메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1656-1664

Maintaining source privacy under eavesdropping and node compromise attacks

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARY MODELS; CRYPTOGRAPHIC TECHNIQUES; DETECTING SENSORS; DIFFERENT ATTACKS; EN-ROUTE; EVENT LOCATION; ITS EFFICIENCIES; MALICIOUS ENTITY; NODE COMPROMISE; RANDOM WALK; SOURCE NODES; TRACEBACK; TRAFFIC ANALYSIS;

EID: 79960880538     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934959     Document Type: Conference Paper
Times cited : (26)

References (15)
  • 5
    • 55649095270 scopus 로고    scopus 로고
    • Location privacy and anonymity preserving routing for wireless sensor networks
    • A. A. Nezhad, A. Miri, and D. Makrakis. Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks, 52(18):3433-3452, 2008.
    • (2008) Computer Networks , vol.52 , Issue.18 , pp. 3433-3452
    • Nezhad, A.A.1    Miri, A.2    Makrakis, D.3
  • 7
    • 57849119211 scopus 로고    scopus 로고
    • Serp: Secure energy-efficient routing protocol for densely deployed wireless sensor networks
    • A.-S. K. Pathan and C. S. Hong. Serp: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annales des Téĺecommunications, 63(9-10):529-541, 2008.
    • (2008) Annales des Télécommunications , vol.63 , Issue.9-10 , pp. 529-541
    • Pathan, A.-S.K.1    Hong, C.S.2
  • 8
    • 33749382575 scopus 로고    scopus 로고
    • Energy comparison of aes and sha-1 for ubiquitous computing
    • IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2006). Springer
    • J. peter Kaps and B. Sunar. Energy comparison of aes and sha-1 for ubiquitous computing. In IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2006), LNCS. Springer, 2006.
    • (2006) LNCS
    • Peter Kaps, J.1    Sunar, B.2
  • 9
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • G. J. Pottie and W. J. Kaiser. Wireless integrated network sensors. Communications of ACM, 43(5):51-58, 2000.
    • (2000) Communications of ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 12
    • 67349099926 scopus 로고    scopus 로고
    • Privacy-aware routing in sensor networks
    • H. Wang, B. Sheng, and Q. Li. Privacy-aware routing in sensor networks. Computer Networks, 53(9):1512-1529, 2009.
    • (2009) Computer Networks , vol.53 , Issue.9 , pp. 1512-1529
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 14
    • 34548852836 scopus 로고    scopus 로고
    • Chemas: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao. Chemas: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11):1218-1230, 2007.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.