메뉴 건너뛰기




Volumn 4317, Issue , 2006, Pages 116-127

Key inheritance-based false data filtering scheme in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BASE STATIONS; ENERGY RESOURCES;

EID: 85089842936     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11951957_11     Document Type: Conference Paper
Times cited : (38)

References (18)
  • 2
    • 13944283393 scopus 로고    scopus 로고
    • A Survey on Routing Protocols for Wireless Sensor Networks
    • Akkaya, K., Younis, M.: A Survey on Routing Protocols for Wireless Sensor Networks. Adhoc Netw. 3(3) (2004) 325-349
    • (2004) Adhoc Netw , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 3
    • 33745918312 scopus 로고    scopus 로고
    • Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks
    • Chi, S.H., Cho, T.H.: Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. Lect. Notes Comput. Sc. 3983 (2006) 58-67.
    • (2006) Lect. Notes Comput. Sc , vol.3983 , pp. 58-67
    • Chi, S.H.1    Cho, T.H.2
  • 4
    • 17144429277 scopus 로고    scopus 로고
    • Statistical En-Route Filtering of Injected False Data in Sensor Networks
    • Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4) (2005) 839-850
    • (2005) IEEE J. Sel. Area Comm , vol.23 , Issue.4 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3
  • 5
    • 18844457825 scopus 로고    scopus 로고
    • SIA: Secure Information Aggregation in Sensor Networks
    • Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In Proc of SenSys (2003) 255-265
    • (2003) Proc of Sensys , pp. 255-265
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 6
    • 17144414947 scopus 로고    scopus 로고
    • Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks
    • Yang, H, Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In Proc of VTC (2003) 1223-1227
    • (2003) Proc of VTC , pp. 1223-1227
    • Yang, H.1    Lu, S.2
  • 7
    • 25844473466 scopus 로고    scopus 로고
    • Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach
    • Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach. In Proc of INFOCOM (2005) 503-514
    • (2005) Proc of INFOCOM , pp. 503-514
    • Zhang, W.1    Cao, G.2
  • 8
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
    • Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In Proc of INFOCOM (2003) 1976-1986
    • (2003) Proc of INFOCOM , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 10
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
    • Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In Proc of S&P (2004) 259-271
    • (2004) Proc of S&P , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 11
    • 33847095965 scopus 로고    scopus 로고
    • The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks
    • Zhang, Y., Yang, J., Vu, H.T.: The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks. In Proc of IPDPS (2006)
    • (2006) Proc of IPDPS
    • Zhang, Y.1    Yang, J.2    Vu, H.T.3
  • 12
    • 29844441128 scopus 로고    scopus 로고
    • Toward resilient security in wireless sensor networks
    • Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In Proc of MobiHoc (2005) 34-45
    • (2005) Proc of Mobihoc , pp. 34-45
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4    Arbaugh, W.5
  • 13
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
    • Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE J. Sel. Area Comm. 24(2) (2006) 247-260
    • (2006) IEEE J. Sel. Area Comm , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 16
    • 85101261154 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In Proc of SPNA (2002) 28-37
    • (2002) Proc of SPNA , pp. 28-37
    • Karlof, C.1    Wagner, D.2
  • 17
    • 2442529460 scopus 로고    scopus 로고
    • Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks
    • Ye, F., Zhong, G., Lu, S., Zhang, L.: Gradient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks. Wirel. Netw. 11(2) (2005)
    • (2005) Wirel. Netw , vol.11 , Issue.2
    • Ye, F.1    Zhong, G.2    Lu, S.3    Zhang, L.4
  • 18
    • 0034539015 scopus 로고    scopus 로고
    • Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks
    • Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proc. of MOBICOM (2000) 56-67
    • (2000) Proc of MOBICOM , pp. 56-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.