메뉴 건너뛰기




Volumn 24, Issue 4, 2013, Pages 401-412

Energy-efficient physical layer packet authenticator for machine-to-machine networks

Author keywords

[No Author keywords available]

Indexed keywords

ENERGY CONSERVATION; NETWORK LAYERS;

EID: 84890506273     PISSN: 1124318X     EISSN: 15418251     Source Type: Journal    
DOI: 10.1002/ett.2653     Document Type: Article
Times cited : (4)

References (17)
  • 1
    • 79953899288 scopus 로고    scopus 로고
    • On the security of an enhanced UMTS authentication and key agreement protocol
    • DOI: 10.1002/ett.1460. http://dx. doi.org/10.1002/ett.1460
    • Hwang MS, Chong SK, Ou HH. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22(3): 99-112. DOI: 10.1002/ett.1460. http://dx. doi.org/10.1002/ett.1460.
    • (2011) European Transactions on Telecommunications , vol.22 , Issue.3 , pp. 99-112
    • Hwang, M.S.1    Chong, S.K.2    Ou, H.H.3
  • 2
    • 77953155482 scopus 로고    scopus 로고
    • Trust management in wireless sensor networks
    • DOI: 10.1002/ett.1413. http://dx.doi.org/10. 1002/ett.1413
    • Zahariadis T, Leligou HC, Trakadas P, Voliotis S. Trust management in wireless sensor networks. European Transactions on Telecommunications 2010; 21(4): 386-395. DOI: 10.1002/ett.1413. http://dx.doi.org/10. 1002/ett.1413.
    • (2010) European Transactions on Telecommunications , vol.21 , Issue.4 , pp. 386-395
    • Zahariadis, T.1    Leligou, H.C.2    Trakadas, P.3    Voliotis, S.4
  • 3
    • 84872290581 scopus 로고    scopus 로고
    • Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols
    • DOI: 10.1002/ett.2514
    • Lv C, Li H, Ma J, Zhang Y. Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Transactions on Emerging Telecommunications Technologies 2012; 23: 618-624. DOI: 10.1002/ett.2514. http://dx.doi.org/10.1002/ett.2514.
    • (2012) Transactions on Emerging Telecommunications Technologies , vol.23 , pp. 618-624
    • Lv, C.1    Li, H.2    Ma, J.3    Zhang, Y.4
  • 4
    • 84863724608 scopus 로고    scopus 로고
    • Secure DVHop localization scheme against wormhole attacks in wireless sensor networks
    • DOI: 10.1002/ett.1532
    • Labraoui N, Gueroui M, Aliouat M. Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. European Transactions on Telecommunications 2012; 23: 303-316. DOI: 10.1002/ett.1532. http://dx.doi.org/10.1002/ett.1532.
    • (2012) European Transactions on Telecommunications , vol.23 , pp. 303-316
    • Labraoui, N.1    Gueroui, M.2    Aliouat, M.3
  • 5
    • 84867316916 scopus 로고    scopus 로고
    • Combating channel eviction triggering denial-of-service attacks in cognitive radio networks
    • DOI: 10.1002/ett.2502. http://dx.doi.org/10. 1002/ett.2502
    • Sodagari S, Attar A, Leung VCM, Bilen SG. Combating channel eviction triggering denial-of-service attacks in cognitive radio networks. Transactions on Emerging Telecommunications Technologies 2012; 23: 454-465. DOI: 10.1002/ett.2502. http://dx.doi.org/10. 1002/ett.2502.
    • (2012) Transactions on Emerging Telecommunications Technologies , vol.23 , pp. 454-465
    • Sodagari, S.1    Attar, A.2    Vcm, L.3    Bilen, S.G.4
  • 6
    • 79959538975 scopus 로고    scopus 로고
    • Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview
    • DOI: 10.1002/ett.1466. http://dx.doi. org/10.1002/ett.1466
    • Ishmanov F, Malik AS, Kim SW. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications 2011; 22(4): 151-167. DOI: 10.1002/ett.1466. http://dx.doi. org/10.1002/ett.1466.
    • (2011) European Transactions on Telecommunications , vol.22 , Issue.4 , pp. 151-167
    • Ishmanov, F.1    Malik, A.S.2    Kim, S.W.3
  • 7
    • 80054758212 scopus 로고    scopus 로고
    • A combined approach for distinguishing different types of jamming attacks against wireless networks 2011
    • Computers and Signal Processing (PacRim), Victoria, Canada, August DOI: 10.1109/PACRIM.2011.6032998
    • Wang L, Wyglinski A. A combined approach for distinguishing different types of jamming attacks against wireless networks, In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), Victoria, Canada, August 2011; 809-814, DOI: 10.1109/PACRIM.2011.6032998.
    • (2011) IEEE Pacific Rim Conference on Communications , pp. 809-814
    • Wang, L.1    Wyglinski, A.2
  • 9
    • 78751642052 scopus 로고    scopus 로고
    • Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
    • DOI: 10.1016/j.comcom.2010.04.008. Special Issue of Computer Communications on Information and Future Communication Security
    • Baig ZA. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications 2011; 34(3): 468-484. DOI: 10.1016/j.comcom.2010.04.008. Special Issue of Computer Communications on Information and Future Communication Security.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 468-484
    • Baig, Z.A.1
  • 10
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • DOI: 10.1109/COMST.2006.315852
    • Wang Y, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials 2006; 8(2): 2-23. DOI: 10.1109/COMST.2006.315852.
    • (2006) IEEE Communications Surveys Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 11
    • 70349308780 scopus 로고    scopus 로고
    • Analysis of security threats, requirements, technologies and standards in wireless sensor networks
    • Aldini A, Barthe G, Gorrieri R (eds), Lecture Notes in Computer Science Springer: Berlin/Heidelberg
    • Lopez J, Roman R, Alcaraz C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, Vol. 5705, Aldini A, Barthe G, Gorrieri R (eds), Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, 2009; 289-338.
    • (2009) Foundations of Security Analysis and Design v , vol.5705 , pp. 289-338
    • Lopez, J.1    Roman, R.2    Alcaraz, C.3
  • 13
    • 77951607839 scopus 로고    scopus 로고
    • An efficient post-deployment key establishment scheme for heterogeneous sensor networks
    • GLOBECOM 2009 IEEE, Hawaii, USA DOI: 10.1109/GLOCOM.2009.5425551
    • Loree P, Nygard K, Du X. An efficient post-deployment key establishment scheme for heterogeneous sensor networks, In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, Hawaii, USA, 2009; 1-6, DOI: 10.1109/GLOCOM.2009.5425551.
    • (2009) Global Telecommunications Conference , vol.2009 , pp. 1-6
    • Loree, P.1    Nygard, K.2    Du, X.3
  • 14
    • 84866377144 scopus 로고    scopus 로고
    • Pairwise post deployment key management scheme for heterogeneous sensor networks
    • Mobile and Multimedia Networks (WoWMoM), San Francisco, USA DOI: 10.1109/WoWMoM.2012.6263741
    • Gagneja K. Pairwise post deployment key management scheme for heterogeneous sensor networks, In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, USA, 2012; 1-2, DOI: 10.1109/WoWMoM.2012.6263741.
    • (2012) 2012 IEEE International Symposium on A World of Wireless , pp. 1-2
    • Gagneja, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.