Combining filtering techniquesin wireless sensor network

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 825

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

AEBSCONF01_568

تاریخ نمایه سازی: 6 آبان 1393

چکیده مقاله:

Wireless sensor networks (WSNs) are widely used in many applications including military surveillance, habitat monitoring, and health care.WSNs are usually composed of a large amount of sensor nodes with limited resources, and are usuallydeployed in unattended environments. In such environments, the security of sensor nodes is very important. Once a node is compromised, the adversary will disclose all the secret information stored in that node.The adversary can then use the compromised nodes to launch false data injection attacks,i.e. to inject bogus reports intosensor networks. Defending false data injection attacks is an important research issue in WSNs, because this type of attacksnot only causes false alarms that waste real-world response efforts (e.g. sending response teams to the event location), butalso may drain out the constrained resources of the forwarding sensors

کلیدواژه ها:

WSN MAC security sensor node

نویسندگان

Firozeh Eskandari۱

Payamnoor University, Tehran, Iran

Mehdi Javanmard

Assistant Professor of Electrical and Computer Eng., Payamnoor University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • C. Krauک, M. Schneider, K. Bayarou, STEF: _ Secure ticket-based ...
  • Tilak S, Abu-Ghazaleh N B, Heinzelman W. A taxonomy of ...
  • Li J Z, Li J B, Shi S F. Concepts, ...
  • Z B, Gu Y, Li F F, Yu G et ...
  • Chu D., Deshpande A., et al. Approximate Data Collection in ...
  • F. Yang, X.H. Zhou, Q.Y. Zhang, Multi-dimen sional resilient statistical ...
  • Jeffery S. R., Alonso G., et al. A Pipelined Framework ...
  • Considine J, Li F, et al. Approximate aggregation techniques for ...
  • Zhou C H, Yang X C, Wang B et al. ...
  • F. Anjum, and P. Mouchtaris, Security for Wireless Ad Hoc ...
  • J.-W. Ho, "Distributed Detection of Node Capture Attacks in Wireless ...
  • T. G. Roosta, ":Attacks and defenses of ubiquitous Sensor networks ...
  • K. Okeya, T. Iwata, R. Molva et al., "Side Channel ...
  • K. Schramm, K. Lemke, C. Paar et al., "Embedded Cryptography: ...
  • W. Znaidi, M. Minier, and J.-P. Babau, An Ontology for ...
  • A. Francillon, and C. Castelluccia, "Code injection attacks on harvard ...
  • S. P. Skorobogatov, Semi-invasive attacks - A new approach to ...
  • M.S. Kim, T.H. Cho, A multipath en-route filtering method for ...
  • F. Li, J. Wu, A probabilistic voting-based filtering scheme in ...
  • T.P. Nghiem, T.H. Cho, A fuzzy-based interleaved muli-hop authentication scheme ...
  • H. Yang, S. Lu, Commutative cipher based en-route filtering in ...
  • H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, ...
  • Sensor networks, in: Proc. of the 6th ACM International Symposium ...
  • F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route ...
  • S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved ...
  • R. Blom, An optimal class of symmetric key generation systems, ...
  • W. Du, J. Deng, Y. Han, P. Varshney, A pairwise ...
  • R.X. Lu, X.D. Lin, H.J. Zhu, X.H. Liang, X.M. Shen, ...
  • G. Mao, B. Fidan, B. Anderson, Wireless Sensor network localization ...
  • F.Y. Ren, H.N. Huang, C. Lin, Wireless Sensor networks, Journal ...
  • Z. Yu, Y. Guan, A dynamic en-route scheme for filtering ...
  • F. Ye, H. Luo, L. Zhang, Statistical en-route filtering of ...
  • Chun-Hua Zhoua, Bing Chen, Yong Gao, Chao Zhang Zhan-Jie Guo, ...
  • Yusnani Mohd Yussoff, Habibah Hashima, Roszainiza Roslib, Mohd Dani Babac. ...
  • Thao P. Nghiem, Tae Ho Cho A multi-path interleaved hop-by-hop ...
  • Jjianxin Wanga, , Zhixiong Liu a, b, Shigeng Zhang a, ...
  • نمایش کامل مراجع