메뉴 건너뛰기




Volumn , Issue , 2011, Pages 119-126

Efficient flooding in Wireless Sensor Networks secured with neighborhood keys

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION PRIMITIVES; KEY DISTRIBUTION; NETWORK COVERAGE; NP-HARD; PACKET TRANSMISSIONS; PARAMETER CHANGES; SECURE LOCALIZATION; UNICAST TRANSMISSIONS;

EID: 84255192331     PISSN: 21619646     EISSN: 21619654     Source Type: Conference Proceeding    
DOI: 10.1109/WiMOB.2011.6085415     Document Type: Conference Paper
Times cited : (21)

References (19)
  • 1
    • 77952407531 scopus 로고    scopus 로고
    • Secure walking GPS: A secure localization and key distribution scheme for wireless sensor networks
    • Q. Mi, J. A. Stankovic, and R. Stoleru, "Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks," in WiSec, 2010, pp. 163-168.
    • (2010) WiSec , pp. 163-168
    • Mi, Q.1    Stankovic, J.A.2    Stoleru, R.3
  • 6
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, pp. 53-57, June 2004.
    • (2004) Commun. ACM , vol.47 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 7
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • L. Lazos and R. Poovendran, "SeRLoc: secure range-independent localization for wireless sensor networks," in WiSe, 2004, pp. 21-30.
    • (2004) WiSe , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 9
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
    • D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in SECON, 2004.
    • (2004) SECON
    • Malan, D.1    Welsh, M.2    Smith, M.3
  • 11
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    • February
    • P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks," ACM Trans. Sen. Netw., vol. 4, pp. 1:1-1:35, February 2008.
    • (2008) ACM Trans. Sen. Netw. , vol.4 , pp. 11-135
    • Ning, P.1    Liu, A.2    Du, W.3
  • 13
    • 33750327688 scopus 로고    scopus 로고
    • DoS protection for reliably authenticated broadcast
    • C. A. Gunter, S. Khanna, K. Tan, and S. Venkatesh, "DoS protection for reliably authenticated broadcast," in NDSS, 2004.
    • (2004) NDSS
    • Gunter, C.A.1    Khanna, S.2    Tan, K.3    Venkatesh, S.4
  • 15
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel uTESLA: Broadcast authentication for distributed sensor networks
    • November
    • D. Liu and P. Ning, "Multilevel uTESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embed. Comput. Syst., vol. 3, pp. 800-836, November 2004.
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 16
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • September
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wirel. Netw., vol. 8, pp. 521-534, September 2002.
    • (2002) Wirel. Netw. , vol.8 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 17
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in NDSS, 2003.
    • (2003) NDSS
    • Liu, D.1    Ning, P.2
  • 19
    • 0032635721 scopus 로고    scopus 로고
    • Tight bound on johnson's algorithm for maximum satisfiability
    • June
    • J. Chen, D. K. Friesen, and H. Zheng, "Tight bound on Johnson's algorithm for maximum satisfiability," Journal of Computer and System Sciences, vol. 58, pp. 622-640, June 1999.
    • (1999) Journal of Computer and System Sciences , vol.58 , pp. 622-640
    • Chen, J.1    Friesen, D.K.2    Zheng, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.