메뉴 건너뛰기




Volumn 28 LNICST, Issue , 2010, Pages 240-255

DHT-based detection of node clone in wireless sensor networks

Author keywords

Distributed detection; Distributed hash table; Key based routing; Node clone attack; Wireless sensor networks

Indexed keywords

DISTRIBUTED DETECTION; DISTRIBUTED HASH TABLE; KEY-BASED ROUTING; NODE CLONE ATTACK; WIRELESS SENSOR;

EID: 84878664200     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11723-7_16     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103-105 (2003)
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 5
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 49-63 (2005) (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 10
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 12
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • Verdone, R. (ed.) EWSN 2008, Springer, Heidelberg
    • Szczechowiak, P., Oliveira, L., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4913 , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 18
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • Guerraoui, R. (ed.) Middleware 2001, Springer, Heidelberg
    • Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2218 , pp. 329
    • Rowstron, A.I.T.1    Druschel, P.2
  • 21
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(21-12), 2314-2341 (2007) (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.