Trust management for resilient wireless sensor networks

Cited 10 time in webofscience Cited 0 time in scopus
  • Hit : 396
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHur, Junbeomko
dc.contributor.authorLee, Younhoko
dc.contributor.authorHong, Seong-Minko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2013-03-07T15:43:08Z-
dc.date.available2013-03-07T15:43:08Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-
dc.identifier.citationINFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.56 - 68-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/90569-
dc.description.abstractUtilities of wireless sensor networks are standing out in bold relief in various fields such as home environmental, industrial, and military applications. Compared with the vivid applications of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique features of the sensor networks make it difficult to adopt conventional security policies. Especially, false reports are critical threats because they can drain out the finite amount of energy resources in a battery-powered sensor networks; thus, a novel trust management scheme is necessary to make resilient wireless sensor networks. Cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the problem. In this paper, we propose a trust management scheme which can identify trustworthiness of sensor nodes and suggest a defensible approach against insider attacks beyond conventional cryptographic approaches.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleTrust management for resilient wireless sensor networks-
dc.typeArticle-
dc.identifier.wosid000238283000005-
dc.identifier.scopusid2-s2.0-33745820773-
dc.type.rimsART-
dc.citation.volume3935-
dc.citation.beginningpage56-
dc.citation.endingpage68-
dc.citation.publicationnameINFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorHur, Junbeom-
dc.contributor.nonIdAuthorLee, Younho-
dc.contributor.nonIdAuthorHong, Seong-Min-
dc.type.journalArticleArticle; Proceedings Paper-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 10 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0