메뉴 건너뛰기




Volumn , Issue , 2014, Pages 130-134

Secure clustering and reliable multi-path route discovering in wireless sensor networks

Author keywords

Functional trust; Reliable routing; Residual energy; Secure clustering; Wireless sensor networks

Indexed keywords

NETWORK ARCHITECTURE; PARALLEL ARCHITECTURES; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84907927216     PISSN: 21683034     EISSN: 21683042     Source Type: Conference Proceeding    
DOI: 10.1109/PAAP.2014.41     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 1
    • 56949096891 scopus 로고    scopus 로고
    • Group-based intrusion detection system in wireless sensor networks
    • Guorui Li, Jingsha He, Yingfang Fu, "Group-based intrusion detection system in wireless sensor networks," Computer Communications, vol. 31, pp. 4324-4332, 2008.
    • (2008) Computer Communications , vol.31 , pp. 4324-4332
    • Li, G.1    He, J.2    Fu, Y.3
  • 2
    • 64449088975 scopus 로고    scopus 로고
    • SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    • S. Madria, Jian Yin, "SeRWA: a secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, pp. 1051-1063, 2009.
    • (2009) Ad Hoc Networks , vol.7 , pp. 1051-1063
    • Madria, S.1    Yin, J.2
  • 3
    • 40049089636 scopus 로고    scopus 로고
    • A general key seed management and assignment model for wireless sensor networks and application
    • Tao Feng, Jianfeng Ma, "A general key seed management and assignment model for wireless sensor networks and application," Journal of Computer Research and Development, vol. 45, no. 1, pp. 146-153, 2008.
    • (2008) Journal of Computer Research and Development , vol.45 , Issue.1 , pp. 146-153
    • Feng, T.1    Ma, J.2
  • 4
    • 34547637688 scopus 로고    scopus 로고
    • Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system
    • P. Resnick, R. Zeckhauser, "Trust among strangers in internet transactions: empirical analysis of eBay's reputation system," Advances in Applied Microeconomics, vol. 11, pp. 127-157, 2002.
    • (2002) Advances in Applied Microeconomics , vol.11 , pp. 127-157
    • Resnick, P.1    Zeckhauser, R.2
  • 5
    • 18844362199 scopus 로고    scopus 로고
    • Secure location: Routing on trust and isolating compromised sensors in location-aware sensor networks
    • Los Angeles, California, USA 5-7 November
    • S. Tanachaiwiwat, P. Dave, R. H. Bhindwale, "Secure location: routing on trust and isolating compromised sensors in location-aware sensor networks," In: 1st ACM Conf. Embedded Networked Sensor Systems (SenSys 2003), Los Angeles, California, USA, pp. 324-325, 5-7 November 2003.
    • (2003) 1st ACM Conf. Embedded Networked Sensor Systems (SenSys 2003) , pp. 324-325
    • Tanachaiwiwat, S.1    Dave, P.2    Bhindwale, R.H.3
  • 7
    • 33745820773 scopus 로고    scopus 로고
    • Trust management for resilient wireless sensor networks
    • Berlin, Heidelberg: Springer-Verlag
    • J. Hur, Y. Lee, S. M. Hong, H. Yoon, "Trust management for resilient wireless sensor networks," In Proc. of the ICISC 2005. LNCS 3935, Berlin, Heidelberg: Springer-Verlag, pp. 56-68, 2006.
    • (2006) Proc. of the ICISC 2005. LNCS , vol.3935 , pp. 56-68
    • Hur, J.1    Lee, Y.2    Hong, S.M.3    Yoon, H.4
  • 8
    • 84907936141 scopus 로고    scopus 로고
    • Functional-trust based security data aggregation method in wireless sensor networks
    • Yinghong Mo, Cheng Zhong, Jinhui Tang, Xihua Wu, "Functional-trust based security data aggregation method in wireless sensor networks," Journal of Chinese Computer Systems, vol. 31, no. 1, pp. 80-84, 2011.
    • (2011) Journal of Chinese Computer Systems , vol.31 , Issue.1 , pp. 80-84
    • Mo, Y.1    Zhong, C.2    Tang, J.3    Wu, X.4
  • 9
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li, "Trust mechanisms in wireless sensor networks: attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 10
    • 84856274467 scopus 로고    scopus 로고
    • Design and implementation of TARF: A trust-aware routing framework for WSNs
    • Guoxing Zhan, Weisong Shi, J. Deng, "Design and implementation of TARF: a trust-aware routing framework for WSNs," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, 2012.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.2 , pp. 184-197
    • Zhan, G.1    Shi, W.2    Deng, J.3
  • 11
    • 84864271933 scopus 로고    scopus 로고
    • A secure routing protocol for wireless sensor networks with consideration of energy efficiency
    • Maui, Hawaii, USA, 16-20April
    • HueiWen Ferng, D. Rachmarini, "A secure routing protocol for wireless sensor networks with consideration of energy efficiency," In Proc. of 2012 IEEE Network Operations and Management Symposium, Maui, Hawaii, USA, pp. 105-112, 16-20April 2012.
    • (2012) Proc. of 2012 IEEE Network Operations and Management Symposium , pp. 105-112
    • Ferng, H.1    Rachmarini, D.2
  • 13
    • 84873959722 scopus 로고    scopus 로고
    • A real-time empirical study of BIOSARP based wireless sensor network testbed
    • Taipei, China, 28-31 October
    • K. Saleem, N. Fisal, M. A. Baharudin, "A real-time empirical study of BIOSARP based wireless sensor network testbed," In Proc. of 11th IEEE Sensors, Taipei, China, pp. 1-4, 28-31 October 2012.
    • (2012) Proc. of 11th IEEE Sensors , pp. 1-4
    • Saleem, K.1    Fisal, N.2    Baharudin, M.A.3
  • 14
    • 84878718640 scopus 로고    scopus 로고
    • Analysis of secure LEACH-based clustering protocols in wireless sensor networks
    • M. Masdari, S. M. Bazarchi, M. Bidaki, "Analysis of secure LEACH-based clustering protocols in wireless sensor networks," Journal of Network and Computer Applications, vol. 36, no. 4, pp. 1243-1260, 2013.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.4 , pp. 1243-1260
    • Masdari, M.1    Bazarchi, S.M.2    Bidaki, M.3
  • 17
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802. 11 distributed coordination function
    • G. Bianchi, "Performance analysis of the IEEE 802. 11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535-547, 2000.
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.