메뉴 건너뛰기




Volumn 4, Issue 1, 2011, Pages 11-22

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks

Author keywords

Security enforcement; Trusted computing; Wireless sensor networks (WSNs)

Indexed keywords

CLUSTER COMPUTING; SENSOR NODES; TRUSTED COMPUTING; WIRELESS AD HOC NETWORKS;

EID: 79951805456     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.179     Document Type: Article
Times cited : (9)

References (59)
  • 1
    • 85116610435 scopus 로고    scopus 로고
    • Next century challenges: mobile networking for 'smart dust'. Proceedings of International Conference on Mobile Computing and Network, MOBICOM'99
    • Kahn JM, Katz RH, Pister KSJ. Next century challenges: mobile networking for 'smart dust'. Proceedings of International Conference on Mobile Computing and Network, MOBICOM'99, 1999; 271-278.
    • (1999) , pp. 271-278
    • Kahn, J.M.1    Katz, R.H.2    Pister, K.S.J.3
  • 2
    • 27944449345 scopus 로고    scopus 로고
    • Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, ICDCS'05
    • Kamat P, Zhang Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, ICDCS'05, 2005; 599-608.
    • (2005) , pp. 599-608
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 3
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol cooperation of nodes-fairness in dynamic ad-hoc networks. Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'02
    • Buchegger S, Le Boudec J. Performance analysis of the CONFIDANT protocol cooperation of nodes-fairness in dynamic ad-hoc networks. Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'02, 2002; 226-236.
    • (2002) , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.2
  • 4
    • 0037629724 scopus 로고    scopus 로고
    • Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings of 23rd International Conference on Distributed Computing System
    • Huang Y, Fan W, Lee W. Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings of 23rd International Conference on Distributed Computing System, 2003.
    • (2003)
    • Huang, Y.1    Fan, W.2    Lee, W.3
  • 5
    • 84969513597 scopus 로고    scopus 로고
    • Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of 36th Annual Hawaii International Conference on System Sciences, HICSS'03
    • Kachirski O, Guha R. Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of 36th Annual Hawaii International Conference on System Sciences, HICSS'03, 2003.
    • (2003)
    • Kachirski, O.1    Guha, R.2
  • 6
    • 39149119287 scopus 로고    scopus 로고
    • Collaborative techniques for intrusion detection in mobile ad-hoc networks
    • Marchang N, Datta R. Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Network 2008; 6: 508-523.
    • (2008) Ad Hoc Network , vol.6 , pp. 508-523
    • Marchang, N.1    Datta, R.2
  • 7
    • 85177502393 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc network. Proceedings of Mobicom
    • Zhang Y, Lee W. Intrusion detection in wireless ad-hoc network. Proceedings of Mobicom, 2000.
    • (2000)
    • Zhang, Y.1    Lee, W.2
  • 8
    • 77953852618 scopus 로고    scopus 로고
    • Secure sensor network routing: a clean-slate approach. Proceedings of 2nd Conference on Future Networking Technologies, CoNEXT'06.
    • Bryan P, Luk M, Gaustad E, Perrig A. Secure sensor network routing: a clean-slate approach. Proceedings of 2nd Conference on Future Networking Technologies, CoNEXT'06, 2006.
    • (2006)
    • Bryan, P.1    Luk, M.2    Gaustad, E.3    Perrig, A.4
  • 9
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu Y, Johnson D, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks Journal 2003; 1(1): 175-192.
    • (2003) Ad Hoc Networks Journal , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 10
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks Journal 2005; 11(1): 21-38.
    • (2005) Wireless Networks Journal , vol.11 , Issue.1 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 11
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasurements. Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications.
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasurements. Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
    • (2003)
    • Karlof, C.1    Wagner, D.2
  • 12
    • 33646552392 scopus 로고    scopus 로고
    • Secure routing and intrusion detection in ad hoc networks. Proceedings of 3rd International Conference on Pervasive Computing and Communications, IEEE
    • Patwardhan A, Parker J, Joshi A, Iorga M, Karygiannis T. Secure routing and intrusion detection in ad hoc networks. Proceedings of 3rd International Conference on Pervasive Computing and Communications, IEEE, 2005.
    • (2005)
    • Patwardhan, A.1    Parker, J.2    Joshi, A.3    Iorga, M.4    Karygiannis, T.5
  • 13
    • 0038487088 scopus 로고    scopus 로고
    • Random key pre-distribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy.
    • Chan H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy, 2003; 197-213.
    • (2003) , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 14
    • 38049016463 scopus 로고    scopus 로고
    • Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Proc. Applied Cryptography and Netwrok Security, ACNS'07.
    • Dutta R, Change EC, Mukhopadhyay S. Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Proc. Applied Cryptography and Netwrok Security, ACNS'07 pp. 385-400, 2007.
    • (2007) , pp. 385-400
    • Dutta, R.1    Change, E.C.2    Mukhopadhyay, S.3
  • 15
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'03
    • Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'03, 2003; 42-51.
    • (2003) , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 16
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'02.
    • Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'02.
    • Eschenauer, L.1    Gligor, V.D.2
  • 17
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishement for relatively static sensor networks. Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks
    • Liu D, Ning P. Location-based pairwise key establishement for relatively static sensor networks. Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks, 2003.
    • (2003)
    • Liu, D.1    Ning, P.2
  • 18
    • 84866860550 scopus 로고    scopus 로고
    • Improving key pre-distribution wih deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks
    • Liu D, Ning P. Improving key pre-distribution wih deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks, 2005.
    • (2005)
    • Liu, D.1    Ning, P.2
  • 19
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks. Proceedings of ACM Workshop on Wireless Security
    • Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks. Proceedings of ACM Workshop on Wireless Security, 2005.
    • (2005)
    • Liu, D.1    Ning, P.2    Du, W.3
  • 20
    • 3543050471 scopus 로고    scopus 로고
    • Efficient self-healing group key distribution with revocation capability. Proceedings of ACM Conference on Computer and Communication Security, CCS'03
    • Liu D, Ning P, Sun K. Efficient self-healing group key distribution with revocation capability. Proceedings of ACM Conference on Computer and Communication Security, CCS'03, 2003.
    • (2003)
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 22
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of ACM Conferenc on Computer and Communication Security, CCS'03.
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of ACM Conferenc on Computer and Communication Security, CCS'03, 2003; 62-72.
    • (2003) , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 23
    • 33746086383 scopus 로고    scopus 로고
    • Distributed user access control in sensor networks. Proceedings of Distributed Computing in Sensor Systems, LNCS 4026
    • Wang H, Li Q. Distributed user access control in sensor networks. Proceedings of Distributed Computing in Sensor Systems, LNCS 4026, 2006; 305-320.
    • (2006) , pp. 305-320
    • Wang, H.1    Li, Q.2
  • 24
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • Zhou Y, Zhanga Y, Fang Y. Access control in wireless sensor networks. Ad Hoc Networks 2007; 5(1); 3-13.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhanga, Y.2    Fang, Y.3
  • 25
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks. Proceedings of ACM Conference on Computer and Communications Security, CCS'06
    • Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks. Proceedings of ACM Conference on Computer and Communications Security, CCS'06, 2006.
    • (2006)
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 26
    • 84943753034 scopus 로고    scopus 로고
    • Secure aggregation for wireless networks. Proceedings of 2003 Symposium on Applications and the Internet Workshops, SAINT'03.
    • Hu L, Evans D. Secure aggregation for wireless networks. Proceedings of 2003 Symposium on Applications and the Internet Workshops, SAINT'03, 2003; 384-394.
    • (2003) , pp. 384-394
    • Hu, L.1    Evans, D.2
  • 27
    • 84978428047 scopus 로고    scopus 로고
    • TAG: a tiny aggregation service for ad-hoc sensor networks. Proceedings of 5th Annul Symposium on Operating Systems Design and Implementation, OSDI'02
    • Madden SR, Franklin MJ, Hellerstein JM, Hong W. TAG: a tiny aggregation service for ad-hoc sensor networks. Proceedings of 5th Annul Symposium on Operating Systems Design and Implementation, OSDI'02, 2002.
    • (2002)
    • Madden, S.R.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 28
    • 79951808341 scopus 로고    scopus 로고
    • SIA: secure information aggregation in sensor networks. Proceedings of ACM SenSys
    • Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. Proceedings of ACM SenSys, 2003.
    • (2003)
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 29
    • 48049100992 scopus 로고    scopus 로고
    • Query privacy in wireless sensor networks. Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07
    • Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks. Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, 2007; 203-212.
    • (2007) , pp. 203-212
    • Carbunar, B.1    Yu, Y.2    Shi, L.3    Pearce, M.4    Vasudevan, V.5
  • 30
    • 48349110568 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper. Proceedings of IEEE International Conference on Network Protocols, ICNP'07.
