메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 281-294

Reputation-based role assignment for role-based access control in wireless sensor networks

Author keywords

Bootstrap time; Overhead; Reputation; Trusted component; Wireless sensor networks

Indexed keywords

BOOTSTRAP TIME; OVERHEAD; REPUTATION; TRUSTED COMPONENTS; WIRELESS SENSOR;

EID: 78751643529     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.02.013     Document Type: Article
Times cited : (60)

References (45)
  • 1
    • 39149134290 scopus 로고    scopus 로고
    • A role-based access in a hierarchical sensor network architecture to provide multilevel security
    • B. Panja, S.K. Madria, and B. Bhargava A role-based access in a hierarchical sensor network architecture to provide multilevel security Computer Communications 31 4 2008 793 806
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 793-806
    • Panja, B.1    Madria, S.K.2    Bhargava, B.3
  • 7
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
    • Y. Zhou, Y. Zhang, and Y. Fang Access control in wireless sensor networks Ad Hoc Networks 5 1 2007 3 13 (Pubitemid 44573007)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3
  • 14
    • 33846639615 scopus 로고    scopus 로고
    • An agent-based trust and reputation management scheme for wireless sensor networks
    • DOI 10.1109/GLOCOM.2005.1577970, 1577970, GLOBECOM'05: IEEE Global Telecommunications Conference, 2005
    • A. Boukerche, X. Li, An agent-based trust and reputation management scheme for wireless sensor networks, in: Proc. IEEE Global Telecommunications Conference, 28 November-2 December, 2005, pp. 1857-1861. (Pubitemid 46171445)
    • (2005) GLOBECOM - IEEE Global Telecommunications Conference , vol.3 , pp. 1857-1861
    • Boukerche, A.1    Li, X.2
  • 15
    • 38749146509 scopus 로고    scopus 로고
    • Analysis of a reputation system for mobile ad-hoc networks with liars
    • J. Mundinger, and J.-Y. Le Boudec Analysis of a reputation system for mobile ad-hoc networks with liars Performance Evaluation 65 3-4 2008 212 226
    • (2008) Performance Evaluation , vol.65 , Issue.34 , pp. 212-226
    • Mundinger, J.1    Le Boudec, J.-Y.2
  • 24
    • 3142569233 scopus 로고    scopus 로고
    • Highly reliable trust establishment scheme in ad hoc networks
    • K. Ren, T. Li, Z. Wan, F. Bao, R.H. Deng, and K. Kim Highly reliable trust establishment scheme in ad hoc networks Computer Networks 2004 687 699
    • (2004) Computer Networks , pp. 687-699
    • Ren, K.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.H.5    Kim, K.6
  • 26
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • September
    • D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs Technical Report, September, 2000.
    • (2000) NAI Labs Technical Report
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 28
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • A. Boukerch, L. Xu, and K. EL-Khatib Trust-based security for wireless ad hoc and sensor networks Computer Communications 30 2007 2413 2427
    • (2007) Computer Communications , vol.30 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 29
    • 67749116290 scopus 로고    scopus 로고
    • An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks
    • S.K. Dhurandher, S. Misra, M.S. Obaidat, and N. Gupta An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks Security and Communication Networks 2 2 2009 215 224
    • (2009) Security and Communication Networks , vol.2 , Issue.2 , pp. 215-224
    • Dhurandher, S.K.1    Misra, S.2    Obaidat, M.S.3    Gupta, N.4
  • 31
    • 50249085943 scopus 로고    scopus 로고
    • REEP: A data-centric, energy-efficient and reliable routing protocol for wireless sensor networks
    • F. Zabin, S. Misra, I. Woungang, H. Rashvand, N.-W. Ma, and M.A. Ali REEP: a data-centric, energy-efficient and reliable routing protocol for wireless sensor networks IET Communications, UK 2 8 2008 995 1008
    • (2008) IET Communications, UK , vol.2 , Issue.8 , pp. 995-1008
    • Zabin, F.1    Misra, S.2    Woungang, I.3    Rashvand, H.4    Ma, N.-W.5    Ali, M.A.6
  • 33
    • 67349160443 scopus 로고    scopus 로고
    • LACAS: Learning automata-based congestion avoidance scheme for healthcare wireless sensor networks
    • S. Misra, V. Tiwari, and M.S. Obaidat LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks IEEE Journal on Selected Areas in Communications 27 4 2009 466 479
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 466-479
    • Misra, S.1    Tiwari, V.2    Obaidat, M.S.3
  • 39
    • 67749133733 scopus 로고    scopus 로고
    • LAID: A learning automata-based scheme for intrusion detection in wireless sensor networks
    • S. Misra, K.I. Abraham, M.S. Obaidat, and P.V. Krishna LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks Security and Communication Networks 2 2 2009 105 115
    • (2009) Security and Communication Networks , vol.2 , Issue.2 , pp. 105-115
    • Misra, S.1    Abraham, K.I.2    Obaidat, M.S.3    Krishna, P.V.4
  • 40
    • 53849148915 scopus 로고    scopus 로고
    • FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
    • R. Chandrasekar, S. Misra, and M.S. Obaidat FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Computer Communications 31 16 2008 3855 3869
    • (2008) Computer Communications , vol.31 , Issue.16 , pp. 3855-3869
    • Chandrasekar, R.1    Misra, S.2    Obaidat, M.S.3
  • 42
    • 65549145947 scopus 로고    scopus 로고
    • E2-SCAN: An extended credit strategy-based energy-efficient security scheme in wireless ad hoc networks
    • S.K. Dhurandher, S. Misra, S. Ahlawat, N. Gupta, and N. Gupta E2-SCAN: an extended credit strategy-based energy-efficient security scheme in wireless ad hoc networks IET Communications, UK 2009 808 819
    • (2009) IET Communications, UK , pp. 808-819
    • Dhurandher, S.K.1    Misra, S.2    Ahlawat, S.3    Gupta, N.4    Gupta, N.5
  • 43
    • 75949128923 scopus 로고    scopus 로고
    • Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
    • S. Misra, S.K. Dhurandher, A. Rayankula, and D. Agrawal Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks Computers and Electrical Engineering 36 2 2010 367 382
    • (2010) Computers and Electrical Engineering , vol.36 , Issue.2 , pp. 367-382
    • Misra, S.1    Dhurandher, S.K.2    Rayankula, A.3    Agrawal, D.4
  • 44
    • 78751649026 scopus 로고    scopus 로고
    • Network Simulator (NS-2). Available from
    • Network Simulator (NS-2). Available from: < http://www.isi.edu/nsnam/ ns />.
  • 45
    • 78751648977 scopus 로고    scopus 로고
    • Mannasim Package for NS-2. Available from
    • Mannasim Package for NS-2. Available from: < http://www.mannasim.dcc. ufmg.br />.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.