메뉴 건너뛰기




Volumn , Issue , 2005, Pages 16-23

Decentralized intrusion detection in wireless sensor networks

Author keywords

Intrusion detection; Security; Wireless Sensor Networks

Indexed keywords

COMPUTER SIMULATION; SECURITY OF DATA; SECURITY SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 32144435943     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089761.1089765     Document Type: Conference Paper
Times cited : (319)

References (25)
  • 1
    • 32144460581 scopus 로고    scopus 로고
    • http://www.tinyos.net/.
  • 5
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.-C. Hu, A. PERRIG, AND D. B. JOHNSON, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm 2003, 2003.
    • (2003) Proc of IEEE Infocomm 2003
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 0033293621 scopus 로고    scopus 로고
    • A large scale distributed intrusion detection framework based on attack strategy analysis
    • M.-Y. HUANG, R. J. JASPER, AND T. M. WICKS, A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks, 31 (1999), pp. 2465-2475.
    • (1999) Computer Networks , vol.31 , pp. 2465-2475
    • Huang, M.-Y.1    Jasper, R.J.2    Wicks, T.M.3
  • 8
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. ILGUN. R. A. KEMMERER, AND P. PORRAS, State transition analysis: A rule-based intrusion detection approach, IEEE Trans on Software Engineering, 21 (1995), pp. 181-199.
    • (1995) IEEE Trans on Software Engineering , vol.21 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.3
  • 11
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, M. RUSCHITZKA, AND K. LEVITT, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, in Proc of the 1997 IEEE Symp on Security and Privacy, 1997, p. 175.
    • (1997) Proc of the 1997 IEEE Symp on Security and Privacy , pp. 175
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 15
  • 17
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • USENIX-Security
    • V. PAXON, Bro: A system for detecting network intruders in real-time, in Proc of USENIX, USENIX-Security, 1998.
    • (1998) Proc of USENIX
    • Paxon, V.1
  • 21
    • 0037319709 scopus 로고    scopus 로고
    • Manna: A management architecture for wireless sensor networks
    • L. B. RUIZ, J. M. S. NOGUEIRA, AND A. A. LOUREIRO, Manna: A management architecture for wireless sensor networks, IEEE Comm Magazine, 41 (2003), pp. 116-125.
    • (2003) IEEE Comm Magazine , vol.41 , pp. 116-125
    • Ruiz, L.B.1    Nogueira, J.M.S.2    Loureiro, A.A.3
  • 22
    • 0020497960 scopus 로고
    • Distributed network protocols
    • A. SEGALL, Distributed network protocols, IEEE Trans on Info Theory, 29 (1983), pp. 23-35.
    • (1983) IEEE Trans on Info Theory , vol.29 , pp. 23-35
    • Segall, A.1
  • 25
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. WOOD AND J. A. STANKOVIC, Denial of service in sensor networks, IEEE Computer, 35 (2002), pp. 54-62.
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.