Исследование отказоустойчивой маршрутизации в беспроводных сенсорных сетях
https://doi.org/10.15514/ISPRAS-2014-26(6)-9
Аннотация
Ключевые слова
Список литературы
1. Libelium Comunicaciones Distribuidas S.L. “Waspmote Datasheet”, 2014
2. Akyildiz I, SuW, et al. “Wireless sensor networks: a survey”, in Computer Networks, pp. 393-422, 2002.
3. Ruiping Ma, Liudong Xing, Howard E. Michel. “Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks”, in 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 85- 94, 2006.
4. Liang-min Wang, Jian-feng Ma, Chao Wang, A.C. Kot. “Fault and intrusion tolerance of wireless sensor networks”, in 20th International Parallel and Distributed Processing Symposium, 2006.
5. Yves Deswarte, David Powell, “Intrusion-tolerance on the Internet (Tolrance aux intrusions sur Internet)”, in Presentation slide, LAAS- CNRS, Toulouse, France, 2005.
6. B.B. Madan and K.S. Trivedi, “Security modeling and quantification of intrusion tolerant systems”, in ISSRE, 2002.
7. Feiyi Wang, Raghavendra Uppalli, Charles Killian, “Analysis of techniques for building intrusion tolerant server systems”, in Military Communications Conference MILCOM ’03 IEEE, pp. 729 - 734 Vol.2, 2003.
8. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, in Journal of Wireless Networks, Volume 8, Issue 5, pp. 521- 534, Sept. 2002.
9. Chris karlof, Naveen Sastry, David Wagner. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, in Proceedings of the 2nd international conference on Embedded networked sensor networks, pp. 162-175, 2004.
10. Soumya Basu, M.Pushpalatha. “Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks”, in IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS),pp. 1 - 6, 2013.
11. Ajay Mahimkar, Theodore S. Rappaport. “SecureDAV: a secure data aggregation and verification protocol for sensor networks”, in IEEE Global Telecommunications Conference (GLOBECOM),pp. 2175 - 2179 Vol.4, 2004.
12. Leonardo B. Oliveira, Hao Chi Wong, Antonio A. Loureiro. “LHA- SP: secure protocols for hierarchical wireless sensor networks”, in 9th IFIP/IEEE International Symposium on Integrated Network Management, pp. 31 - 44, 2005.
13. D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. “Next century challenges: Scalable coordination in sensor networks, in Mobile Computing and Networking , pp. 263270, 1999.
14. Maha Sliti, Mohamed Hamdi, Noureddine Boudriga. “Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks”, in The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 633- 636, May 10-13, 2009.
15. J. Deng, R. Han, and S. Mishra. “INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks”, Poster paper in 23rd IEEE International Conference on Distributed Computing Systems, 2003
16. J. Deng, R. Han, and S. Mishra. “INSENS: Secure and Intrusion Tolerant Routing for Wireless Sensor Networks”, Technical Report CU-CS 939-02. Department of Computer Science. University of Colorado, Boulder, CO. November 2002.
17. J. Deng, R. Han, and S. Mishra. “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks”, in 2nd IEEE International Workshop on Information Processing in Sensor Networks, 2003
18. Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. “Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks”, in SenSys’08, Los Angeles, California, USA, ACM 1-58813-707-9/03/0011., 2008
19. Jiliang Zhou, Caixia Li , Qiying Cao and Yu Shen, “An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network”, in International Conference on Information and Automation-ICIA 2008, pp. 1547 - 1552, 2008.
20. L.M. Feeney. “An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks”, in Mobile Networks and Applications, pp. 239 - 249, 2001.
Рецензия
Для цитирования:
Ла В.Х., Кавалли А. Исследование отказоустойчивой маршрутизации в беспроводных сенсорных сетях. Труды Института системного программирования РАН. 2014;26(6):99-110. https://doi.org/10.15514/ISPRAS-2014-26(6)-9
For citation:
La V.H., Cavalli A. A study of Intrusion-tolerant routing in Wireless Sensor Networks. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2014;26(6):99-110. (In Russ.) https://doi.org/10.15514/ISPRAS-2014-26(6)-9