메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2436-2444

ERCD: An energy-efficient clone detection protocol in WSNs

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS AND SIMULATION; ATTACK DETECTION; COST CONSTRAINTS; HOSTILE ENVIRONMENTS; LOCATION INFORMATION; NETWORK LIFETIME; TELEMEDICINE SERVICES; WIRELESS SENSOR NETWORK (WSNS);

EID: 84883102097     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6567049     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 1
    • 79953785474 scopus 로고    scopus 로고
    • Grs: The green, reliability, and security of emerging machine to machine communications
    • Apr.
    • R. Lu, X. Li, X. Liang, X. Shen, and X. Lin. Grs: The green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine, 49(4):28-35, Apr. 2011.
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.4    Lin, X.5
  • 3
    • 84862810099 scopus 로고
    • Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks
    • May
    • A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen. Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks. Computer Networks, 56(7):1951-1967, May. 2012.
    • (1967) Computer Networks , vol.56 , Issue.7 , pp. 1951-2012
    • Liu, A.1    Ren, J.2    Li, X.3    Chen, Z.4    Shen, X.5
  • 4
    • 77952986444 scopus 로고    scopus 로고
    • Secure data collection in wireless sensor networks using randomized dispersive routes
    • Jul.
    • T. Shu, M. Krunz, and S. Liu. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9(7):941-954, Jul. 2010.
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.7 , pp. 941-954
    • Shu, T.1    Krunz, M.2    Liu, S.3
  • 5
    • 77956217417 scopus 로고    scopus 로고
    • A randomized countermeasure against parasitic adversaries in wireless sensor networks
    • Sep.
    • P. Papadimitratos, J. Luo, and J. P. Hubaux. A randomized countermeasure against parasitic adversaries in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 28(7):1036-1045, Sep. 2010.
    • (2010) IEEE Journal on Selected Areas in Communications , vol.28 , Issue.7 , pp. 1036-1045
    • Papadimitratos, P.1    Luo, J.2    Hubaux, J.P.3
  • 6
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in vanets
    • Jan.
    • R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology, 61(1):86-96, Jan. 2012.
    • (2012) IEEE Transactions on Vehicular Technology , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, T.H.3    Liang, X.4    Shen, X.5
  • 7
    • 80053528646 scopus 로고    scopus 로고
    • An early warning system against malicious activities for smart grid communications
    • May.
    • Z. M. Fadlullah, M. Fouda, N. Kato, X. Shen, and Y. Nozaki. An early warning system against malicious activities for smart grid communications. IEEE Network, 25(5):50-55, May. 2011.
    • (2011) IEEE Network , vol.25 , Issue.5 , pp. 50-55
    • Fadlullah, Z.M.1    Fouda, M.2    Kato, N.3    Shen, X.4    Nozaki, Y.5
  • 8
    • 84857789593 scopus 로고    scopus 로고
    • A dynamic privacy-preserving key management scheme for location based services in vanets
    • Jan.
    • R. Lu, X. Lin, X. Liang, and X. Shen. A dynamic privacy-preserving key management scheme for location based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1):127-139, Jan. 2012.
    • (2012) IEEE Transactions on Intelligent Transportation Systems , vol.13 , Issue.1 , pp. 127-139
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 9
    • 82555196697 scopus 로고    scopus 로고
    • Becan: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
    • Jan.
    • R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen. Becan: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1):32-43, Jan. 2012.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.1 , pp. 32-43
    • Lu, R.1    Lin, X.2    Zhu, H.3    Liang, X.4    Shen, X.5
  • 10
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Oakland, CA, USA, May. 8-11
    • B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pages 49-63, Oakland, CA, USA, May. 8-11 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 11
  • 12
    • 77952973912 scopus 로고    scopus 로고
    • Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
    • Jul.
    • B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang. Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Transactions on Mobile Computing, 9(7):913-926, Jul. 2010.
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.7 , pp. 913-926
    • Zhu, B.1    Setia, S.2    Jajodia, S.3    Roy, S.4    Wang, L.5
  • 15
    • 84861627279 scopus 로고    scopus 로고
    • Di-sec: A distributed security framework for heterogeneous wireless sensor networks
    • Orlando, FL, USA, Mar. 25-30
    • M. Valero, S. S. Jung, U. A. Selcuk, Y. S. Li, and R. Beyah. Di-sec: A distributed security framework for heterogeneous wireless sensor networks. In IEEE INFOCOM, pages 585-593, Orlando, FL, USA, Mar. 25-30 2012.
    • (2012) IEEE INFOCOM , pp. 585-593
    • Valero, M.1    Jung, S.S.2    Selcuk, U.A.3    Li, Y.S.4    Beyah, R.5
  • 16
    • 84859199325 scopus 로고    scopus 로고
    • A trigger identification service for defending reactive jammers in wsn
    • May.
    • Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai. A trigger identification service for defending reactive jammers in wsn. IEEE Transactions on Mobile Computing, 11(5):793-806, May. 2012.
    • (2012) IEEE Transactions on Mobile Computing , vol.11 , Issue.5 , pp. 793-806
    • Xuan, Y.1    Shen, Y.2    Nguyen, N.P.3    Thai, M.T.4
  • 17
    • 84861587761 scopus 로고    scopus 로고
    • Energy-efficient intrusion detection with a barrier of probabilistic sensors
    • Orlando, FL, USA, Mar. 25-30
    • J. Li, J. Chen, and T. H. Lai. Energy-efficient intrusion detection with a barrier of probabilistic sensors. In IEEE INFOCOM, pages 118-126, Orlando, FL, USA, Mar. 25-30 2012.
    • (2012) IEEE INFOCOM , pp. 118-126
    • Li, J.1    Chen, J.2    Lai, T.H.3
  • 19
    • 61349128574 scopus 로고    scopus 로고
    • Analysis of per-node traffic load in multi-hop wireless sensor networks
    • Feb.
    • Q. Chen, S. S. Kanhere, and M. Hassan. Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications, 8(2):958-967, Feb. 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.2 , pp. 958-967
    • Chen, Q.1    Kanhere, S.S.2    Hassan, M.3
  • 20
    • 80052745543 scopus 로고    scopus 로고
    • Distributed clone detection in wireless sensor networks: An optimization approach
    • Lucca, IT, Jun. 20-23
    • T. Bonaci, P. Lee, L. Bushnell, and R. Poovendran. Distributed clone detection in wireless sensor networks: An optimization approach. In IEEE WoWMoM, pages 1-6, Lucca, IT, Jun. 20-23 2011.
    • (2011) IEEE WoWMoM , pp. 1-6
    • Bonaci, T.1    Lee, P.2    Bushnell, L.3    Poovendran, R.4
  • 22
    • 80051666129 scopus 로고    scopus 로고
    • Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks
    • Oct.
    • A. Liu, P. Zhang, and Z. Chen. Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. Journal of Parallel and Distributed Computing, 71(10):1327-1355, Oct. 2011.
    • (2011) Journal of Parallel and Distributed Computing , vol.71 , Issue.10 , pp. 1327-1355
    • Liu, A.1    Zhang, P.2    Chen, Z.3
  • 23
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, CA, USA, May 11-14
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, CA, USA, May 11-14 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 24
    • 76349123798 scopus 로고    scopus 로고
    • Distributed routing in wireless sensor networks using energy welfare metric
    • May.
    • C. Ok, S. Lee, P. Mitra, and S. Kumara. Distributed routing in wireless sensor networks using energy welfare metric. Information Sciences, 180(9):1656-1670, May. 2010.
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1656-1670
    • Ok, C.1    Lee, S.2    Mitra, P.3    Kumara, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.