Denial of service attack-resistant flooding authentication in wireless sensor networks
- 16 August 2010
- journal article
- Published by Elsevier BV in Computer Communications
- Vol. 33 (13), 1531-1542
- https://doi.org/10.1016/j.comcom.2010.03.027
Abstract
No abstract availableFunding Information
- Ministry of Education, Science and Technology (2009–0083495)
- Ministry of Knowledge Economy
- Korea Evaluation Institute of Industrial Technology (KI001862)
- National Research Foundation of Korea
This publication has 19 references indexed in Scilit:
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005
- Multilevel μTESLAACM Transactions on Embedded Computing Systems, 2004
- Compressed Bloom filtersIEEE/ACM Transactions on Networking, 2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- A survey on sensor networksIEEE Communications Magazine, 2002
- Digital signatures for flows and multicastsIEEE/ACM Transactions on Networking, 1999
- How to sign digital streamsPublished by Springer Science and Business Media LLC ,1997
- Perfectly-Secure Key Distribution for Dynamic ConferencesLecture Notes in Computer Science, 1993
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970