메뉴 건너뛰기




Volumn , Issue , 2011, Pages 138-147

A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network

Author keywords

Data aggregation; Sensor network; Trust management

Indexed keywords

BIT-ERRORS; DATA AGGREGATION; EFFICIENT POWER; EXTREME ENVIRONMENT; MEMORY EFFICIENT; SECURE DATA; TRUST MANAGEMENT;

EID: 80155154403     PISSN: 01903918     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPP.2011.16     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 79951680628 scopus 로고    scopus 로고
    • Trust management for multimedia P2P applications in autonomic networking
    • Multimedia Ad Hoc and Sensor Networks, June
    • F. Almenarez and A. Marin and D. Diaz and A. Cortes and C. Campo and C. Garcia-Rubio, Trust management for multimedia P2P applications in autonomic networking, Ad Hoc Networks, Volume 9, Issue 4, Multimedia Ad Hoc and Sensor Networks, June 2011, Pages 687-697.
    • (2011) Ad Hoc Networks , vol.9 , Issue.4 , pp. 687-697
    • Almenarez, F.1    Marin, A.2    Diaz, D.3    Cortes, A.4    Campo, C.5    Garcia-Rubio, C.6
  • 3
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • A. Boukerche and L. Xu and K. El-Khatib, Trust-based security for wireless ad hoc and sensor networks, the Journal of Computer Communications 30 (11-12) 2007, pp.2413-2427.
    • (2007) The Journal of Computer Communications , vol.30 , Issue.11-12 , pp. 2413-2427
    • Boukerche, A.1    Xu, L.2    El-Khatib, K.3
  • 13
    • 78751649542 scopus 로고    scopus 로고
    • Trust management in ubiquitous computing: A Bayesian approach
    • Special Issue of Computer Communications on Information and Future Communication Security, 15 March
    • M.K. Denko and Tao Sun and I. Woungang, Trust management in ubiquitous computing: A Bayesian approach, Computer Communications, Volume 34, Issue 3, Special Issue of Computer Communications on Information and Future Communication Security, 15 March 2011, Pages 398-406.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 398-406
    • Denko, M.K.1    Sun, T.2    Woungang, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.