메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

Author keywords

Algorithm; Node compromising attack; Node replication attack; Security; Wireless sensor networks

Indexed keywords

ALGORITHMS; DENIAL-OF-SERVICE ATTACK; WIRELESS SENSOR NETWORKS;

EID: 84899335165     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/ICST.WICON2008.4796     Document Type: Conference Paper
Times cited : (13)

References (23)
  • 1
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryptionwithout pairings
    • Dan Boneh, Craig Gentry, and Michael Hamburg. Space-efficient identity based encryptionwithout pairings. In IEEE FOCS, pages 647–657, 2007.
    • (2007) IEEE FOCS , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 2
    • 29844437116 scopus 로고    scopus 로고
    • Localization and routing in sensor networks by local angle information
    • Jehoshua Bruck, Jie Gao, and Anxiao (Andrew) Jiang. Localization and routing in sensor networks by local angle information. In ACM MOBIHOC, pages 181–192, 2005.
    • (2005) ACM MOBIHOC , pp. 181-192
    • Bruck, J.1    Gao, J.2    Jiang, A.3
  • 4
    • 85066747604 scopus 로고    scopus 로고
    • Local leader election, signal strength aware flooding, and routeless routing
    • Gilbert Chen, Joel W. Branch, and Boleslaw K. Szymanski. Local leader election, signal strength aware flooding, and routeless routing. In IEEE IPDPS, page 244.1, 2005.
    • (2005) IEEE IPDPS , pp. 2441
    • Chen, G.1    Branch, J.W.2    Szymanski, B.K.3
  • 5
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In ACM MobiHoc, pages 80–89, 2007.
    • (2007) ACM MobiHoc , pp. 80-89
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 6
    • 57349117607 scopus 로고    scopus 로고
    • Self-monitoring for sensor networks
    • Dezun Dong, Yunhao Liu, and Xiangke Liao. Self-monitoring for sensor networks. In ACM MobiHoc, pages 431–440, 2008.
    • (2008) ACM MobiHoc , pp. 431-440
    • Dong, D.1    Liu, Y.2    Liao, X.3
  • 7
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 8
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • Brad Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM, pages 243–254, 2000.
    • (2000) ACM MOBICOM , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 9
    • 40049091352 scopus 로고    scopus 로고
    • On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
    • Jooyoung Lee and Douglas R. Stinson. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur., 1(2):1094–9224, 2008.
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.1 , Issue.2 , pp. 1094-9224
    • Lee, J.1    Stinson, D.R.2
  • 10
    • 42149172778 scopus 로고    scopus 로고
    • Group-based key predistribution for wireless sensor networks
    • Donggang Liu, Peng Ning, and Wenliang Du. Group-based key predistribution for wireless sensor networks. ACM Trans. Sen. Netw., 4(2):1550–4859, 2008.
    • (2008) ACM Trans. Sen. Netw. , vol.4 , Issue.2 , pp. 1550-4859
    • Liu, D.1    Ning, P.2    Du, W.3
  • 11
    • 34548299969 scopus 로고    scopus 로고
    • Envirostore: A cooperative storage system for disconnected operation in sensor networks
    • Liqian Luo, Chengdu Huang, Tarek F. Abdelzaher, and Jack Stankovic. Envirostore: A cooperative storage system for disconnected operation in sensor networks. In IEEE INFOCOM, pages 1802–1810, 2007.
    • (2007) IEEE INFOCOM , pp. 1802-1810
    • Luo, L.1    Huang, C.2    Abdelzaher, T.F.3    Stankovic, J.4
  • 12
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MOBICOM, pages 255–265, 2000.
    • (2000) ACM MOBICOM , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 13
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses. In ACM IPSN, pages 259–268, 2004.
    • (2004) ACM IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 14
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating dos attacks against broadcast authentication in wireless sensor networks
    • Peng Ning, An Liu, and Wenliang Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1):1–35, 2008.
    • (2008) ACM Trans. Sen. Netw. , vol.4 , Issue.1 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 15
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE S&P, pages 49–63, 2005.
    • (2005) IEEE S&P , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 17
    • 38349177828 scopus 로고    scopus 로고
    • Secure and fault-tolerant event boundary detection in wireless sensor networks
    • Kui Ren, Kai Zeng, and Wenjing Lou. Secure and fault-tolerant event boundary detection in wireless sensor networks. IEEE Transactions on Wireless Communications, 7:354–363, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , pp. 354-363
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84 on Advances in cryptology, pages 47–53, 1985.
    • (1985) CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 19
    • 34547442398 scopus 로고    scopus 로고
    • Stardust: A flexible architecture for passive localization in wireless sensor networks
    • Radu Stoleru, Pascal Vicaire, Tian He, and John A. Stankovic. Stardust: A flexible architecture for passive localization in wireless sensor networks. In ACM SENSYS, pages 57–70, 2006.
    • (2006) ACM SENSYS , pp. 57-70
    • Stoleru, R.1    Vicaire, P.2    He, T.3    Stankovic, J.A.4
  • 20
    • 56749158656 scopus 로고    scopus 로고
    • Secure multi-hop network programming with multiple one-way key chains
    • Hailun Tan, Sanjay Jha, Diet Ostry, John Zic, and Vijay Sivaraman. Secure multi-hop network programming with multiple one-way key chains. In ACM WiSec, pages 183–193, 2008.
    • (2008) ACM WiSec , pp. 183-193
    • Tan, H.1    Jha, S.2    Ostry, D.3    Zic, J.4    Sivaraman, V.5
  • 21
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Anthony D. Wood and John A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54–62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 22
    • 33144479525 scopus 로고    scopus 로고
    • SCAN: Self-organized network layer security in mobile ad hoc networks
    • Hao Yang, James Shu, Xiaoqiao Meng, and Songwu Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261–273, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 261-273
    • Yang, H.1    Shu, J.2    Meng, X.3    Lu, S.4
  • 23
    • 48649109631 scopus 로고    scopus 로고
    • Efficient distributed detection of node replication attacks in sensor networks
    • Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, and Sankardas Roy. Efficient distributed detection of node replication attacks in sensor networks. In IEEE ACSAC, pages 257–267, 2007.
    • (2007) IEEE ACSAC , pp. 257-267
    • Zhu, B.1    Addada, V.G.K.2    Setia, S.3    Jajodia, S.4    Roy, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.