메뉴 건너뛰기




Volumn 4308 LNCS, Issue , 2006, Pages 509-521

Location verification based defense against sybil attack in sensor networks

Author keywords

Location verification; Security; Sybil attack; Triangulation; Wireless sensor network

Indexed keywords

LOCATION VERIFICATION; MISBEHAVIOR DETECTION; MULTIPLE IDENTITIES; SECURITY; SENSOR NETWORK APPLICATIONS; STATIC SENSOR NODES; SYBIL ATTACK;

EID: 84885193893     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11947950_56     Document Type: Conference Paper
Times cited : (11)

References (10)
  • 1
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. "Using encryption for authentication in large networks of computers", In Communications of the ACM, pages 993-999, 1978.
    • (1978) Communications of the ACM , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 2
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco. "Timestamps in key distribution protocols". In Communications of the ACM, 25:533-536, 1982.
    • (1982) Communications of the ACM , vol.25 , pp. 533-536
    • Denning, D.1    Sacco, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.