메뉴 건너뛰기




Volumn 64, Issue 1, 2015, Pages 4-18

A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems

Author keywords

and polynomial based en route filtering; Cyber physical networked system; data injection attack; sensor networks

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; POLYNOMIALS; SENSOR NETWORKS; SENSOR NODES;

EID: 84919466772     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2013.177     Document Type: Article
Times cited : (88)

References (30)
  • 1
    • 84919493647 scopus 로고    scopus 로고
    • (2010). CPS Week [Online]. Available: http://www.cpsweek2010.se/
    • (2010) CPS Week
  • 2
    • 79960924365 scopus 로고    scopus 로고
    • From wireless sensor networks towards cyber physical systems
    • Aug.
    • F. Wu, Y. Kao, and Y. Tseng, "From wireless sensor networks towards cyber physical systems," Pervasive Mobile Comput., vol. 7, no. 4, pp. 397-413, Aug. 2011.
    • (2011) Pervasive Mobile Comput. , vol.7 , Issue.4 , pp. 397-413
    • Wu, F.1    Kao, Y.2    Tseng, Y.3
  • 4
    • 84872446684 scopus 로고    scopus 로고
    • Robust architectures for embedded wireless network control and actuations
    • article no. 82, Dec.
    • M. Pajic, A. Chernoguzov, and R. Mangharam, "Robust architectures for embedded wireless network control and actuations," Trans. Embedded Comput. Syst., vol. 11, no. 4, article no. 82, Dec. 2012.
    • Trans. Embedded Comput. Syst. , vol.11 , Issue.4 , pp. 2012
    • Pajic, M.1    Chernoguzov, A.2    Mangharam, R.3
  • 7
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, 2003.
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 9
    • 77953307472 scopus 로고    scopus 로고
    • From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
    • K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. 29th Conf. Inf. Commun. (INFOCOM), 2010, pp. 1595-1603.
    • (2010) Proc. 29th Conf. Inf. Commun. (INFOCOM) , pp. 1595-1603
    • Xing, K.1    Cheng, X.2
  • 13
    • 17144429277 scopus 로고    scopus 로고
    • Statistical en-route filtering of injection false data in sensor networks
    • Apr.
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injection false data in sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 839-850, Apr. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.4 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 15
    • 70349653217 scopus 로고    scopus 로고
    • Grouping-based resilient statistical en-route filtering for sensor networks
    • L. Yu and J. Li, "Grouping-based resilient statistical en-route filtering for sensor networks," in Proc. 28th IEEE Int. Conf. Comput. Commun. (INFOCOM), 2009, pp. 1782-1790.
    • (2009) Proc. 28th IEEE Int. Conf. Comput. Commun. (INFOCOM) , pp. 1782-1790
    • Yu, L.1    Li, J.2
  • 16
    • 41449098948 scopus 로고    scopus 로고
    • Leds: Providing location-aware endto-end data security in wireless sensor networks
    • May
    • K. Ren, W. Lou, and Y. Zhang, "Leds: Providing location-aware endto-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 17
    • 34548390509 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks," ACM Trans. Sensor Netw., vol. 3, no. 4, pp. 259-271, 2007.
    • (2007) ACM Trans. Sensor Netw. , vol.3 , Issue.4 , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 18
    • 84919474373 scopus 로고    scopus 로고
    • Commutative cipher based en-route filtering in wireless sensor networks
    • H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. 60th IEEE Veh. Technol. Conf. (VTC), 2004, pp. 12-23.
    • (2004) Proc. 60th IEEE Veh. Technol. Conf. (VTC) , pp. 12-23
    • Yang, H.1    Lu, S.2
  • 19
    • 77249083598 scopus 로고    scopus 로고
    • A dynamic en-route filtering scheme for data reporting in wireless sensor networks
    • Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Trans. Networking (ToN), vol. 18, pp. 150-163, 2010.
    • (2010) IEEE/ACM Trans. Networking (ToN) , vol.18 , pp. 150-163
    • Yu, Z.1    Guan, Y.2
  • 23
    • 48149096744 scopus 로고    scopus 로고
    • Ras: A robust authentication scheme for filtering false data in wireless sensor networks
    • Y. Hu, Y. Lin, Y. Liu, and W. Zeng, "Ras: A robust authentication scheme for filtering false data in wireless sensor networks," in Proc. 15th IEEE Int. Conf. Netw. (ICON), 2007, pp. 200-205.
    • (2007) Proc. 15th IEEE Int. Conf. Netw. (ICON) , pp. 200-205
    • Hu, Y.1    Lin, Y.2    Liu, Y.3    Zeng, W.4
  • 25
    • 84863148738 scopus 로고    scopus 로고
    • Towards effective en-route filtering against injected false data in wireless sensor networks
    • J. Lin, X. Yang, W. Yu, and X. Fu, "Towards effective en-route filtering against injected false data in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2011, pp. 1-6.
    • (2011) Proc. IEEE Global Telecommun. Conf. (GLOBECOM) , pp. 1-6
    • Lin, J.1    Yang, X.2    Yu, W.3    Fu, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.