메뉴 건너뛰기




Volumn 17, Issue 3, 2015, Pages 229-236

A false data report filtering scheme in wireless sensor networks: A survey

Author keywords

False data report filtering; Message authentication code; Wireless sensor network

Indexed keywords

SECURITY OF DATA; SENSOR NODES; SURVEYS;

EID: 84929889443     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (26)
  • 2
    • 34548355193 scopus 로고    scopus 로고
    • Location-aware security services for wireless sensor networks using network coding
    • E. Ayday, F. Delgosha, and F. Fekri, "Location-aware security services for wireless sensor networks using network coding," in IEEE Conference on Computer Communications, pp. 1226-1234, 2007.
    • (2007) IEEE Conference on Computer Communications , pp. 1226-1234
    • Ayday, E.1    Delgosha, F.2    Fekri, F.3
  • 3
    • 84886451367 scopus 로고    scopus 로고
    • Performance analysis of steiner tree-based decentralization mechanism (STDM) for privacy protection in wireless sensor networks
    • B. S. Babu, N. Jayashree, and P. Venkataram, "Performance analysis of steiner tree-based decentralization mechanism (STDM) for privacy protection in wireless sensor networks," International Journal of Network Security, vol. 15, no. 5, pp. 331-340, 2013.
    • (2013) International Journal of Network Security , vol.15 , Issue.5 , pp. 331-340
    • Babu, B.S.1    Jayashree, N.2    Venkataram, P.3
  • 6
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
    • C. T. Li and M.S. Hwang, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks," Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011.
    • (2011) Information Sciences , vol.181 , Issue.23 , pp. 5333-5347
    • Li, C.T.1    Hwang, M.S.2
  • 7
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
    • (2008) International Journal of Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 8
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 9
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks," International Journal ofInno-vative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
    • (2009) International Journal ofInno-vative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 10
    • 33646842495 scopus 로고    scopus 로고
    • Data sampling control and compression in sensor networks
    • J. Li and J. Li, "Data sampling control and compression in sensor networks," Mobile Ad-hoc and Sensor Networks, vol. 3794, pp. 42-51, 2005.
    • (2005) Mobile Ad-hoc and Sensor Networks , vol.3794 , pp. 42-51
    • Li, J.1    Li, J.2
  • 11
    • 84903892162 scopus 로고    scopus 로고
    • Distributed detecting node replication attacks in wireless sensor networks: A survey
    • W. T. Li, T. H. Feng, and M. S. Hwang, "Distributed detecting node replication attacks in wireless sensor networks: A survey," International Journal of Network Security, vol. 16, no. 5, pp. 323-330, 2014.
    • (2014) International Journal of Network Security , vol.16 , Issue.5 , pp. 323-330
    • Li, W.T.1    Feng, T.H.2    Hwang, M.S.3
  • 12
  • 15
    • 77956873542 scopus 로고    scopus 로고
    • A survey on key management mechanisms for distributed wireless sensor networks
    • M. A. Jr. Simplicio, P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol. 54, no. 15, pp. 2591-2612, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2591-2612
    • Simplicio, M.A.1    Barreto, P.S.L.M.2    Margi, C.B.3    Carvalho, T.C.M.B.4
  • 17
    • 84874885967 scopus 로고    scopus 로고
    • Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
    • H. S. Soliman and M. Omari, "Application of synchronous dynamic encryption system (SDES) in wireless sensor networks," International Journal of Network Security, vol. 3, no. 2, pp. 160-171, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 160-171
    • Soliman, H.S.1    Omari, M.2
  • 18
    • 84873263634 scopus 로고    scopus 로고
    • A double key-sharing based false data filtering scheme in wireless sensor networks
    • Q. Sun and M. Wu, "A double key-sharing based false data filtering scheme in wireless sensor networks," Journal of Computers, vol. 8, no. 2, pp. 388-398, 2013.
    • (2013) Journal of Computers , vol.8 , Issue.2 , pp. 388-398
    • Sun, Q.1    Wu, M.2
  • 20
    • 84885181405 scopus 로고    scopus 로고
    • Defending collaborative false data injection attacks in wireless sensor networks
    • J. Wanga, Z. Liu, S. Zhang, and X. Zhang, "Defending collaborative false data injection attacks in wireless sensor networks," Information Sciences, vol. 254, no. 1, pp. 39-53, 2014.
    • (2014) Information Sciences , vol.254 , Issue.1 , pp. 39-53
    • Wanga, J.1    Liu, Z.2    Zhang, S.3    Zhang, X.4
  • 21
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 22
    • 77953734116 scopus 로고    scopus 로고
    • Multidimensional resilient statistical en-route filtering in wireless sensor networks
    • F. Yang, X. H. Zhou, and Q. Y. Zhang, "Multidimensional resilient statistical en-route filtering in wireless sensor networks," Lecture Notes in Computer Science, pp. 130-139, 2010.
    • (2010) Lecture Notes in Computer Science , pp. 130-139
    • Yang, F.1    Zhou, X.H.2    Zhang, Q.Y.3
  • 23
    • 17144414947 scopus 로고    scopus 로고
    • Commutative cipher based en-route filtering in wireless sensor networks
    • H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Vehicular Technology Conference, pp. 1223-1227, 2004.
    • (2004) Vehicular Technology Conference , pp. 1223-1227
    • Yang, H.1    Lu, S.2
  • 24
    • 17144429277 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, 2005.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.4 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 26
    • 77249083598 scopus 로고    scopus 로고
    • A dynamic en-route filtering scheme for data reporting in wireless sensor networks
    • Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, 2010.
    • (2010) IEEE/ACM Transactions on Networking , vol.18 , Issue.1 , pp. 150-163
    • Yu, Z.1    Guan, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.