메뉴 건너뛰기




Volumn 1, Issue , 2015, Pages 318-325

A sybil attack detection scheme for a centralized clustering-based hierarchical network

Author keywords

Base Station; Cluster; Cluster Head; Sybil Attack; Wireless Sensor Network

Indexed keywords

BASE STATIONS; COMPUTER CRIME; NETWORK LAYERS; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84967157669     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Trustcom.2015.390     Document Type: Conference Paper
Times cited : (63)

References (27)
  • 1
    • 84904043180 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey on recent developments and potential synergies
    • P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of supercomputing, vol. 68, no. 1, pp. 1-48, 2014.
    • (2014) The Journal of Supercomputing , vol.68 , Issue.1 , pp. 1-48
    • Rawat, P.1    Singh, K.D.2    Chaouchi, H.3    Bonnin, J.M.4
  • 3
    • 84898778331 scopus 로고    scopus 로고
    • A survey of protocols for intermittently connected delay-tolerant wireless sensor networks
    • Y. Li and R. Bartos, "A survey of protocols for intermittently connected delay-tolerant wireless sensor networks," Journal of Network and Computer Applications, vol. 41, pp. 411-423, 2014.
    • (2014) Journal of Network and Computer Applications , vol.41 , pp. 411-423
    • Li, Y.1    Bartos, R.2
  • 4
    • 77958084079 scopus 로고    scopus 로고
    • Security and privacy in emerging wireless networks
    • M. DI and G. Tsudik, "Security and privacy in emerging wireless networks," IEEE Wireless Communications, pp. 13-21, 2010.
    • (2010) IEEE Wireless Communications , pp. 13-21
    • Di, M.1    Tsudik, G.2
  • 6
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 7
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromisetolerant security mechanisms for wireless sensor networks
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 8
    • 70449525340 scopus 로고    scopus 로고
    • Detecting sybil attacks in wireless sensor networks using neighboring information
    • K.-F. Ssu, W.-T. Wang, and W.-C. Chang, "Detecting sybil attacks in wireless sensor networks using neighboring information," Computer Networks, vol. 53, no. 18, pp. 3042-3056, 2009.
    • (2009) Computer Networks , vol.53 , Issue.18 , pp. 3042-3056
    • Ssu, K.-F.1    Wang, W.-T.2    Chang, W.-C.3
  • 12
    • 84879612010 scopus 로고    scopus 로고
    • Energy-efficient clustering in lossy wireless sensor networks
    • D. Gong, Y. Yang, and Z. Pan, "Energy-efficient clustering in lossy wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 73, no. 9, pp. 1323-1336, 2013.
    • (2013) Journal of Parallel and Distributed Computing , vol.73 , Issue.9 , pp. 1323-1336
    • Gong, D.1    Yang, Y.2    Pan, Z.3
  • 16
    • 84883421701 scopus 로고    scopus 로고
    • Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN
    • Springer
    • M. A. Jan, P. Nanda, and X. He, "Energy evaluation model for an improved centralized clustering hierarchical algorithm in wsn," in Wired/Wireless Internet Communication. Springer, 2013, pp. 154-167.
    • (2013) Wired/Wireless Internet Communication , pp. 154-167
    • Jan, M.A.1    Nanda, P.2    He, X.3
  • 17
    • 77953789262 scopus 로고    scopus 로고
    • Detecting and localizing identity-based attacks in wireless and sensor networks
    • Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2418-2434, 2010.
    • (2010) IEEE Transactions on Vehicular Technology , vol.59 , Issue.5 , pp. 2418-2434
    • Chen, Y.1    Yang, J.2    Trappe, W.3    Martin, R.P.4
  • 20
    • 79959289243 scopus 로고    scopus 로고
    • Energy harvesting sensor nodes: Survey and implications
    • S. Sudevalayam and P. Kulkarni, "Energy harvesting sensor nodes: Survey and implications," IEEE Communications Surveys &Tutorials, vol. 13, no. 3, pp. 443-461, 2011.
    • (2011) IEEE Communications Surveys &Tutorials , vol.13 , Issue.3 , pp. 443-461
    • Sudevalayam, S.1    Kulkarni, P.2
  • 21
    • 84912525356 scopus 로고    scopus 로고
    • Pasccc: Priority-based application-specific congestion control clustering protocol
    • M. A. Jan, P. Nanda, X. He, and R. P. Liu, "Pasccc: Priority-based application-specific congestion control clustering protocol," Computer Networks, vol. 74, pp. 92-102, 2014.
    • (2014) Computer Networks , vol.74 , pp. 92-102
    • Jan, M.A.1    Nanda, P.2    He, X.3    Liu, R.P.4
  • 24
    • 84885304744 scopus 로고    scopus 로고
    • Energy constraint clustering algorithms for wireless sensor networks
    • J. Albath, M. Thakur, and S. Madria, "Energy constraint clustering algorithms for wireless sensor networks," Ad Hoc Networks, vol. 11, no. 8, pp. 2512-2525, 2013.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2512-2525
    • Albath, J.1    Thakur, M.2    Madria, S.3
  • 25
    • 84884310704 scopus 로고    scopus 로고
    • Energy efficient routing in wireless sensor networks through balanced clustering
    • S. A. Nikolidakis, D. Kandris, D. D. Vergados, and C. Douligeris, "Energy efficient routing in wireless sensor networks through balanced clustering," Algorithms, vol. 6, no. 1, pp. 29-42, 2013.
    • (2013) Algorithms , vol.6 , Issue.1 , pp. 29-42
    • Nikolidakis, S.A.1    Kandris, D.2    Vergados, D.D.3    Douligeris, C.4
  • 27
    • 84894084116 scopus 로고    scopus 로고
    • Modeling and analysis of frame-level forward error correction for mpeg video over burst-loss channels
    • C.-I. Kuo, C.-H. Shih, C.-K. Shieh, W.-S. Hwang, and C.-H. Ke, "Modeling and analysis of frame-level forward error correction for mpeg video over burst-loss channels," Appl. Math, vol. 8, no. 4, pp. 1845-1853, 2014.
    • (2014) Appl. Math , vol.8 , Issue.4 , pp. 1845-1853
    • Kuo, C.-I.1    Shih, C.-H.2    Shieh, C.-K.3    Hwang, W.-S.4    Ke, C.-H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.