메뉴 건너뛰기




Volumn 8, Issue 11, 2012, Pages 1880-1888

Trust based node replication attack detection protocol for wireless sensor networks

Author keywords

Clone; Node replication attack; Randomized and trust; Security; Wireless sensor network; Wireless sensor networks (WSN)

Indexed keywords


EID: 84880119189     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2012.1880.1888     Document Type: Article
Times cited : (11)

References (19)
  • 3
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • DOI: 10.1109/JSAC.2005.861380
    • Capkun, S. and J.P. Hubaux, 2006. Secure positioning in wireless networks. IEEE J. Sel. Areas Commun., 24: 221-232. DOI: 10.1109/JSAC.2005.861380
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , pp. 221-232
    • Capkun, S.1    Hubaux, J.P.2
  • 5
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • Sept. 09-14, ACM Press, Montreal, Canada, DOI: 10.1145/1288107.1288119
    • Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2007. A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing, Sept. 09-14, ACM Press, Montreal, Canada, pp: 80-89. DOI: 10.1145/1288107.1288119
    • (2007) Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing , pp. 80-89
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3    Mei, A.4
  • 6
    • 79960522083 scopus 로고    scopus 로고
    • Distributed detection of clone attacks in wireless sensor networks
    • DOI: 10.1109/TDSC.2010.25
    • Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2010. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Depedable Secure Comput.,8: 685-698. DOI: 10.1109/TDSC.2010.25
    • (2010) IEEE Trans. Depedable Secure Comput. , vol.8 , pp. 685-698
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3    Mei, A.4
  • 9
    • 84874676371 scopus 로고    scopus 로고
    • The replication attack in wireless sensor networks: Analysis and defenses
    • DOI: 10.1007/978-3-642-17878-8_18
    • Manjula, V. and C. Chellappan, 2011a. The replication attack in wireless sensor networks: Analysis and defenses. Adv. Netw. Commun., 132: 169-178. DOI: 10.1007/978-3-642-17878-8_18
    • (2011) Adv. Netw. Commun. , vol.132 , pp. 169-178
    • Manjula, V.1    Chellappan, C.2
  • 10
    • 85027414240 scopus 로고    scopus 로고
    • Replication attack mitigations for static and mobile WSN
    • DOI: 10.5121/ijnsa.2011.3210
    • Manjula, V. and C. Chellappan, 2011b. Replication attack mitigations for static and mobile WSN. Int. J. Netw. Security Appli., 3: 122-133. DOI: 10.5121/ijnsa.2011.3210
    • (2011) Int. J. Netw. Security Appli. , vol.3 , pp. 122-133
    • Manjula, V.1    Chellappan, C.2
  • 12
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • May 8-11, IEEE Xplore Press, DOI: 10.1109/SP.2005.8
    • Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, IEEE Xplore Press, pp: 49-63. DOI: 10.1109/SP.2005.8
    • (2005) Proceedings of the IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 14
    • 84899335165 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks
    • Nov. 17-19, ACM Press, Maui, HI, USA
    • Sei, Y. and S. Honiden, 2008. Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Proceedings of the 4th Annual International Conference on Wireless Internet, Nov. 17-19, ACM Press, Maui, HI, USA.
    • (2008) Proceedings of the 4th Annual International Conference on Wireless Internet
    • Sei, Y.1    Honiden, S.2
  • 15
    • 70349103764 scopus 로고    scopus 로고
    • Reporter node determination of replicated node detection in wireless sensor networks
    • Jan. 15-16, ACM Press, Suwon, Republic of Korea,DOI: 10.1145/1516241.1516340
    • Sei, Y. and S. Honiden, 2009. Reporter node determination of replicated node detection in wireless sensor networks. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Jan. 15-16, ACM Press, Suwon, Republic of Korea, pp: 566-573.DOI: 10.1145/1516241.1516340
    • (2009) Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication , pp. 566-573
    • Sei, Y.1    Honiden, S.2
  • 17
    • 79952798742 scopus 로고    scopus 로고
    • Random-walk based approach to detect clone attacks in wireless sensor networks
    • DOI: 10.1109/JSAC.2010.100606
    • Zeng, Y. J. Cao, S. Zhang, S. Guo and L. Xie, 2010. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J. Sel. Areas Commun., 28: 677-691. DOI: 10.1109/JSAC.2010.100606
    • (2010) IEEE J. Sel. Areas Commun. , vol.28 , pp. 677-691
    • Zeng, Y.1    Cao, J.2    Zhang, S.3    Guo, S.4    Xie, L.5
  • 18
    • 48649109631 scopus 로고    scopus 로고
    • Efficient distributed detection of node replication attacks in sensor networks
    • Dec. 10-14, IEEE Xplore Press, Miami Beach, FL., DOI: 10.1109/ACSAC.2007.26
    • Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, Dec. 10-14, IEEE Xplore Press, Miami Beach, FL., pp: 257-267. DOI: 10.1109/ACSAC.2007.26
    • (2007) Proceedings of the 23rd Annual Computer Security Applications Conference , pp. 257-267
    • Zhu, B.1    Addada, V.G.K.2    Setia, S.3    Jajodia, S.4    Roy, S.5
  • 19
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Oct. 27-30, ACM Press, Washington, DC, USA.,DOI: 10.1145/948109.948120
    • Zhu, S., S. Setia and S. Jajodia, 2003. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 27-30, ACM Press, Washington, DC, USA., pp: 62-72.DOI: 10.1145/948109.948120
    • (2003) Proceedings of the 10th ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.