최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 정보통신, v.35 no.1, 2008년, pp.76 - 90
허준범 (한국과학기술원 전산학과) , 이윤호 (한국과학기술원 전산학과) , 윤현수 (한국과학기술원 전산학과)
Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still ...
H. Chan and A. Perrig, Security and Privacy in Sensor Networks, IEEE Computer 2003
A. Pirzada, C. McDonald, Establishing Trust In Pure Ad-hoc Networks, Proceedings of the 27th conference on Australasian computer science, 2004
C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, NEST 2003
A. Perrig, J. Stankovic, D. Wagner, Security in Wireless Sensor Networks, Communication of the ACM, June 2004
David Wagner, Resilient Aggregation in Sensor Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 25, 2004
B. Przydatek, D. Song, A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003
H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward Resilient Security in Wireless Sensor Networks, Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing, Urbana-Champaign, Illinois, USA, May 2005
L. Hu and D. Evans, Secure Aggregation for Wireless Networks, In Workshop on Security and Assurance in Ad hoc Networks. January 2003
S. Zhu, S. Setia, S. Jajodia, P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004
F. Ye, H. Luo, L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE INFOCOM 2004
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: Security Protocols for Sensor Networks, Wireless Networks Journal (WINE), September 2002
N. Shrivastava, C. Buragohain, D. Agrawal, S. Suri, Medians and Beyond: New Aggregation Techniques for Sensor Networks, Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 2004
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, Berkely, California, May 11-14 2003, pp. 197-213
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31 2003, pp. 42-51
L. Buttyan, P. Schaffer, I. Vajda, Resilient Aggregation with Attack Detection in Sensor Networks, Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2006
Z. Yan, P. Zhang, T. Virtanen, Trust Evaluation Based Security Solution in Ad Hoc Networks, NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, 15th-17th October 2003
R. Pickholtz, D. Schilling, L. Milstein, Theory of Spread Spectrum Communications - A Tutorial, IEEE Transactions on Communications, pp. 855- 884, May 1982
S. B. Wicker, M. D. Bartz, Type-II Hybrid-ARQ Protocols Using Punctured MDS Codes, Proceedings of IEEE Transactions on Communications, April 1994
Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN 2005, Los Angeles, April 2005
X. Ji, H. Zha, Robust Sensor Localization Algorithm in Wireless Ad-hoc Sensor Networks, Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN03), 2003
L. Lazos, R. Poovendran, SeRLoc: Secure Range- Independent Localiztion for Wireless Sensor Networks, Proceedings of the 2004 ACM Workshop on Wireless Security, pp. 21-30, 2004
N. Sastry, U. Shankar, D. Wagner, Secure Verification of Location Claims, Proceedings of the 2003 ACM workshop on Wireless security
S.S. Doumit, D.P. Agrawal, Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp. 609-614
A. Mahimkar, T. S. Rappaport, SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks, Proceedings of IEEE Global Telecommunications Conference (Globecom) 2004, Dallas, TX, Nov 29 - Dec 3, 2004
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.