    • Mehta K, Liu D, Wright M. Location privacy in sensor networks against a global eavesdropper. Proceedings of IEEE International Conference on Network Protocols, ICNP'07, 2007; 314-323.
    • (2007) , pp. 314-323
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 31
    • 33845942290 scopus 로고    scopus 로고
    • Entrapping adversaries for source protection in sensor networks. Proceedings of International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM'06.
    • Ouyang Y, Le Z, Chen G, Ford J, Makedon F. Entrapping adversaries for source protection in sensor networks. Proceedings of International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM'06, 2006; 23-34.
    • (2006) , pp. 23-34
    • Ouyang, Y.1    Le, Z.2    Chen, G.3    Ford, J.4    Makedon, F.5
  • 32
    • 14844303406 scopus 로고    scopus 로고
    • Source-location privacy in energy-contained sensor network routing. Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
    • Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-contained sensor network routing. Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04, 2004; 88-93.
    • (2004) , pp. 88-93
    • Ozturk, C.1    Zhang, Y.2    Trappe, W.3
  • 33
    • 34848852681 scopus 로고    scopus 로고
    • Temporal privacy in wireless sensor networks. Proceedings of 27th International Conference on Distributed Computing Systems, ICDCS'07
    • Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks. Proceedings of 27th International Conference on Distributed Computing Systems, ICDCS'07, 2007; 23-30.
    • (2007) , pp. 23-30
    • Kamat, P.1    Xu, W.2    Trappe, W.3    Zhang, Y.4
  • 35
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing procotols for ad hoc networks
    • Das S, Perkins C, Royer E. Performance comparison of two on-demand routing procotols for ad hoc networks. Proceedings of Infocom 2000, 2000; 1: 3-12.
    • (2000) Proceedings of Infocom 2000 , vol.1 , pp. 3-12
    • Das, S.1    Perkins, C.2    Royer, E.3
  • 36
    • 84947615990 scopus 로고    scopus 로고
    • Trusted Computing Group. Available at.
    • Trusted Computing Group. Available at.
  • 37
    • 34548720911 scopus 로고    scopus 로고
    • A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. Proc. 21st International Conference on Advanced Networking and Application, AINA'07.
    • Ibriq J, Mahgoub I. A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. Proc. 21st International Conference on Advanced Networking and Application, AINA'07, 2007.
    • (2007)
    • Ibriq, J.1    Mahgoub, I.2
  • 38
    • 84947612847 scopus 로고    scopus 로고
  • 40
    • 84947611642 scopus 로고    scopus 로고
    • TCG Mobile Phone Work Group. Available at.
    • TCG Mobile Phone Work Group. Available at.
  • 41
    • 51649107345 scopus 로고    scopus 로고
    • On the deployment of mobile trusted modules. Proceedings of Wireless Communications and Networking Conference, WCNC'08
    • Schmidt AU, Kuntze N, Kasper M. On the deployment of mobile trusted modules. Proceedings of Wireless Communications and Networking Conference, WCNC'08, 2008.
    • (2008)
    • Schmidt, A.U.1    Kuntze, N.2    Kasper, M.3
  • 42
    • 79951798370 scopus 로고    scopus 로고
    • TCG. TPM Main,Part 3 Command, TCG Secpfication Ver. 1.2, Revision 62
    • TCG. TPM Main, Part 3 Command, TCG Secpfication Ver. 1.2, Revision 62, 2003;
    • (2003)
  • 43
    • 79951789774 scopus 로고    scopus 로고
    • TCG. TPM Main, Part 2 TPM data Structure, TCG Secpfication Ver. 1.2, Revision 62
    • TCG. TPM Main, Part 2 TPM data Structure, TCG Secpfication Ver. 1.2, Revision 62, 2003;
    • (2003)
  • 44
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information. Proceedings of 1st International Workshop on Information Hiding, LNCS 1174
    • Goldschlag DM, Reed MG, Syverson PF. Hiding routing information. Proceedings of 1st International Workshop on Information Hiding, LNCS 1174, 1996; 137-150.
    • (1996) , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 45
    • 0035009259 scopus 로고    scopus 로고
    • A clustering scheme for hierarchical control in multi-hop wireless networks. Proceedings of IEEE INFOCOM'01.
    • Banerjee S, Khuller S. A clustering scheme for hierarchical control in multi-hop wireless networks. Proceedings of IEEE INFOCOM'01.
    • Banerjee, S.1    Khuller, S.2
  • 46
    • 79951789096 scopus 로고    scopus 로고
    • Distributed clustering algorithm for ad-hoc networks. Proceedings of International Symposium on Parallel Architectures, Algorithms, and Networks
    • Basagni S. Distributed clustering algorithm for ad-hoc networks. Proceedings of International Symposium on Parallel Architectures, Algorithms, and Networks, 1999.
    • (1999)
    • Basagni, S.1
  • 47
    • 84947613205 scopus 로고    scopus 로고
    • Next century challenges: scalable coordination in sensor networks. Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99
    • Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: scalable coordination in sensor networks. Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99.
