메뉴 건너뛰기




Volumn , Issue , 2012, Pages 406-415

Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack

Author keywords

On off attack; redemption; secure routing; trust; wireless sensor network

Indexed keywords

COMPROMISED NODES; FALSE ALARMS; FLEXIBLE DESIGNS; MALICIOUS NODE DETECTIONS; ON/OFF ATTACK; REDEMPTION; ROUTING SCHEME; SECURE ROUTING; TRUST; WIRELESS CONNECTION; WIRELESS SENSOR NETWORK (WSNS);

EID: 84874442997     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.410S/icst.collaboratecom.2012.250447     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 1
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations i n ad hoc sensor networks
    • F . Hu and N. Sharma, " Security considerations i n ad hoc sensor networks," Ad Hoc Networks. vol. 3, pp. 69-89, 2005.
    • (2005) Ad Hoc Networks , vol.3 , pp. 69-89
    • Hu, F.1    Sharma, N.2
  • 2
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wireless networks, vol. 1 1 , pp. 2 1-3 8 , 2005.
    • (2005) Wireless Networks , vol.11 , pp. 21-38
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 3
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y. Hu, D. Johnson, and A. Perrig, " SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, " Ad Hoc Networks, vol. 1 , pp. 1 75-1 92, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 7
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, " Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1 , pp. 293-3 1 5, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 9
    • 77950866308 scopus 로고    scopus 로고
    • Trust management systems for wireless sensor networks: Best practices
    • J. Lopez, R. Roman, 1. Agudo, and C. Fernandez-Gago, " Trust management systems for wireless sensor networks: Best practices," Computer Communications. vol. 33, pp. 1 086-1 093 , 2010.
    • (2010) Computer Communications , vol.33 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez-Gago, C.4
  • 10
    • 24744432675 scopus 로고    scopus 로고
    • Seltpolicing mobile ad hoc networks by reputation systems
    • S Buchegger and J. Y. Le Boudee, " Seltpolicing mobile ad hoc networks by reputation systems," Communications Magazine. IEEE. vol. 43, pp. 1 0 1-1 07, 2005.
    • (2005) Communications Magazine. IEEE , vol.43 , pp. 101-107
    • Buchegger, S.1    Le Boudee, J.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.