메뉴 건너뛰기




Volumn , Issue , 2014, Pages 330-335

Exploiting channel-aware reputation system against selective forwarding attacks in WSNs

Author keywords

[No Author keywords available]

Indexed keywords

DROPS; SENSOR NODES;

EID: 84949922201     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2014.7036829     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 1
    • 34548852836 scopus 로고    scopus 로고
    • Chemas: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao, "Chemas: Identify suspect nodes in selective forwarding attacks," J. Parallel Distributed Comput., vol. 67, no. 11, pp. 1218-1230, 2007
    • (2007) J. Parallel Distributed Comput. , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 2
    • 84899686331 scopus 로고    scopus 로고
    • Amd: Audit-based misbehavior detection in wireless ad hoc networks
    • Y. Zhang, L. Lazos, and W. Kozma, "Amd: Audit-based misbehavior detection in wireless ad hoc networks," IEEE Trans. Mob. Comput., vol. 99, pp. 1-14, 2012
    • (2012) IEEE Trans. Mob. Comput. , vol.99 , pp. 1-14
    • Zhang, Y.1    Lazos, L.2    Kozma, W.3
  • 3
    • 54949103489 scopus 로고    scopus 로고
    • Functional reputation based reliable data aggregation and transmission for wireless sensor networks
    • S. Ozdemir, "Functional reputation based reliable data aggregation and transmission for wireless sensor networks," Comput. Commun., vol. 31, no. 17, pp. 3941-3953, 2008
    • (2008) Comput. Commun. , vol.31 , Issue.17 , pp. 3941-3953
    • Ozdemir, S.1
  • 4
    • 84866738779 scopus 로고    scopus 로고
    • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks
    • D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, "A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks," Comput. Commun., vol. 35, no. 17, pp. 2125-2137, 2012
    • (2012) Comput. Commun. , vol.35 , Issue.17 , pp. 2125-2137
    • Hao, D.1    Liao, X.2    Adhikari, A.3    Sakurai, K.4    Yokoo, M.5
  • 6
    • 77952255404 scopus 로고    scopus 로고
    • Mitigating selective forwarding attacks with a channel-aware approach in wmns
    • D. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in wmns," IEEE Trans. Wireless commun., vol. 9, no. 5, pp. 1661-1675, 2010
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.5 , pp. 1661-1675
    • Shila, D.1    Cheng, Y.2    Anjali, T.3
  • 7
    • 84890127638 scopus 로고    scopus 로고
    • Fade: Forwarding assessment based detection of collaborative grey hole attacks in wmns
    • Q. Liu, J. Yin, V. Leung, and Z. Cai, "Fade: Forwarding assessment based detection of collaborative grey hole attacks in wmns," IEEE Trans. Wireless commun., vol. 12, no. 10, pp. 5124-5137, 2013
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.10 , pp. 5124-5137
    • Liu, Q.1    Yin, J.2    Leung, V.3    Cai, Z.4
  • 8
    • 84877297429 scopus 로고    scopus 로고
    • An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks
    • J. Ren, Y. Zhang, and K. Liu, "An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks," I. J. Distributed Sens. Netw., vol. 2013, pp. 1-15, 2013
    • (2013) I. J. Distributed Sens. Netw. , vol.2013 , pp. 1-15
    • Ren, J.1    Zhang, Y.2    Liu, K.3
  • 9
    • 84924415315 scopus 로고    scopus 로고
    • Secure and reliable routing protocols for heterogeneous multihop wireless networks
    • M. Mahmoud, X. Lin, and X. Shen, "Secure and reliable routing protocols for heterogeneous multihop wireless networks," IEEE Trans. Parallel Distr. Sys., vol. 99, no. 1, p. 1, 2013
    • (2013) IEEE Trans. Parallel Distr. Sys. , vol.99 , Issue.1 , pp. 1
    • Mahmoud, M.1    Lin, X.2    Shen, X.3
  • 10
    • 84894446893 scopus 로고    scopus 로고
    • Real-time misbehavior detection in ieee 802. 11-based wireless networks: An analytical approach
    • J. Tang, Y. Cheng, and W. Zhuang, "Real-time misbehavior detection in ieee 802. 11-based wireless networks: An analytical approach," IEEE Trans. Mob. Comput., vol. 13, no. 1, pp. 146-158, 2014
    • (2014) IEEE Trans. Mob. Comput. , vol.13 , Issue.1 , pp. 146-158
    • Tang, J.1    Cheng, Y.2    Zhuang, W.3
  • 11
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the ieee 802. 11 distributed coordination function
    • G. Bianchi, "Performance analysis of the ieee 802. 11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, 2000
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 12
    • 84880318018 scopus 로고    scopus 로고
    • Binomial confidence intervals and contingency tests: Mathematical fundamentals and the evaluation of alternative methods
    • S. Wallis, "Binomial confidence intervals and contingency tests: mathematical fundamentals and the evaluation of alternative methods," J. Quant. Linguist., vol. 20, no. 3, pp. 178-208, 2013.
    • (2013) J. Quant. Linguist. , vol.20 , Issue.3 , pp. 178-208
    • Wallis, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.