메뉴 건너뛰기




Volumn 11, Issue 5, 2012, Pages 1946-1956

DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks

Author keywords

code dissemination; denial of service; security; Sensor networks; user privilege

Indexed keywords

CENTRALIZED APPROACHES; CODE DISSEMINATION; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DISTRIBUTED CODES; HOSTILE ENVIRONMENTS; NETWORK AVAILABILITY; NETWORK USERS; RESOURCE-CONSTRAINED; SALIENT FEATURES; SECURE CODES; SECURITY; SECURITY PROPERTIES; USER PRIVILEGE;

EID: 84861438303     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2012.030812.111857     Document Type: Article
Times cited : (41)

References (30)
  • 2
    • 20344393082 scopus 로고    scopus 로고
    • The dynamic behavior of a data dissemination protocol for network programming at scale
    • J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in Proc. SenSys'04.
    • Proc. SenSys'04
    • Hui, J.W.1    Culler, D.2
  • 3
    • 34249694792 scopus 로고    scopus 로고
    • Sprinkler: A reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices
    • V. Naik, A. Arora, P. Sinha, and H. Zhang, "Sprinkler: a reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 762-776, 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.7 , pp. 762-776
    • Naik, V.1    Arora, A.2    Sinha, P.3    Zhang, H.4
  • 6
    • 34247397108 scopus 로고    scopus 로고
    • Secure code distribution in dynamically programmable wireless sensor networks
    • J. Deng, R. Han, and S. Mishra, "Secure code distribution in dynamically programmable wireless sensor networks," in Proc. IPSN'06.
    • Proc. IPSN'06
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 8
    • 33947642085 scopus 로고    scopus 로고
    • Sluice: Secure dissemination of code updates in sensor networks
    • P. E. Lanigan, R. Gandhi, and P. Narasimhan, "Sluice: secure dissemination of code updates in sensor networks," in Proc. ICDCS'06.
    • Proc. ICDCS'06
    • Lanigan, P.E.1    Gandhi, R.2    Narasimhan, P.3
  • 9
    • 78249233570 scopus 로고    scopus 로고
    • Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks
    • Y. Law et al., "Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks," EURASIP J. Wireless Commun. and Networking, vol. 2011, pp. 1-21, 2010.
    • (2010) EURASIP J. Wireless Commun. and Networking , vol.2011 , pp. 1-21
    • Law, Y.1
  • 10
    • 85184647902 scopus 로고    scopus 로고
    • A protocol for secure and energy-aware reprogramming in WSN
    • C. Parra et al., "A protocol for secure and energy-aware reprogramming in WSN," in Proc. IWCMC'09.
    • Proc. IWCMC'09
    • Parra, C.1
  • 11
    • 84861426145 scopus 로고    scopus 로고
    • An integrated system for secure code distribution in wireless sensor networks
    • N. Bui et al., "An integrated system for secure code distribution in wireless sensor networks," in Proc. Percom'10.
    • Proc. Percom'10
    • Bui, N.1
  • 12
    • 51249093755 scopus 로고    scopus 로고
    • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks
    • S. Hyun, P. Ning, A. Liu, and W. Du, "Seluge: secure and DoS-resistant code dissemination in wireless sensor networks," in Proc. IPSN'08.
    • Proc. IPSN'08
    • Hyun, S.1    Ning, P.2    Liu, A.3    Du, W.4
  • 13
    • 84861428080 scopus 로고    scopus 로고
    • Geoss, http://www.epa.gov/geoss/.
    • Geoss
  • 14
    • 84861429971 scopus 로고    scopus 로고
    • NOPP, http://www.nopp.org/.
    • NOPP
  • 15
    • 0035452277 scopus 로고    scopus 로고
    • Distributed services for information dissemination in selforganizing sensor networks
    • A. Lim, "Distributed services for information dissemination in selforganizing sensor networks," J. Franklin Institute, vol. 38, no. 6, pp. 707-727, 2001.
    • (2001) J. Franklin Institute , vol.38 , Issue.6 , pp. 707-727
    • Lim, A.1
  • 16
    • 84861445209 scopus 로고    scopus 로고
    • SDRP: A secure and efficient reprogramming protocol for wireless sensor networks
    • accepted, DOI: 10.1109/TIE.2011.2178214
    • D. He, C. Chen, S. Chan, and J. Bu, "SDRP: a secure and efficient reprogramming protocol for wireless sensor networks," IEE Trans. Ind. Electron., accepted, 2011, DOI: 10.1109/TIE.2011.2178214.
    • (2011) IEE Trans. Ind. Electron.
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 17
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 18
    • 62949194452 scopus 로고    scopus 로고
    • A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1223-1229, 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1223-1229
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 19
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Inf. and Syst. Security, vol. 8, no. 1, pp. 41-77, 2005.
    • (2005) ACM Trans. Inf. and Syst. Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 20
    • 79957932477 scopus 로고    scopus 로고
    • Secure time synchronization for wireless sensor networks based on bilinear pairing functions
    • M. Rahman and K. EI-Khatib, "Secure time synchronization for wireless sensor networks based on bilinear pairing functions," IEEE Trans. Parallel Distrib. Systems, accepted, 2010.
    • IEEE Trans. Parallel Distrib. Systems, accepted , vol.2010
    • Rahman, M.1    Ei-Khatib, K.2
  • 21
    • 77954523591 scopus 로고    scopus 로고
    • T-Check: Bug finding for sensor networks
    • P. Li and J. Regehr, "T-Check: bug finding for sensor networks," in Proc. IPSN'10.
    • Proc. IPSN'10
    • Li, P.1    Regehr, J.2
  • 22
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • D. He, L. Cui, H. Huang, and M. Ma, "Design and verification of enhanced secure localization scheme in wireless sensor networks," IEEE Trans. Parallel Distrib. Systems, vol. 20, no. 7, pp. 1050-1058, 2009.
    • (2009) IEEE Trans. Parallel Distrib. Systems , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 23
    • 0002882557 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • of LNCS, Springer Verlag
    • J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," Advances in Cryptology -CRYPTO '97, vol. 1296 of LNCS, pp. 410-424. Springer Verlag, 1997.
    • (1997) Advances in Cryptology -CRYPTO '97 , vol.1296 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 24
    • 84966504504 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings
    • F. Zhang and K. Kim, "Efficient ID-based blind signature and proxy signature from bilinear pairings," in Proc. ACISP'03.
    • Proc. ACISP'03
    • Zhang, F.1    Kim, K.2
  • 25
    • 0037435795 scopus 로고    scopus 로고
    • Proxy signature schemes based on factoring
    • Z. Shao, "Proxy signature schemes based on factoring," Inf. Process. Lett., vol. 85, no. 3, pp. 137-143, 2003.
    • (2003) Inf. Process. Lett. , vol.85 , Issue.3 , pp. 137-143
    • Shao, Z.1
  • 26
    • 0009554659 scopus 로고    scopus 로고
    • Protocols for public key cryptosystems
    • R. Merkle, "Protocols for public key cryptosystems," in Proc. 1980 IEEE S&P.
    • Proc. 1980 IEEE S&P
    • Merkle, R.1
  • 27
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard, "Client puzzles: a cryptographic countermeasure against connection depletion attacks," in Proc. NDSS'99.
    • Proc. NDSS'99
    • Juels, A.1    Brainard, J.2
  • 29
    • 84861433900 scopus 로고    scopus 로고
    • OpenSSL, http://www.openssl.org.
    • OpenSSL


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.