An authentication scheme for filtering injected bogus data in sensor networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Yong Ho | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-09T02:39:31Z | - |
dc.date.available | 2021-09-09T02:39:31Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2008-11-20 | - |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/122392 | - |
dc.description.abstract | Recently, Zhang et al. proposed a location-based threshold-endorsement scheme (LTE) to thwart bogus data injection attacks. This scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has fatal vulnerabilities. We also propose an improved scheme that mitigates the weakness and thereby achieves the original claims of Zhang et al. without lessening remarkable filtering power intended in LTE. (C) 2008 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | FALSE DATA | - |
dc.title | An authentication scheme for filtering injected bogus data in sensor networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.comcom.2008.07.013 | - |
dc.identifier.scopusid | 2-s2.0-54949102724 | - |
dc.identifier.wosid | 000261362400005 | - |
dc.identifier.bibliographicCitation | COMPUTER COMMUNICATIONS, v.31, no.17, pp.3929 - 3932 | - |
dc.relation.isPartOf | COMPUTER COMMUNICATIONS | - |
dc.citation.title | COMPUTER COMMUNICATIONS | - |
dc.citation.volume | 31 | - |
dc.citation.number | 17 | - |
dc.citation.startPage | 3929 | - |
dc.citation.endPage | 3932 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | FALSE DATA | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Bogus data injection attack | - |
dc.subject.keywordAuthor | Sensor networks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.