메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2859-2863

Performance evaluation of security routing strategies to avoid DoS attacks in WSN

Author keywords

Markov Chain; response times; Stochastic Automata Networks (SAN)

Indexed keywords

AUTOMATA THEORY; DENIAL-OF-SERVICE ATTACK; FIGHTER AIRCRAFT; MARKOV PROCESSES; NETWORK SECURITY; ROUTING ALGORITHMS; STOCHASTIC SYSTEMS;

EID: 84877647628     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2012.6503550     Document Type: Conference Paper
Times cited : (4)

References (19)
  • 2
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad hoc wireless networks
    • F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks, in Proc 1999, pp. 172-194.
    • Proc 1999 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 4
    • 0000244582 scopus 로고
    • Threshold cryptography
    • Springer-Verlag
    • Y. Desmedt, Threshold Cryptography, In CRYPTO '89, vol. 435 of LNCS, pp. 307-315, Springer-Verlag, 1990.
    • (1990) CRYPTO '89, Vol. 435 of LNCS , pp. 307-315
    • Desmedt, Y.1
  • 5
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan and P.Ginzboorg, Key Agreement in Ad hoc Networks, Computer Communications, vol. 23(17), pp. 1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 6
    • 84994155710 scopus 로고    scopus 로고
    • A distributed trust model
    • Langdale, Cumbria, United Kingdom, Sep 23-26
    • A. Abdul-Rahman and S. Hailes, A Distributed Trust Model, in Proc 97 New security paradigms, Langdale, Cumbria, United Kingdom, Sep 23-26 1997, pp. 48-60.
    • (1997) Proc 97 New Security Paradigms , pp. 48-60
    • Abdul-Rahman, A.1    Hailes, S.2
  • 7
    • 85184303846 scopus 로고    scopus 로고
    • A key management scheme in wireless sensor networks based on Behavior Trust
    • Tao Liu; Ming-Zheng Zhou; A key management scheme in wireless sensor networks based on Behavior Trust, Progress in Informatics and Computing (PIC), 20 10
    • Progress in Informatics and Computing (PIC) , vol.20 , pp. 10
    • Liu, T.1    Zhou, M.-Z.2
  • 12
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, Securing Ad hoc Networks, IEEE Network, vol. 13(6), pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 15
    • 0024032823 scopus 로고    scopus 로고
    • Approximate anajysis of fork/join synchronization in parajlel queues
    • R. Nelson and A.N. Tantawi. Approximate AnaJysis of Fork/Join Synchronization in ParaJlel Queues. IEEE Transaction Computer, vol. 37, No. 6, pp. 739-743, 1998
    • (1998) IEEE Transaction Computer , vol.37 , Issue.6 , pp. 739-743
    • Nelson, R.1    Tantawi, A.N.2
  • 17
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant, communication networks
    • Nov
    • E. Ayanoglu, E. Chih-Lin, R. D. gitlin and J. E. Mazo, Diversity Coding for Transparent Self-healing and Fault-tolerant, Communication networks, IEEE Transactions on Communications, vol. 4 1( 1), pp.1677-1686, Nov 1993.
    • (1993) IEEE Transactions on Communications , vol.41 , Issue.1 , pp. 1677-1686
    • Ayanoglu, E.1    Chih-Lin, E.2    Gitlin, .D.3    Mazo, J.E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.