Combining filtering techniquesin wireless sensor network

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 827

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

AEBSCONF01_568

تاریخ نمایه سازی: 6 آبان 1393

Abstract:

Wireless sensor networks (WSNs) are widely used in many applications including military surveillance, habitat monitoring, and health care.WSNs are usually composed of a large amount of sensor nodes with limited resources, and are usuallydeployed in unattended environments. In such environments, the security of sensor nodes is very important. Once a node is compromised, the adversary will disclose all the secret information stored in that node.The adversary can then use the compromised nodes to launch false data injection attacks,i.e. to inject bogus reports intosensor networks. Defending false data injection attacks is an important research issue in WSNs, because this type of attacksnot only causes false alarms that waste real-world response efforts (e.g. sending response teams to the event location), butalso may drain out the constrained resources of the forwarding sensors

Keywords:

WSN MAC security sensor node

Authors

Firozeh Eskandari۱

Payamnoor University, Tehran, Iran

Mehdi Javanmard

Assistant Professor of Electrical and Computer Eng., Payamnoor University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • C. Krauک, M. Schneider, K. Bayarou, STEF: _ Secure ticket-based ...
  • Tilak S, Abu-Ghazaleh N B, Heinzelman W. A taxonomy of ...
  • Li J Z, Li J B, Shi S F. Concepts, ...
  • Z B, Gu Y, Li F F, Yu G et ...
  • Chu D., Deshpande A., et al. Approximate Data Collection in ...
  • F. Yang, X.H. Zhou, Q.Y. Zhang, Multi-dimen sional resilient statistical ...
  • Jeffery S. R., Alonso G., et al. A Pipelined Framework ...
  • Considine J, Li F, et al. Approximate aggregation techniques for ...
  • Zhou C H, Yang X C, Wang B et al. ...
  • F. Anjum, and P. Mouchtaris, Security for Wireless Ad Hoc ...
  • J.-W. Ho, "Distributed Detection of Node Capture Attacks in Wireless ...
  • T. G. Roosta, ":Attacks and defenses of ubiquitous Sensor networks ...
  • K. Okeya, T. Iwata, R. Molva et al., "Side Channel ...
  • K. Schramm, K. Lemke, C. Paar et al., "Embedded Cryptography: ...
  • W. Znaidi, M. Minier, and J.-P. Babau, An Ontology for ...
  • A. Francillon, and C. Castelluccia, "Code injection attacks on harvard ...
  • S. P. Skorobogatov, Semi-invasive attacks - A new approach to ...
  • M.S. Kim, T.H. Cho, A multipath en-route filtering method for ...
  • F. Li, J. Wu, A probabilistic voting-based filtering scheme in ...
  • T.P. Nghiem, T.H. Cho, A fuzzy-based interleaved muli-hop authentication scheme ...
  • H. Yang, S. Lu, Commutative cipher based en-route filtering in ...
  • H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, ...
  • Sensor networks, in: Proc. of the 6th ACM International Symposium ...
  • F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route ...
  • S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved ...
  • R. Blom, An optimal class of symmetric key generation systems, ...
  • W. Du, J. Deng, Y. Han, P. Varshney, A pairwise ...
  • R.X. Lu, X.D. Lin, H.J. Zhu, X.H. Liang, X.M. Shen, ...
  • G. Mao, B. Fidan, B. Anderson, Wireless Sensor network localization ...
  • F.Y. Ren, H.N. Huang, C. Lin, Wireless Sensor networks, Journal ...
  • Z. Yu, Y. Guan, A dynamic en-route scheme for filtering ...
  • F. Ye, H. Luo, L. Zhang, Statistical en-route filtering of ...
  • Chun-Hua Zhoua, Bing Chen, Yong Gao, Chao Zhang Zhan-Jie Guo, ...
  • Yusnani Mohd Yussoff, Habibah Hashima, Roszainiza Roslib, Mohd Dani Babac. ...
  • Thao P. Nghiem, Tae Ho Cho A multi-path interleaved hop-by-hop ...
  • Jjianxin Wanga, , Zhixiong Liu a, b, Shigeng Zhang a, ...
  • نمایش کامل مراجع