메뉴 건너뛰기




Volumn , Issue , 2012, Pages 134-141

Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks

Author keywords

inside threats; sensor networks; trust mechanism

Indexed keywords

AUTHENTICATION AND AUTHORIZATION; CORE COMPONENTS; INSIDE THREATS; INSIDER ATTACK; INSIDER THREAT; SECURITY HOLES; SECURITY MECHANISM; SECURITY VULNERABILITIES; TRUST EVALUATION; TRUST MECHANISM; TRUST MODELS;

EID: 84864242377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPW.2012.32     Document Type: Conference Paper
Times cited : (63)

References (28)
  • 1
    • 77958107750 scopus 로고    scopus 로고
    • Comprehensive Evaluation of the IEEE 802.15.4 MAC Layer Performance with Retransmissions
    • October
    • Azahdeh Faridi et al, "Comprehensive Evaluation of the IEEE 802.15.4 MAC Layer Performance With Retransmissions," IEEE Transactions on Vehicular Technology, Vol.59, No.8, October 2010, pp. 3917-3932.
    • (2010) IEEE Transactions on Vehicular Technology , vol.59 , Issue.8 , pp. 3917-3932
    • Faridi, A.1
  • 3
    • 71649094416 scopus 로고    scopus 로고
    • A survey of Attack and Defense Techniques for Reputation Systems
    • K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of Attack and Defense Techniques for Reputation Systems," ACM Computing Surveys, Vol 41, Issue 4, 2009.
    • (2009) ACM Computing Surveys , vol.41 , Issue.4
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 5
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Chris Karlof and David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks Journal, Vol.1, Issue 2-3, 2003, pp. 293-315.
    • (2003) Ad Hoc Networks Journal , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 7
    • 42649129419 scopus 로고    scopus 로고
    • Future Trust Management Framework for Mobile Ad Hoc Networks
    • Jie Li, Ruidong Li, and Jien Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks," IEEE Communication Magazine, Vol 46, Issue 4, 2008, pp.108-114.
    • (2008) IEEE Communication Magazine , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 9
    • 48649095029 scopus 로고    scopus 로고
    • An efficient countermeasure to the selective forwarding attack in wireless sensor network
    • Hung-Min Sun, Chien-Ming Che, and Ying-Chu Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor network," IEEE Region 10 Conference (TENCON), 2007, pp.1-4.
    • IEEE Region 10 Conference (TENCON), 2007 , pp. 1-4
    • Sun, H.-M.1    Che, C.-M.2    Hsiao, Y.-C.3
  • 10
    • 56749140937 scopus 로고    scopus 로고
    • Defense of Trust Management Vulnerabilities in Distributed Networks
    • Lindsay
    • Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks," IEEE Communications Magazine, Vol 46, Issue 2, 2008, pp.112-119.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.1    Han, Z.2    Ray Liu, K.J.3
  • 11
    • 80051521882 scopus 로고    scopus 로고
    • Trust management in the pervasive computing era
    • July
    • Denis Trček, "Trust management in the pervasive computing era," IEEE Security & Privacy, Vol. 9, No. 4, July 2011, pp. 52-55.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.4 , pp. 52-55
    • Trček, D.1
  • 12
    • 67650841852 scopus 로고    scopus 로고
    • A Note on Trust-Enhanced Security
    • May/June
    • Vijay Varadharajan, "A Note on Trust-Enhanced Security", IEEE Security & Privacy, Vol. 7, Issue 3, May/June 2009, pp. 57-59.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.3 , pp. 57-59
    • Varadharajan, V.1
  • 13
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • Bin Xiao, Bo Yu, Chuanshan Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, 67, 2007, pp. 1218-1230.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 15
    • 81455157533 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Elsevier, in press
    • Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li, "Trust mechanisms in wireless sensor networks: attack analysis and countermeasures," Journal of Network and Computer Applications, Elsevier, 2011, in press.
    • (2011) Journal of Network and Computer Applications
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 16
    • 3042825654 scopus 로고    scopus 로고
    • Software Protection: Security's Last Stand?
    • Martin R. Stytz and James A. Whitaker, "Software Protection: Security's Last Stand?" IEEE Security & Privacy, Vol 1, Issue 1, 2003, pp. 95-98.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 95-98
    • Stytz, M.R.1    Whitaker, J.A.2
  • 21
    • 84864260518 scopus 로고    scopus 로고
    • UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
    • in press
    • Issa Khalil, Saurabh Bagchi, Cristina N. Rotaru, Ness B. Shroff, "UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks," Ad Hoc Networks, in press, 2009.
    • (2009) Ad Hoc Networks
    • Khalil, I.1    Bagchi, S.2    Rotaru, C.N.3    Shroff, N.B.4
  • 22
    • 79956094979 scopus 로고    scopus 로고
    • Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
    • Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, A. Hadjidj, "Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks," Journal of Network and Computer Applications 34, 2011, pp. 1380-1397.
    • (2011) Journal of Network and Computer Applications , vol.34 , pp. 1380-1397
    • Challal, Y.1    Ouadjaout, A.2    Lasla, N.3    Bagaa, M.4    Hadjidj, A.5
  • 24
    • 77950866308 scopus 로고    scopus 로고
    • Trust management systems for wireless sensor networks: Best practices
    • Javier Lopez, Rodrigo Roman, Isaac Agudo, and Carmen Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, Vol 33, 2010, pp.1086-1093.
    • (2010) Computer Communications , vol.33 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez-Gago, C.4
  • 25
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
    • David R. Raymond and Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive computing, 2008, pp. 74-80.
    • (2008) Pervasive Computing , pp. 74-80
    • Raymond, D.R.1    Midkiff, S.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.