메뉴 건너뛰기




Volumn 16 LNICST, Issue , 2009, Pages 35-45

SNR based digital estimation of security in wireless sensor networks

Author keywords

Digital estimation; Security assessment; Signal to noise ratio or SNR; Wireless sensor network

Indexed keywords

DIGITAL ESTIMATION; INTER-NODE COMMUNICATION; MIDDLEWARE LAYER; NETWORK THRESHOLDS; QUALITY OF COMMUNICATION; QUALITY PARAMETERS; SECURITY ASSESSMENT; SECURITY IN WIRELESS SENSOR NETWORKS; SECURITY THREATS; SIGNAL TO NOISE; SIGNIFICANT IMPACTS; SNR DEGRADATION; WIRELESS SENSOR;

EID: 84863307764     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11284-3_5     Document Type: Conference Paper
Times cited : (3)

References (25)
  • 2
    • 84885886207 scopus 로고    scopus 로고
    • Jamming attack detection and countermeasures
    • Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse
    • Muraleedharan, R., Osadciw, L.A.: Jamming Attack Detection and Countermeasures. In: Wireless Sensor Network Using Ant System. Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, pp. 13244-11240
    • Wireless Sensor Network Using Ant System , pp. 13244-11240
    • Muraleedharan, R.1    Osadciw, L.A.2
  • 4
    • 35348945419 scopus 로고    scopus 로고
    • The self-protection problem in wireless sensor networks
    • Article 20 October
    • Wang, D., Zhang, Q., Liu, J.: The self-protection Problem in Wireless Sensor Networks. ACM Transactions on Sensor Netwoks 3(4), Article 20 (October 2007)
    • (2007) ACM Transactions on Sensor Netwoks , vol.3 , Issue.4
    • Wang, D.1    Zhang, Q.2    Liu, J.3
  • 5
    • 10844275662 scopus 로고    scopus 로고
    • Uncertainty-aware and coverage-oriented deployment for sensor networks
    • DOI 10.1016/j.jpdc.2004.03.019
    • Zou, Y., Chakrabarty, K.: Uncertainty-aware and coverage-oriented deployment for sensor networks. Journal of Parallel and Distributed Computing 64(7), 788-798 (2004) (Pubitemid 40000770)
    • (2004) Journal of Parallel and Distributed Computing , vol.64 , Issue.7 , pp. 788-798
    • Zou, Y.1    Chakrabarty, K.2
  • 8
    • 78649815022 scopus 로고    scopus 로고
    • A pretty safe strategy for analyzing discrete security assessment framework in wireless sensor networks
    • November 14, 2008. CCIS Springer, Heidelberg
    • Arain, A.A., Hashmani, M., Mussadiq, M., et al.: A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks. In: Book of Wireless Networks, Information Processing and Systems, November 14, 2008. CCIS, vol. 20, pp. 445-448. Springer, Heidelberg (2008)
    • (2008) Book of Wireless Networks, Information Processing and Systems , vol.20 , pp. 445-448
    • Arain, A.A.1    Hashmani, M.2    Mussadiq, M.3
  • 9
    • 33751044459 scopus 로고    scopus 로고
    • A security framework for wireless sensor networks
    • Houston, Texas, USA, February 7-9
    • Zia, T., Zomaya, A.: A security Framework for Wireless Sensor Networks. In: SAS 2006 - IEEE Sensors Application Symposium, Houston, Texas, USA, February 7-9 (2006)
    • (2006) SAS 2006 - IEEE Sensors Application Symposium
    • Zia, T.1    Zomaya, A.2
  • 10
    • 0036986248 scopus 로고    scopus 로고
    • Rumor routing algorithm for sensor networks
    • September 28, Atlanta, Georgia, USA Copyright 2002 ACM 1-58113-589-0/02/0009
    • Braginsky, D., Estrin, D.: Rumor Routing Algorithm For Sensor Networks. In: WSNA 2002, September 28, Atlanta, Georgia, USA Copyright 2002 ACM 1-58113-589-0/02/0009 (2002)
    • (2002) WSNA 2002
    • Braginsky, D.1    Estrin, D.2
  • 11
    • 84885890739 scopus 로고    scopus 로고
    • Routing security in sensor network: Hello FLOOD attack and defence
    • Abdul Hamid, M., Mamun-Or-Rashid, M., Hong, C.S.: Routing Security in Sensor Network:HELLO FLOOD Attack and Defence. In: ICNEWS (2006)
    • (2006) ICNEWS
    • Abdul Hamid, M.1    Mamun-Or-Rashid, M.2    Hong, C.S.3
  • 12
    • 65449129287 scopus 로고    scopus 로고
    • Minimizing transmit power for coherent communications in wireless sensor networks with finite-rate feedback
    • September
    • Marqus, A.G., Wang, X., Giannakis, G.B.: Minimizing Transmit Power for coherent Communications in Wireless Sensor Networks with Finite-Rate Feedback. IEEE Transactions on Signal Processing 56(9) (September 2008)
    • (2008) IEEE Transactions on Signal Processing , vol.56 , Issue.9
    • Marqus, A.G.1    Wang, X.2    Giannakis, G.B.3
  • 15
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution opportunities, and challenges
    • Chong, C.-Y., Kumar, S.P.: Sensor Networks: Evolution Opportunities, and Challenges. Proceedings of the IEEE 91(8), 1247-1256
    • Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.-Y.1    Kumar, S.P.2
  • 19
    • 24944540791 scopus 로고    scopus 로고
    • On the security of Wireless Sensor Networks
    • Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
    • Roman, R., Zhou, J., López, J.: On the security of wireless sensor networks. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3482, pp. 681-690. Springer, Heidelberg (2005) (Pubitemid 41313610)
    • (2005) Lecture Notes in Computer Science , vol.3482 , Issue.III , pp. 681-690
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 22
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attack and Counter Measures. Ad Hoc Networks 1(2-3), 293-315 (2003) (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 25
    • 42549138436 scopus 로고    scopus 로고
    • On the intruder detection for sinkhole attack in wireless sensor networks
    • DOI 10.1109/ICC.2006.255595, 4024996, 2006 IEEE International Conference on Communications, ICC 2006
    • Ngai, E.C.H., Jiangchuan Liu Lyu, M.R.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks Communications. In: IEEE International conference on ICC 2006, Istanbul, June 2006, vol. 8, pp. 3383-3389 (2006) ISSN:8164-9547, ISBN: 1-4244-0355-3 (Pubitemid 351575997)
    • (2006) IEEE International Conference on Communications , vol.8 , pp. 3383-3389
    • Ngai, E.C.H.1    Liu, J.2    Lyu, M.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.