메뉴 건너뛰기




Volumn 5, Issue 3, 2013, Pages 178-185

Secure routing optimization in hierarchical Cluster-Based wireless sensor networks

Author keywords

Cluster based wireless sensor networks; Hierarchical intrusion detection system; Secure routing protocols

Indexed keywords


EID: 84890184282     PISSN: 20760930     EISSN: 2073607X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (14)

References (26)
  • 2
    • 84862307531 scopus 로고    scopus 로고
    • Energy and throughput analysis of Hierarchical routing protocol (LEACH) for wireless sensor network
    • April
    • R. Patel, S. Pariyani, V. Ukani, "Energy and throughput analysis of Hierarchical routing protocol (LEACH) for wireless sensor network," International Journal of Computer Applications, Vol. 20, No. 4, pp. 32-36, April 2011.
    • (2011) International Journal of Computer Applications , vol.20 , Issue.4 , pp. 32-36
    • Patel, R.1    Pariyani, S.2    Ukani, V.3
  • 5
    • 51949089156 scopus 로고    scopus 로고
    • PEGASIS: power-efficient gathering in sensor information systems
    • S. Lindsey, C. Raghavendra, "PEGASIS: power-efficient gathering in sensor information systems", IEEE Aerospace Conference, pp. 1125-1130, 2002.
    • (2002) IEEE Aerospace Conference , pp. 1125-1130
    • Lindsey, S.1    Raghavendra, C.2
  • 6
    • 79959697645 scopus 로고    scopus 로고
    • HEEP (hybrid energy efficient protocol) based chain clustering
    • D. E. Boubiche, A. Bilami, HEEP (hybrid energy efficient protocol) based chain clustering, Int. J. Sensor Networks, vol. 10, No. 1/2, pp. 25-35, 2011.
    • (2011) Int. J. Sensor Networks , vol.10 , Issue.1-2 , pp. 25-35
    • Boubiche, D.E.1    Bilami, A.2
  • 8
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • University of California at Berkeley
    • C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," University of California at Berkeley, 2003.
    • (2003)
    • Karlof, C.1    Wagner, D.2
  • 9
    • 24644507953 scopus 로고    scopus 로고
    • On the security of cluster-based communication protocols for wireless sensor networks
    • Berlin
    • A. C. Ferreira, et al, "On the security of cluster-based communication protocols for wireless sensor networks", Fourth IEEE International Conference on Networking (ICNŠ), Berlin, pp. 449-458, 2005.
    • (2005) Fourth IEEE International Conference on Networking (ICNŠ) , pp. 449-458
    • Ferreira, A.C.1
  • 11
    • 77649289647 scopus 로고    scopus 로고
    • A secure routing protocol for cluster-based wireless sensor networks using group key management
    • K. Zhang, C. Wang, C. Wang, "A secure routing protocol for cluster-based wireless sensor networks using group key management", IEEE Computer Society, pp. 1-5, 2008.
    • (2008) IEEE Computer Society , pp. 1-5
    • Zhang, K.1    Wang, C.2    Wang, C.3
  • 15
    • 11144229255 scopus 로고    scopus 로고
    • General method of program code obfusction
    • Research and Practise (SERP), June
    • G. Wroblewski, "General method of program code obfusction," Proc. Int'l Conf. Software Eng. Research and Practise (SERP), June 2002.
    • (2002) Proc. Int'l Conf. Software Eng.
    • Wroblewski, G.1
  • 16
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • May/June
    • T. Park, S. Member, K. G. Shin, "Soft tamper-proofing via program integrity verification in wireless sensor networks," IEEE Transactions on mobile computing, vol. 4, No. 3, pp. 297-308, May/June 2005.
    • (2005) IEEE Transactions on mobile computing , vol.4 , Issue.3 , pp. 297-308
    • Park, T.1    Member, S.2    Shin, K.G.3
  • 17
    • 84881313532 scopus 로고    scopus 로고
    • http://cordis.europa.eu/projects/rcn/95511_en.html. [18]A. Abduvaliyev, et al, "On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237, 2013.
  • 18
    • 84881313532 scopus 로고    scopus 로고
    • On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks
    • A. Abduvaliyev, et al, "On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237, 2013.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.3 , pp. 1223-1237
    • Abduvaliyev, A.1
  • 20
    • 84888997678 scopus 로고    scopus 로고
    • Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
    • Intelligence, Systems and Applications (IISA), Piraeus, July
    • E. Darra, S. K. Katsikas, "Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks", IEEE Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), Piraeus, 10-12 July 2013
    • (2013) IEEE Fourth International Conference on Information , pp. 10-12
    • Darra, E.1    Katsikas, S.K.2
  • 22
    • 78651576751 scopus 로고    scopus 로고
    • An isolation intrusion detection system for hierarchical wireless sensor networks
    • March
    • R. C. Chen, C. F. Hsieh, Y. F. Huang, "An isolation intrusion detection system for hierarchical wireless sensor networks," Journal of networks, vol. 5, No. 3, pp. 335-342, March 2010.
    • (2010) Journal of networks , vol.5 , Issue.3 , pp. 335-342
    • Chen, R.C.1    Hsieh, C.F.2    Huang, Y.F.3
  • 25
    • 79952929509 scopus 로고    scopus 로고
    • A survey on secure hierarchical routing protocols in wireless sensor networks
    • India, February
    • S. Sharma, S. Kumar, "A survey on secure hierarchical routing protocols in wireless sensor networks," proceedings of ACM ICCCS'11, India, pp. 146-151, February 2011.
    • (2011) proceedings of ACM ICCCS'11 , pp. 146-151
    • Sharma, S.1    Kumar, S.2
  • 26
    • 84890131483 scopus 로고    scopus 로고
    • The MIT uAMPSns code extensions, Version 1.0
    • Cambridge, August
    • The MIT uAMPSns code extensions, Version 1.0, Massachusetts Institute of Technology. Cambridge, August, 2000.
    • (2000) Massachusetts Institute of Technology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.