• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures (2003)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [cs.ucsb.edu]
  • [www.ece.cmu.edu]
  • [users.ece.cmu.edu]
  • [www.chriskarlof.com]
  • [www.cs.ucsb.edu]
  • [www.cs.ucsb.edu]
  • [cs.ucsb.edu]
  • [www.cse.sc.edu]
  • [users.ece.cmu.edu]
  • [cs.ucsb.edu]
  • [cs.uccs.edu]
  • [cs.uccs.edu]
  • [cs.uccs.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [oncampus.richmond.edu]
  • [www.cs.huji.ac.il]
  • [www.cs.jhu.edu]
  • [www.cs.jhu.edu]
  • [www.cs.ucf.edu]
  • [www.cs.ucf.edu]
  • [www.cwc.oulu.fi]
  • [www.cwc.oulu.fi]
  • [www.cs.ucf.edu]
  • [webs.cs.berkeley.edu]
  • [nest.cs.berkeley.edu]
  • [www.csee.umbc.edu]
  • [users.eecs.northwestern.edu]
  • [users.eecs.northwestern.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [nas.uhcl.edu]
  • [webs.cs.berkeley.edu]
  • [www.csee.umbc.edu]
  • [nest.cs.berkeley.edu]
  • [www.gta.ufrj.br]
  • [classes.soe.ucsc.edu]
  • [www.csee.umbc.edu]
  • [now.cs.berkeley.edu]
  • [now.cs.berkeley.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Chris Karlof , David Wagner
Venue:
Citations:781 - 3 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Karlof03securerouting,
    author = {Chris Karlof and David Wagner},
    title = {Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures},
    year = {2003}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can be adapted into powerful attacks agacks sensor networks, introduce two classes of novel attacks agacks sensor networks----sinkholes and HELLO floods, and analyze the security of all the major sensor networkrouting protocols. We describe crippling attacks against all of them and sug@(5 countermeasures anddesig considerations. This is the first such analysis of secure routing in sensor networks.

Keyphrases

wireless sensor network    sensor network    powerful attack agacks    countermeasure anddesig consideration    securitygcur forrouting    many sensor network    peer-to-peer network    novel attack agacks    major sensor networkrouting protocol    network sinkhole    first analysis    hello flood    secure routing   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University