDARD NOTATION; TRANSPORT LAYERS; UML SEQUENCE DIAGRAMS; UNIFIED MODELING; WIRELESS SENSOR;

EID: 77957671484     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCINS.2010.5541868     Document Type: Conference Paper
Times cited : (19)

References (11)
  • 1
    • 33646518088 scopus 로고    scopus 로고
    • Middleware: Middleware challenges and approaches for wireless sensor networks
    • March
    • S. Hadim and N. Mohamed, "Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks, " IEEE Computer Society, vol. 7, no. 3, March 2006.
    • (2006) IEEE Computer Society , vol.7 , Issue.3
    • Hadim, S.1    Mohamed, N.2
  • 2
    • 11144332044 scopus 로고    scopus 로고
    • The design space of wireless sensor networks
    • Dec
    • K. Romer, F. Mattern, and E. Zurich, "The Design Space of Wireless Sensor Networks, " IEEE Wireless Communications, vol. 11, no. 6, pp. 54-61, Dec. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 54-61
    • Romer, K.1    Mattern, F.2    Zurich, E.3
  • 4
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Sept.
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security Protocols for Sensor Networks, " Wireless Networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.5
  • 5
    • 0003161412 scopus 로고    scopus 로고
    • Performance evaluation of a wireless hierarchical data dissemination system
    • Q. Hu, D. L. Lee, and W. Lee, "Performance Evaluation of a Wireless Hierarchical Data Dissemination System, " in proc. ACM MOBICOM, 1999, pp. 163-173.
    • (1999) Proc. ACM MOBICOM , pp. 163-173
    • Hu, Q.1    Lee, D.L.2    Lee, W.3
  • 7
    • 0019009078 scopus 로고
    • OSI reference model- The ISO model of architecture for open systems interconnection
    • Apr
    • H. Zimmermann, "OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection, " IEEE Trans. on Communications, vol. 28, no. 4, pp. 425-432, Apr. 1980.
    • (1980) IEEE Trans. on Communications , vol.28 , Issue.4 , pp. 425-432
    • Zimmermann, H.1
  • 8
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • Apr.
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses, " in IPSN 2004. Third, Apr. 2004, pp. 259-268.
    • (2004) IPSN 2004. Third , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.