메뉴 건너뛰기




Volumn 17, Issue 5, 2010, Pages 44-49

Application of wireless sensor networks in critical infrastructure protection: Challenges and design options

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION AREA; CRITICAL INFRASTRUCTURE; CRITICAL INFRASTRUCTURE PROTECTION; DESIGN OPTION; INTENTIONAL ATTACKS; LOW-COST TECHNOLOGY; MIDDLEWARE LAYER; POTENTIAL SOLUTIONS; PROTOCOL STACK; TERRORIST ATTACKS; WHOLE SYSTEMS;

EID: 77958099314     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2010.5601957     Document Type: Article
Times cited : (63)

References (9)
  • 1
    • 74049112175 scopus 로고    scopus 로고
    • On the difficulty of software- based attestation of embedded devices
    • C. Castelluccia et al., "On the Difficulty of Software- Based Attestation of Embedded Devices," Proc. ACM CCS, 2009.
    • (2009) Proc. ACM CCS
    • Castelluccia, C.1
  • 2
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • E. Buchanan et al., "When Good Instructions go Bad: Generalizing Return-Oriented Programming to RISC," Proc. ACM CCS, 2008.
    • (2008) Proc. ACM CCS
    • Buchanan, E.1
  • 4
    • 0022093904 scopus 로고
    • Optimal attack and reinforcement of a network
    • W. H. Cunningham, "Optimal Attack and Reinforcement of a Network," J. ACM, vol.32, no.3, 1985, pp. 549-561
    • (1985) J. ACM , vol.32 , Issue.3 , pp. 549-561
    • Cunningham, W.H.1
  • 5
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • J. Deng, R. Han, and S. Mishra, "Decorrelating Wireless Sensor Network Traffic to Inhibit Traffic Analysis Attacks," Pervasive Mobile Comp., vol.2, no.2, 2006, pp. 159-186
    • (2006) Pervasive Mobile Comp. , vol.2 , Issue.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 6
    • 77958099391 scopus 로고    scopus 로고
    • Private cluster head election in wireless sensor networks
    • L. Buttyán and T. Holczer, "Private Cluster Head Election in Wireless Sensor Networks," Proc. IEEE WSNS, 2009.
    • (2009) Proc. IEEE WSNS
    • Buttyán, L.1    Holczer, T.2
  • 7
    • 34548355137 scopus 로고    scopus 로고
    • Data persistence in large- scale sensor networks with decentralized fountain codes
    • Y. Lin, B. Liang, and B. Li, "Data Persistence in Large- Scale Sensor Networks with Decentralized Fountain Codes," IEEE INFOCOM, 2007, pp. 1658-1666
    • (2007) IEEE INFOCOM , pp. 1658-1666
    • Lin, Y.1    Liang, B.2    Li, B.3
  • 8
    • 33745180496 scopus 로고    scopus 로고
    • Decentralized erasure codes for distributed networked storage
    • DOI 10.1109/TIT.2006.874535
    • A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized Erasure Codes for Distributed Networked Storage," IEEE/ACM Trans. Net., vol. 14, no. SI, 2006, pp. 2809-16. (Pubitemid 43898929)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2809-2816
    • Dimakis, A.G.1    Prabhakaran, V.2    Ramchandran, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.