메뉴 건너뛰기




Volumn 12, Issue 2, 2011, Pages 107-117

Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks

Author keywords

Beta reputation; Detection; Reputation; Trust; Wireless sensor networks

Indexed keywords

BETA REPUTATION; CLUSTER FORMATIONS; COMPROMISED NODES; CORRECTIVE ACTIONS; EFFECTIVE MECHANISMS; LOCATION INFORMATION; LOCATION VERIFICATION; LOCATION-AWARE; NEGATIVE INFORMATION; NEIGHBORING NODES; RECEIVED SIGNAL STRENGTH; REPUTATION; SECURITY BREACHES; TRUST; TRUST FRAMEWORKS; WIRELESS SENSOR;

EID: 79960423670     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (40)

References (38)
  • 2
    • 0034291601 scopus 로고    scopus 로고
    • GPS-less low cost outdoor localization for very small devices
    • Oct
    • N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less low cost outdoor localization for very small devices," IEEE Personal Communication Magazine, vol. 7, pp. 28-34, Oct. 2000.
    • (2000) IEEE Personal Communication Magazine , vol.7 , pp. 28-34
    • Bulusu, N.1    Heidemann, J.2    Estrin, D.3
  • 3
    • 0347130058 scopus 로고    scopus 로고
    • Secure low-power operation of wire-less sensor networks
    • E. Callaway, "Secure low-power operation of wire-less sensor networks," Sensors Online, vol. 21, no. 1, 2004.
    • (2004) Sensors Online , vol.21 , Issue.1
    • Callaway, E.1
  • 4
    • 8344222870 scopus 로고    scopus 로고
    • TPS: a time-based positioning scheme for outdoor wireless sensor networks
    • Miami, FL, Mar
    • X. Cheng, A. Thaeler, G. Xue, and D. Chen, "TPS: a time-based positioning scheme for outdoor wireless sensor networks," IEEE INFOCOM '05, Miami, FL, Mar. 2005.
    • (2005) IEEE INFOCOM '05
    • Cheng, X.1    Thaeler, A.2    Xue, G.3    Chen, D.4
  • 5
    • 46749158359 scopus 로고    scopus 로고
    • An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
    • A. K. Das, "An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks," Inter-national Journal of Network Security, vol. 6, no. 2, pp. 134-144, 2008.
    • (2008) Inter-national Journal of Network Security , vol.6 , Issue.2 , pp. 134-144
    • Das, A.K.1
  • 6
    • 80054061721 scopus 로고    scopus 로고
    • ECPKS: An improved location-aware key management scheme in static sensor networks
    • A. K. Das, "ECPKS: An improved location-aware key management scheme in static sensor networks," International Journal of Network Security, vol. 7, no. 3, pp. 358-369, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 358-369
    • Das, A.K.1
  • 8
    • 33847341872 scopus 로고    scopus 로고
    • Convex optimization methods for sensor node estimation
    • Anchorage, Alaska, Apr
    • L. Doherty, K. S. Pister, and L. E. Ghaoui, "Convex optimization methods for sensor node estimation," IEEE INFOCOM '01, Anchorage, Alaska, Apr. 2001.
    • (2001) IEEE INFOCOM '01
    • Doherty, L.1    Pister, K.S.2    Ghaoui, L.E.3
  • 9
    • 69949134676 scopus 로고    scopus 로고
    • Authenticated reliable and semi-reliable communication in wireless sensor networks
    • F. Dressler, "Authenticated reliable and semi-reliable communication in wireless sensor networks," Inter-national Journal of Network Security, vol. 7, no. 1, pp. 61-68, 2008.
    • (2008) Inter-national Journal of Network Security , vol.7 , Issue.1 , pp. 61-68
    • Dressler, F.1
  • 11
    • 20544474194 scopus 로고    scopus 로고
    • Collabora-tive trust-based secure routing against colluding ma-licious nodes in multi-hop ad hoc networks
    • Tampa, USA
    • T. Ghosh, N. Pissinou, and K. Makki, "Collabora-tive trust-based secure routing against colluding ma-licious nodes in multi-hop ad hoc networks," Annual Conference on Local Computer Networks (LCN), pp. 224-231, Tampa, USA, 2004.
