메뉴 건너뛰기




Volumn 9, Issue 3-4, 2011, Pages 192-208

Per node deployment based detection of controlled link establishment attack in distributed sensor networks

Author keywords

Attacks; Collusion attacks; Controlled link; Controlled nodes; Countermeasures; Detection; Node compromise; Node replication; Secure link establishment; Security; Sensor networks

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY;

EID: 79960610662     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2011.040240     Document Type: Article
Times cited : (8)

References (28)
  • 1
    • 17744386714 scopus 로고    scopus 로고
    • Key infection: Smart trust for smart dust
    • Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
    • Anderson, R., Chan, H. and Perrig, A. (2004) 'Key infection: Smart trust for smart dust', Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP'04), 5-8 October, Berlin, Germany, pp.206-215. (Pubitemid 40574711)
    • (2004) Proceedings - International Conference on Network Protocols, ICNP , pp. 206-215
    • Anderson, R.1    Chan, H.2    Perrig, A.3
  • 7
    • 58149127893 scopus 로고    scopus 로고
    • Crossbow Technology Inc. Available online at, (accessed on 4 January 2010)
    • Crossbow Technology Inc. (2007) Wireless sensor networks product reference guide. Available online at: Http://www. xbow.com/ (accessed on 4 January 2010).
    • (2007) Wireless Sensor Networks Product Reference Guide
  • 10
    • 0034206002 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area web cache sharing protocol
    • Fan, L., Cao, P., Almeida, J. and Broder, A.Z. (2000) 'Summary cache: A scalable wide-area web cache sharing protocol', IEEE/ ACM Transactions on Networking, Vol. 8, No. 3, pp.281-293.
    • (2000) IEEE/ ACM Transactions on Networking , vol.8 , Issue.3 , pp. 281-293
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.Z.4
  • 12
    • 67650432140 scopus 로고    scopus 로고
    • Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
    • Ho, J-W., Liu, D., Wright, M. and Das, S.K. (2009) 'Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks', Ad Hoc Networks, Vol. 7, No. 8, pp.1476-1488.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1476-1488
    • Ho, J.-W.1    Liu, D.2    Wright, M.3    Das, S.K.4
  • 14
    • 34547282118 scopus 로고    scopus 로고
    • TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
    • 30 October-3 November, Alexandria, VA, USA
    • Kun, S., Peng, N. and Cliff, W. (2006) 'TinySeRSync: Secure and resilient time synchronization in wireless sensor networks', Proceedings of the 13th ACM Conference on Computer and Communications Security, 30 October-3 November, Alexandria, VA, USA, pp.264-277.
    • (2006) Proceedings of the 13th ACM Conference on Computer and Communications Security , pp. 264-277
    • Kun, S.1    Peng, N.2    Cliff, W.3
  • 16
    • 84866860550 scopus 로고    scopus 로고
    • Improving key predistribution with deployment knowledge in static sensor networks
    • Liu, D. and Ning, P. (2005) 'Improving key predistribution with deployment knowledge in static sensor networks', ACM Transactions on Sensor Network, Vol. 1, No. 2, pp.204-239.
    • (2005) ACM Transactions on Sensor Network , vol.1 , Issue.2 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 18
    • 33750342024 scopus 로고    scopus 로고
    • A collusion attack on pairwise key predistribution schemes for distributed sensor networks
    • DOI 10.1109/PERCOMW.2006.3, 1598981, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
    • Moore, T. (2006) 'A collusion attack on pairwise key predistribution schemes for distributed sensor networks', Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom'06), 13-17 March, Pisa, Italy, pp.251-255. (Pubitemid 44612586)
    • (2006) Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006 , vol.2006 , pp. 251-255
    • Moore, T.1
  • 19
    • 67749114527 scopus 로고    scopus 로고
    • An effective defensive node against jamming attacks in sensor networks
    • Mpitziopoulos, A. and Gavalas, D. (2008) 'An effective defensive node against jamming attacks in sensor networks', Security and Communication Networks, Vol. 2, No. 2, pp.145-163.
    • (2008) Security and Communication Networks , vol.2 , Issue.2 , pp. 145-163
    • Mpitziopoulos, A.1    Gavalas, D.2
  • 20
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Parno, B., Perrig, A. and Gligor, V. (2005) 'Distributed detection of node replication attacks in sensor networks', Proceedings of the IEEE Symposium on Security and Privacy, 8-11 May, Oakland, CA, USA, pp.49-63. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 22
    • 67650697116 scopus 로고    scopus 로고
    • A framework for confronting key-swapping collusion attack on random pairwise key predistribution schemes for distributed sensor networks
    • 29 September- 2 October, Atlanta, GA, USA
    • Tran, T.D. and Agbinya, J.I. (2008) 'A framework for confronting key-swapping collusion attack on random pairwise key predistribution schemes for distributed sensor networks', Paper Presented at the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'08), 29 September- 2 October, Atlanta, GA, USA, pp.815-820.
    • (2008) Paper Presented at the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'08) , pp. 815-820
    • Tran, T.D.1    Agbinya, J.I.2
  • 23
    • 79251536864 scopus 로고    scopus 로고
    • Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks
    • Tran, T.D. and Agbinya, J.I. (2009) 'Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks', Security and Communication Networks, Vol. 4, No. 2, pp.109-121.
    • (2009) Security and Communication Networks , vol.4 , Issue.2 , pp. 109-121
    • Tran, T.D.1    Agbinya, J.I.2
  • 25
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
    • Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) 'The feasibility of launching and detecting jamming attacks in wireless networks', Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'05), 25-27 May, Urbana-Champaign, IL, USA, pp.46-57. (Pubitemid 43037582)
    • (2005) Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 28
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • Zhu, S., Setia, S. and Jajodia, S. (2006) 'LEAP: Efficient security mechanisms for large-scale distributed sensor networks', ACM Transactions on Sensor Network (TOSN), Vol. 2, No. 4, pp.500-528. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.