메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1836-1843

DSF - A distributed security framework for heterogeneous wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COLLABORATIVE FRAMEWORK; COMPLETE SOLUTIONS; DEFENSE MECHANISM; DISTRIBUTED SECURITY; HETEROGENEOUS WIRELESS SENSOR NETWORKS; RESOURCE CONSTRAINT; SELECTIVE FORWARDING; SENSITIVE INFORMATIONS; SIMULATION RESULT; WORMHOLE ATTACK;

EID: 79951660520     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5679559     Document Type: Conference Paper
Times cited : (9)

References (28)
  • 2
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Washington, DC, USA: IEEE Computer Society, May
    • B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, May 2005, pp. 49-63.
    • (2005) Proceedings of the 2005 IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 9
    • 35448965082 scopus 로고    scopus 로고
    • Two tier secure routing protocol for heterogeneous sensor networks
    • September
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two tier secure routing protocol for heterogeneous sensor networks," IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3395-3401, September 2007.
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3395-3401
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 23
    • 45849089959 scopus 로고    scopus 로고
    • Scalable and efficient key management for heterogeneous sensor networks
    • F. Kausar, S. Hussain, L. T. Yang, and A. Masood, "Scalable and efficient key management for heterogeneous sensor networks," The Journal of Supercomputing, vol. 45, no. 1, pp. 44-65, 2008.
    • (2008) The Journal of Supercomputing , vol.45 , Issue.1 , pp. 44-65
    • Kausar, F.1    Hussain, S.2    Yang, L.T.3    Masood, A.4
  • 27
    • 38049173337 scopus 로고    scopus 로고
    • Wodem: Wormhole attack defense mechanism in wireless sensor networks
    • J.-H. L. Ji-Hoon Yun, Il-Hwan Kim and S.-W. Seo, "Wodem: Wormhole attack defense mechanism in wireless sensor networks," Ubiquitous Convergence Technology, vol. 4412/2007, pp. 200-209, 2007.
    • (2007) Ubiquitous Convergence Technology , vol.4412 , Issue.2007 , pp. 200-209
    • Ji-Hoon Yun, J.-H.L.1    Kim, I.-H.2    Seo, S.-W.3
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.