메뉴 건너뛰기




Volumn , Issue , 2012, Pages 585-593

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks

Author keywords

Distributed Security Framework; M Core Control Language (MCL); Wireless Sensor Network Security

Indexed keywords

CODING PROCESS; COMMUNICATION STACKS; CRITICAL DOMAIN; DEFENSE MECHANISM; DISTRIBUTED SECURITY; DOMAIN SPECIFIC LANGUAGES; HETEROGENEOUS WIRELESS SENSOR NETWORKS; M-CORE CONTROL LANGUAGE (MCL); MULTIPLE DETECTION; SELECTIVE FORWARDING; SENSING COMPONENTS; WIRELESS SENSOR NETWORK (WSNS);

EID: 84861627279     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195801     Document Type: Conference Paper
Times cited : (23)

References (17)
  • 1
    • 74549201116 scopus 로고    scopus 로고
    • A cyber-physical middleware framework for continuous monitoring of water distribution systems
    • M. Iqbal and H. B. Lim, "A cyber-physical middleware framework for continuous monitoring of water distribution systems," in Proc. of the 7th ACM SenSys, 2009, pp. 401-402.
    • Proc. of the 7th ACM SenSys, 2009 , pp. 401-402
    • Iqbal, M.1    Lim, H.B.2
  • 3
    • 84877682149 scopus 로고    scopus 로고
    • "Planetary Skin," http://www.planetaryskin.org/home.
    • Planetary Skin
  • 9
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • January
    • F. Hu and N. K. Sharma, "Security considerations in ad hoc sensor networks," Elsevier's AdHoc Networks Journal, vol. 3, no. 1, pp. 69- 89, January 2005.
    • (2005) Elsevier's AdHoc Networks Journal , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.K.2
  • 12
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • nov.
    • S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," Industrial Informatics, IEEE Transactions on, vol. 6, no. 4, pp. 744-757, nov. 2010.
    • (2010) Industrial Informatics, IEEE Transactions on , vol.6 , Issue.4 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.-Y.3    Park, Y.4    Rhy, H.5
  • 15
    • 56749183876 scopus 로고    scopus 로고
    • Wireless and physical security via embedded sensor networks
    • Proceedings of the first ACM conference on Wireless network security, ser.
    • M. J. Ocean and A. Bestavros, "Wireless and physical security via embedded sensor networks," in Proceedings of the first ACM conference on Wireless network security, ser. WiSec 08, 2008, pp. 131-139.
    • (2008) WiSec 08 , pp. 131-139
    • Ocean, M.J.1    Bestavros, A.2
  • 16
    • 78650142356 scopus 로고    scopus 로고
    • Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network
    • Proceedings of the 3rd ACM workshop on Artificial intelligence and security, ser. ACM
    • P. Krishnamoorthy and M. Wright, "Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network," in Proceedings of the 3rd ACM workshop on Artificial intelligence and security, ser. AISec '10. ACM, 2010.
    • (2010) AISec '10
    • Krishnamoorthy, P.1    Wright, M.2
  • 17
    • 78649258582 scopus 로고    scopus 로고
    • The intrusion detection in mobile sensor network
    • Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, ser. ACM
    • Y. Keung, B. Li, and Q. Zhang, "The intrusion detection in mobile sensor network," in Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, ser. MobiHoc '10. ACM, 2010, pp. 11-20.
    • (2010) MobiHoc '10 , pp. 11-20
    • Keung, Y.1    Li, B.2    Zhang, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.