    • (2004) Annual Conference on Local Computer Networks (LCN) , pp. 224-231
    • Ghosh, T.1    Pissinou, N.2    Makki, K.3
  • 12
    • 29844453185 scopus 로고    scopus 로고
    • Towards designing a trusted routing solution in Mobile Ad Hoc networks, ACM Journal
    • Special issue on Non-Cooperative Wireless Networking and Computing
    • T. Ghosh, N. Pissinou, and K. Makki, "Towards designing a trusted routing solution in Mobile Ad Hoc networks," ACM Journal, Mobile Networks and Applications (MONET), Special issue on Non-Cooperative Wireless Networking and Computing, 2005.
    • (2005) Mobile Networks and Applications (MONET)
    • Ghosh, T.1    Pissinou, N.2    Makki, K.3
  • 15
    • 11244273945 scopus 로고    scopus 로고
    • Localization for mobile sensor networks
    • Philadelphia, PA, Sep
    • L. Hu, and D. Evans, "Localization for mobile sensor networks," ACM MOBICOM '04, Philadelphia, PA, Sep. 2004.
    • (2004) ACM MOBICOM '04
    • Hu, L.1    Evans, D.2
  • 19
    • 79959728389 scopus 로고    scopus 로고
    • Energy-effcient hybrid key management protocol for wireless sensor networks
    • T. Landstra, S. Jagannathan, and M. Zawodniok, "Energy-effcient hybrid key management protocol for wireless sensor networks," International Journal of Network Security, vol. 9, no. 2, pp. 121-134, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.2 , pp. 121-134
    • Landstra, T.1    Jagannathan, S.2    Zawodniok, M.3
  • 21
    • 66549130452 scopus 로고    scopus 로고
    • Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks
    • A. Mohaisen, D. Nyang, and K. Lee, "Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks," International Journal of Network Security, vol. 8, no. 3, pp. 282-292, 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.3 , pp. 282-292
    • Mohaisen, A.1    Nyang, D.2    Lee, K.3
  • 25
    • 0041973656 scopus 로고    scopus 로고
    • Ad Hoc Positioning Sys-tem (APS) using AoA
    • San Francisco, CA, Apr
    • D. Niculescu, and B. Nath, "Ad Hoc Positioning Sys-tem (APS) using AoA,"IEEE INFOCOM '03, San Francisco, CA, Apr. 2003.
    • (2003) IEEE INFOCOM '03
    • Niculescu, D.1    Nath, B.2
  • 32
    • 0034775930 scopus 로고    scopus 로고
    • Dynamic fine-grained localization in Ad-hoc networks of sen-sors
    • Rome, Italy, July
    • A. Savvides, C. Han, and M. Srivastava, "Dynamic fine-grained localization in Ad-hoc networks of sen-sors," ACM MOBICOM, Rome, Italy, July 2001.
    • (2001) ACM MOBICOM
    • Savvides, A.1    Han, C.2    Srivastava, M.3
  • 33
    • 46749125818 scopus 로고    scopus 로고
    • Establishing au-thenticated channels and secure identifiers in Ad-hoc networks
    • B. Sieka and A. D. Kshemkalyani, "Establishing au-thenticated channels and secure identifiers in Ad-hoc networks," International Journal of Network Secu-rity, vol. 5, pp. 55-61, 2007.
    • (2007) International Journal of Network Security , vol.5 , pp. 55-61
    • Sieka, B.1    Kshemkalyani, A.D.2
  • 35
    • 77649308267 scopus 로고    scopus 로고
    • Node-failure tolerance of topology in wireless sensor networks
    • L. M. Wang, J. F. Ma, and Y. B. Guo, "Node-failure tolerance of topology in wireless sensor networks," International Journal of Network Security, vol. 7, no. 2, pp. 261-264, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 261-264
    • Wang, L.M.1    Ma, J.F.2    Guo, Y.B.3
  • 36
    • 0036793924 scopus 로고    scopus 로고
    • Denial Of service in sensor networks
    • A. D. Wood, and J. A. Stankovic, "Denial Of service in sensor networks,"IEEE Computer, vol. 35, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.