메뉴 건너뛰기




Volumn 420, Issue , 2017, Pages 37-48

LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants

Author keywords

Authentication; Code dissemination; Denial of service attack; Proxy re signature; Wireless sensor networks

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS); COMPUTER CRIME; DENIAL-OF-SERVICE ATTACK; NETWORK PROTOCOLS; WIRELESS SENSOR NETWORKS;

EID: 85027571106     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2017.07.024     Document Type: Article
Times cited : (9)

References (21)
  • 5
    • 84861438303 scopus 로고    scopus 로고
    • DiCode: dos-resistant and distributed code dissemination in wireless sensor networks
    • He, D.J., Chen, C., Chan, S., Bu, J.J., DiCode: dos-resistant and distributed code dissemination in wireless sensor networks. IEEE Trans. Wirel. Commun. 11:5 (2012), 1946–1956.
    • (2012) IEEE Trans. Wirel. Commun. , vol.11 , Issue.5 , pp. 1946-1956
    • He, D.J.1    Chen, C.2    Chan, S.3    Bu, J.J.4
  • 6
    • 84861445209 scopus 로고    scopus 로고
    • SDRP: a secure and distributed reprogramming protocol for wireless sensor networks
    • He, D.J., Chen, C., Chan, S., Bu, J.J., SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 59:11 (2012), 4155–4163.
    • (2012) IEEE Trans. Ind. Electron. , vol.59 , Issue.11 , pp. 4155-4163
    • He, D.J.1    Chen, C.2    Chan, S.3    Bu, J.J.4
  • 7
    • 84879121354 scopus 로고    scopus 로고
    • Security analysis and improvement of a secure and dissemination reprogramming protocol for wireless sensor networks
    • He, D.J., Chen, C., Chan, S., Bu, J.J., Yang, L.T., Security analysis and improvement of a secure and dissemination reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 60:7 (2013), 5348–5354.
    • (2013) IEEE Trans. Ind. Electron. , vol.60 , Issue.7 , pp. 5348-5354
    • He, D.J.1    Chen, C.2    Chan, S.3    Bu, J.J.4    Yang, L.T.5
  • 8
    • 77953769705 scopus 로고    scopus 로고
    • On optimal information capture by energy-constrained mobile sensors
    • He, S.B., Chen, J.M., Sun, Y.X., et al. On optimal information capture by energy-constrained mobile sensors. IEEE Trans. Veh. Technol. 59:5 (2010), 2472–2484.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.5 , pp. 2472-2484
    • He, S.B.1    Chen, J.M.2    Sun, Y.X.3
  • 9
    • 84883351671 scopus 로고    scopus 로고
    • EMD: energy-efficient P2P message dissemination in delay-tolerant wireless sensor and actor networks
    • He, S.B., Li, X., Chen, J.M., Cheng, P., Sun, Y.X., David, S.R., EMD: energy-efficient P2P message dissemination in delay-tolerant wireless sensor and actor networks. IEEE J. Sel. Areas Commun. 31:9 (2013), 75–84.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 75-84
    • He, S.B.1    Li, X.2    Chen, J.M.3    Cheng, P.4    Sun, Y.X.5    David, S.R.6
  • 10
    • 84930864594 scopus 로고    scopus 로고
    • Universal designated verifier transitive signatures for graph-based big data
    • Hou, S.Q., Huang, X.Y., Liu, J.K., Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318 (2015), 144–156.
    • (2015) Inf. Sci. , vol.318 , pp. 144-156
    • Hou, S.Q.1    Huang, X.Y.2    Liu, J.K.3
  • 14
    • 78249233570 scopus 로고    scopus 로고
    • Secure rateless deluge: pollution-resistant reprogramming and data dissemination for wireless sensor networks
    • Law, Y.W., Zhang, Y., Jin, J., Palaniswami, M., Havinga, P., Secure rateless deluge: pollution-resistant reprogramming and data dissemination for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2011:22 (2011), 1–22.
    • (2011) EURASIP J. Wirel. Commun. Netw. , vol.2011 , Issue.22 , pp. 1-22
    • Law, Y.W.1    Zhang, Y.2    Jin, J.3    Palaniswami, M.4    Havinga, P.5
  • 15
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks.
    • Mihir, B., Adriana, P., GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks. Proceedings of the CRYPTO LNCS, 2442, 2002, 162–177.
    • (2002) Proceedings of the CRYPTO, LNCS , vol.2442 , pp. 162-177
    • Mihir, B.1    Adriana, P.2
  • 17
    • 0031223146 scopus 로고    scopus 로고
    • A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems
    • Plank, J., A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems. Softw. Pract. Exp. 27:9 (1997), 995–1012.
    • (1997) Softw. Pract. Exp. , vol.27 , Issue.9 , pp. 995-1012
    • Plank, J.1
  • 19
    • 84874113596 scopus 로고    scopus 로고
    • Mobile peer-to-peer data dissemination in wireless ad-hoc networks
    • Waluyo, A.B., Taniar, D., Rahayu, W., Mobile peer-to-peer data dissemination in wireless ad-hoc networks. Inf. Sci. 230 (2013), 3–20.
    • (2013) Inf. Sci. , vol.230 , pp. 3-20
    • Waluyo, A.B.1    Taniar, D.2    Rahayu, W.3
  • 20
    • 80051876961 scopus 로고    scopus 로고
    • LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks
    • Zhang, R., Zhang, Y.H., LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks. Proceedings of the IEEE, Minneapolis, Minnesota, USA, 2011, 497–505.
    • (2011) Proceedings of the IEEE, Minneapolis, Minnesota, USA , pp. 497-505
    • Zhang, R.1    Zhang, Y.H.2
  • 21
    • 84941918744 scopus 로고    scopus 로고
    • Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
    • Zhang, Y.M., He, S.B., Chen, J.M., Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE/ACM Trans. Netw. 24:3 (2016), 1632–1646.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.3 , pp. 1632-1646
    • Zhang, Y.M.1    He, S.B.2    Chen, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.