1 |
Q. Zhang, P. Wang, D. Reeves, and P. Ning, Defending against Sybil Attacks in Sensor Networks, in proc. of IEEE international conference on distributed computing systems workshops, pp. 185-191, 2005.
|
2 |
John R. Douceur, The Sybil Attack, in proc. of 1st international workshop on peer-to-peer systems, pp. 251-260, 2002.
|
3 |
A. Pathan, H. Lee, and Choong Seon Hong, Security in wireless sensor networks: issues and challenges, in proc. of the 8th international conference on advanced communication technology, pp. 1043-1048, 2006.
|
4 |
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, in proc. of the 3rd international symposium on information processing in sensor networks, pp. 259-268, 2004.
|
5 |
J. Yang, Y. Chen, and W. Trappe, Detecting sybil attacks in wireless and sensor networks using cluster analysis, Mobile Ad Hoc and Sensor Systems (MASS 2008), pp. 834-839, 2008.
|
6 |
H. Yu, M. Kaminsky, P. B. Gibbons, and Abraham Flaxman, Sybilguard: defending against Sybil attacks via social networks, in proc. of the conference on applications, technologies, architectures, and protocols for computer communications, pp. 267- 278, 2006.
|
7 |
Shah, R., Rabaey, J. "Energy aware routing for low energy ad hoc sensor networks," Proc. of IEEE Wireless Communications and Networking Conference(WCNC), 2002.
|
8 |
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: a library for parallel simulation of large-scale wireless networks," ACM SIGSIM Simulation Digest, vol. 28, no. 1, pp. 154-161, 1998.
DOI
|
9 |
I. S. Choi, Y. W. Cha, C. H. Kim, I. K. Cho, "Design and Implementation of Management Protocol and Web Services for Sensor Network", Journal of Korean Institute of Information Technology, vol 9, issue 7, pp. 93-104, Jul 2011
|
10 |
S. K. Sung, "A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks", Journal of the Korea Academia-Industrial cooperation Society, v.12, no.11, pp. 5238-5244, 2011
과학기술학회마을
DOI
ScienceOn
|