메뉴 건너뛰기




Volumn , Issue , 2015, Pages 315-319

Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks

Author keywords

Denial of service; energy harvesting; hop by hop cooperative detection; selective forwarding attack; wireless sensor networks

Indexed keywords

CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; NETWORK PROTOCOLS; NETWORK SECURITY; ROUTING PROTOCOLS; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84928019198     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCNC.2015.7069361     Document Type: Conference Paper
Times cited : (17)

References (11)
  • 1
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 2
    • 84906841376 scopus 로고    scopus 로고
    • Analysis of energy harvesting for vibration-motivated wireless sensor networks
    • S. Lim, J. Kimn, and H. Kim, "Analysis of Energy Harvesting for Vibration-Motivated Wireless Sensor Networks," in Proc. Int'l Conf. on Wireless Networks (ICWN), 2010, pp. 391-397.
    • (2010) Proc. Int'l Conf. on Wireless Networks (ICWN) , pp. 391-397
    • Lim, S.1    Kimn, J.2    Kim, H.3
  • 4
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defense
    • D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defense," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 6
    • 77950998038 scopus 로고    scopus 로고
    • Detecting selective forwarding attacks in wireless sensor networks
    • B. Yu and B. Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks," in IEEE IPDPS, 2006.
    • (2006) IEEE IPDPS
    • Yu, B.1    Xiao, B.2
  • 7
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao, "CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks," Journal of Parallel and Distributed Computing, vol. 67, no. 11, pp. 1218-1230, 2007.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 8
    • 48649095029 scopus 로고    scopus 로고
    • An efficient countermeasure to the selective forwarding attack in wireless sensor networks
    • H. Sun, C. Chen, and Y. Hsiao, "An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Networks," in IEEE Region 10 Conference, 2007, pp. 1-4.
    • (2007) IEEE Region 10 Conference , pp. 1-4
    • Sun, H.1    Chen, C.2    Hsiao, Y.3
  • 10
    • 57849148091 scopus 로고    scopus 로고
    • CADE: Cumulative acknowledgment based detection of selective forwarding attacks in wireless sensor networks
    • Y. Kim, H. Lee, K. Cho, and D. Lee, "CADE: Cumulative Acknowledgment Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks," in Int'l Conf. on Convergence and Hybrid Information Technology, 2008, pp. 416-422.
    • (2008) Int'l Conf. on Convergence and Hybrid Information Technology , pp. 416-422
    • Kim, Y.1    Lee, H.2    Cho, K.3    Lee, D.4
  • 11
    • 0035789268 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor network
    • D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Network," in Proc. MobiHoc, 2001, pp. 251-254.
    • (2001) Proc. MobiHoc , pp. 251-254
    • Ganesan, D.1    Govindan, R.2    Shenker, S.3    Estrin, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.