    • Estrin, D.1    Govindan, R.2    Heidemann, J.3    Kumar, S.4
  • 48
    • 84947618223 scopus 로고    scopus 로고
    • Exploiting heterogeneity in sensor networks. Proceedings of IEEE INFOCOM'05.
    • Yarvis M, et al. Exploiting heterogeneity in sensor networks. Proceedings of IEEE INFOCOM'05.
    • Yarvis, M.1
  • 49
    • 24644507953 scopus 로고    scopus 로고
    • On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of International Conference on Networking, ICN'05
    • Ferreira AC, Vila M, Oliveira B, Habib E, Wong HC, Loureiro AA. On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of International Conference on Networking, ICN'05, 2005; 449-458.
    • (2005) , pp. 449-458
    • Ferreira, A.C.1    Vila, M.2    Oliveira, B.3    Habib, E.4    Wong, H.C.5    Loureiro, A.A.6
  • 50
    • 24644489093 scopus 로고    scopus 로고
    • LHA-SP: secure protocols for hierarchical wireless sensor networks. Proceedings of IFIP/IEEE International Symposium on Integrated Network Management
    • Oliveira LB, Wong HC, Loureiro AA. LHA-SP: secure protocols for hierarchical wireless sensor networks. Proceedings of IFIP/IEEE International Symposium on Integrated Network Management, 2005; 31-44.
    • (2005) , pp. 31-44
    • Oliveira, L.B.1    Wong, H.C.2    Loureiro, A.A.3
  • 51
    • 1542317846 scopus 로고    scopus 로고
    • An authentication framework for hierarchical ad hoc sensor networks. Proceedings of ACM workshop on Wireless security, WiSE'03
    • Bohge M, Trappe W. An authentication framework for hierarchical ad hoc sensor networks. Proceedings of ACM workshop on Wireless security, WiSE'03, 2003; 79-87.
    • (2003) , pp. 79-87
    • Bohge, M.1    Trappe, W.2
  • 52
    • 38149142765 scopus 로고    scopus 로고
    • Detecting node compromise in hybrid wireless sensor networks using attestation techniques. Proceedings of 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007, LNCS 4572
    • Kraub C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. Proceedings of 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007, LNCS 4572, pp. 203-217.
    • Kraub, C.1    Stumpf, F.2    Eckert, C.3
  • 53
    • 33749013010 scopus 로고    scopus 로고
    • Privacy for RFID through trusted computing. Proceedings of ACM workshop on Privacy in the Electronic Society, WPES'05
    • Molnar D, Soppera A, Wagner D. Privacy for RFID through trusted computing. Proceedings of ACM workshop on Privacy in the Electronic Society, WPES'05, 2005; 31-34.
    • (2005) , pp. 31-34
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 54
    • 33746092119 scopus 로고    scopus 로고
    • High-power proxies for enhancing RFID privacy and utility. Proceedings of Privacy Enhancing Technologies (PET) Workshop
    • Juels A, Syverson P, Bailey D. High-power proxies for enhancing RFID privacy and utility. Proceedings of Privacy Enhancing Technologies (PET) Workshop, 2005; 210-226.
    • (2005) , pp. 210-226
    • Juels, A.1    Syverson, P.2    Bailey, D.3
  • 55
    • 28344446682 scopus 로고    scopus 로고
    • Current and future trends in sensor networks: a survey. Proceedings of IFIP International Conference on Wireless and Optical Communications Networks, WOCN'05
    • Aboelaze M, Aloul F. Current and future trends in sensor networks: a survey. Proceedings of IFIP International Conference on Wireless and Optical Communications Networks, WOCN'05, 2005; 551-555.
    • (2005) , pp. 551-555
    • Aboelaze, M.1    Aloul, F.2
  • 56
    • 33749405352 scopus 로고    scopus 로고
    • Trusted computing: providing security for peer-to-peer networks. Proceedings of IEEE International Conference on Peer-to-Peer Computing, P2P'05
    • Balfe S, Lakhani AD, Paterson KG. Trusted computing: providing security for peer-to-peer networks. Proceedings of IEEE International Conference on Peer-to-Peer Computing, P2P'05, 2005.
    • (2005)
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 57
    • 79951789773 scopus 로고    scopus 로고
    • Impact of network density on data aggregation in wireless sensor networks. Proceedings of 1st International Conference on Distributed Computing Systems
    • Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. Proceedings of 1st International Conference on Distributed Computing Systems, 2001.
    • (2001)
    • Intanagonwiwat, C.1    Estrin, D.2    Govindan, R.3    Heidemann, J.4
  • 58
    • 34250346420 scopus 로고    scopus 로고
    • Daonity---grid security with behaviour conformaity from trusted computing. Proceedings of ACM Workshop on Scalable Trusted Computing
    • Mao W, Yan F, Chen C. Daonity---grid security with behaviour conformaity from trusted computing. Proceedings of ACM Workshop on Scalable Trusted Computing, 2006; 43-46.
    • (2006) , pp. 43-46
    • Mao, W.1    Yan, F.2    Chen, C.3
  • 59
    • 84947618850 scopus 로고    scopus 로고
    • Trusted computing technologies for embedded systems and sensor networks. Presentation slides
    • Perrig A. Trusted computing technologies for embedded systems and sensor networks. Presentation slides
    • Perrig, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.