메뉴 건너뛰기




Volumn 23, Issue 1, 2012, Pages 32-43

BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks

Author keywords

cooperative bit compressed authentication; injecting false data attack; random graph; Wireless sensor network

Indexed keywords

AUTHENTICATION SCHEME; AUTHENTICATION TECHNIQUES; EN-ROUTE; ENERGY WASTES; FALSE DATA; NODE DEPLOYMENT; RANDOM GRAPH; RANDOM GRAPHS; SAVE ENERGY; WIRELESS SENSOR;

EID: 82555196697     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2011.95     Document Type: Article
Times cited : (151)

References (32)
  • 4
    • 77952053188 scopus 로고    scopus 로고
    • MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks
    • X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 10, pp. 843-856, 2010.
    • (2010) Wireless Comm. and Mobile Computing , vol.10 , pp. 843-856
    • Lin, X.1    Lu, R.2    Shen, X.3
  • 5
    • 77951598972 scopus 로고    scopus 로고
    • CAT: Building couples to early detect node compromise attack in wireless sensor networks
    • Nov.-Dec.
    • X. Lin, "CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks," Proc. IEEE GLOBECOM'09, Nov.-Dec. 2009.
    • (2009) Proc. IEEE GLOBECOM'09
    • Lin, X.1
  • 7
    • 33745725710 scopus 로고    scopus 로고
    • A fault localized scheme for false report filtering in sensor networks
    • DOI 10.1109/PERSER.2005.1506391, 1506391, Proceedings - International Conference on Pervasive Services, ICPS '05
    • L. Zhou and C. Ravishankar, "A Fault Localized Scheme for False Report Filtering in Sensor Networks," Proc. Int'l Conf. Pervasive Services, (ICPS'05), pp. 59-68, July 2005. (Pubitemid 43996459)
    • (2005) Proceedings - International Conference on Pervasive Services, ICPS '05 , vol.2005 , pp. 59-68
    • Zhou, L.1    Ravishankar, C.V.2
  • 9
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • Mar.
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM'04, Mar. 2004.
    • (2004) Proc. IEEE INFOCOM'04
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 10
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 12
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • Apr.
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM'06, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM'06
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 13
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 15
    • 77954597619 scopus 로고    scopus 로고
    • Feedback based clock synchronization in wireless sensor networks: A control theoretic approach
    • June
    • J. Chen, Q. Yu, Y. Zhang, H.-H. Chen, and Y. Sun, "Feedback Based Clock Synchronization in Wireless Sensor Networks: A Control Theoretic Approach," IEEE Trans. Vehicular Technology, vol. 59, no. 6, pp. 2963-2973, June 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.6 , pp. 2963-2973
    • Chen, J.1    Yu, Q.2    Zhang, Y.3    Chen, H.-H.4    Sun, Y.5
  • 16
    • 77953769705 scopus 로고    scopus 로고
    • On optimal information capture by energy-constrained mobile sensors
    • June
    • S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, "On Optimal Information Capture by Energy-Constrained Mobile Sensors," IEEE Trans. Vehicular Technology, vol. 59, no. 5, pp. 2472-2484, June 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.5 , pp. 2472-2484
    • He, S.1    Chen, J.2    Sun, Y.3    Yau, D.K.Y.4    Yip, N.K.5
  • 17
    • 13944283393 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • DOI 10.1016/j.adhoc.2003.09.010, PII S1570870503000738
    • K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005. (Pubitemid 40266054)
    • (2005) Ad Hoc Networks , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 20
    • 50249128803 scopus 로고    scopus 로고
    • Random graph theory based connectivity analysis in wireless sensor networks with rayleigh fading channels
    • Oct.
    • J. Dong, Q. Chen, and Z. Niu, "Random Graph Theory Based Connectivity Analysis in Wireless Sensor Networks with Rayleigh Fading Channels," Proc. Asia-Pacific Conf. Comm. (APCC'07), pp. 123-126, Oct. 2007.
    • (2007) Proc. Asia-pacific Conf. Comm. (APCC'07) , pp. 123-126
    • Dong, J.1    Chen, Q.2    Niu, Z.3
  • 21
    • 77953514352 scopus 로고    scopus 로고
    • MICAz: Wireless Measurement System, http://www.xbow.com/Products/Product- pdf-files/Wireless-pdf/MICAz-Datasheet.pdf, 2010.
    • (2010) MICAz: Wireless Measurement System
  • 24
    • 17444383008 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three-key constructions
    • DOI 10.1007/s00145-004-0016-3
    • J. Black and P. Rogaway, "Cbc Macs for Arbitrary-Length Messages: the Three-Key Constructions," J. Cryptology, vol. 18, no. 2, pp. 111-131, 2005. (Pubitemid 40537627)
    • (2005) Journal of Cryptology , vol.18 , Issue.2 , pp. 111-131
    • Black, J.1    Rogaway, P.2
  • 26
    • 68949170852 scopus 로고    scopus 로고
    • Localized distance-sensitive service discovery in wireless sensor and actor networks
    • Sept.
    • X. Li, N. Santoro, and I. Stojmenovic, "Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks," IEEE Trans. Computers, vol. 58, no. 9, pp. 1275-1288, Sept. 2009.
    • (2009) IEEE Trans. Computers , vol.58 , Issue.9 , pp. 1275-1288
    • Li, X.1    Santoro, N.2    Stojmenovic, I.3
  • 28
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
    • X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, "An Effective Key Management Scheme for Heterogeneous Sensor Networks," Ad Hoc Networks, vol. 5, pp. 24-34, Jan. 2007. (Pubitemid 44573000)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 30
    • 33845544481 scopus 로고    scopus 로고
    • Authenticated query flooding in sensor networks
    • DOI 10.1007/0-387-33406-8-4, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
    • Z. Benenson, C. Freiling, E. Hammerschmidt, S. Lucks, and L. Pimenidis, "Authenticated Query Flooding in Sensor Networks," Security and Privacy in Dynamic Environments, Springer, pp. 38-49, July 2006. (Pubitemid 44920641)
    • (2006) IFIP International Federation for Information Processing , vol.201 , pp. 38-49
    • Benenson, Z.1    Freiling, F.C.2    Hammerschmidt, E.3    Lucks, S.4    Pimenidis, L.5
  • 31
    • 58149131215 scopus 로고    scopus 로고
    • TUA: A novel compromise-resilient authentication architecture for wireless mesh networks
    • Apr.
    • X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, "TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks," IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1389-1399, Apr. 2008.
    • (2008) IEEE Trans. Wireless Comm. , vol.7 , Issue.4 , pp. 1389-1399
    • Lin, X.1    Lu, R.2    Ho, P.3    Shen, X.4    Cao, Z.5
  • 32
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • Apr.
    • C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM'08, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM'08
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.