메뉴 건너뛰기




Volumn 51, Issue 4, 2007, Pages 1151-1168

eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks

Author keywords

Authentication; Collaborative monitoring; Energy efficiency; Intrusion detection; Intrusion prevention; Wireless sensor network

Indexed keywords

COMPUTER SIMULATION; COPYRIGHTS; ENERGY EFFICIENCY; SECURITY OF DATA; SENSORS; TELECOMMUNICATION NETWORKS;

EID: 33845719807     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.07.008     Document Type: Article
Times cited : (56)

References (40)
  • 3
    • 85034572933 scopus 로고    scopus 로고
    • W.B. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy efficient communication protocol for wireless microsensor networks, in: IEEE Hawaii Int. Conf. on System Science, Hawaii, USA, January 2000, pp. 1-10.
  • 4
    • 84886811604 scopus 로고    scopus 로고
    • A. Manjeshwar, D.P. Agrawal, TEEN: a routing protocol for enhanced efficiency in wireless sensor networks, in: 15th IEEE Parallel and Distributed Processing Symposium, San Francisco, USA, April 2001, pp. 2009-2015.
  • 5
    • 84966549779 scopus 로고    scopus 로고
    • A. Manjeshwar, D.P. Agrawal, APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks, in: 16th IEEE Parallel and Distributed Processing Symposium, Florida, USA, April 2002, pp. 195-202.
  • 6
    • 51949089156 scopus 로고    scopus 로고
    • S. Lindsey, C.S. Raghavendra, PEGASIS: power efficient gathering in sensor information systems, in: IEEE Aerospace Conf., Montana, Canada, March 2002, pp. 1-6.
  • 7
    • 18844368290 scopus 로고    scopus 로고
    • Time-diffusion synchronization protocol for wireless sensor networks
    • Su W., and Akyildiz I.F. Time-diffusion synchronization protocol for wireless sensor networks. IEEE/ACM Transactions on Networking 13 2 (2005) 384-397
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.2 , pp. 384-397
    • Su, W.1    Akyildiz, I.F.2
  • 8
    • 4344714071 scopus 로고    scopus 로고
    • Medium access control with coordinated adaptive sleeping for wireless sensor networks
    • Ye W., Heidemann J., and Estrin D. Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking 12 3 (2004) 493-506
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.3 , pp. 493-506
    • Ye, W.1    Heidemann, J.2    Estrin, D.3
  • 9
    • 4344582402 scopus 로고    scopus 로고
    • Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation
    • Baek S.J., Veciana G., and Su X. Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation. IEEE Journal on Selected Area in Communications 22 6 (2004) 1130-1140
    • (2004) IEEE Journal on Selected Area in Communications , vol.22 , Issue.6 , pp. 1130-1140
    • Baek, S.J.1    Veciana, G.2    Su, X.3
  • 10
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Shi E., and Perrig A. Designing Secure Sensor Networks. IEEE Wireless Communication December (2004) 28-43
    • (2004) IEEE Wireless Communication , Issue.December , pp. 28-43
    • Shi, E.1    Perrig, A.2
  • 11
    • 24944560667 scopus 로고    scopus 로고
    • C.C. Su, K.M. Chang, M.F. Horng, Y.H. Kuo, The new intrusion prevention and detection approaches for cluster-based sensor networks, in: IEEE Wireless Communication and Networking Conference, New Orleans, USA, March 2005, pp. 1927-1932.
  • 12
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: 10th ACM Conf. on Computer and Communication Security, Washington DC, USA, October 2003, pp. 27-31.
  • 13
    • 33845507838 scopus 로고    scopus 로고
    • A. Chadha, Y. Liu, S.K. Das, Group key distribution via local collaboration in wireless sensor networks, in: Second IEEE Sensor and Ad Hoc Communications and Networks, Santa Clara, USA, September 2005, pp. 46-54.
  • 14
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, E. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, in: Third Int. Symposium on Information Processing in Sensor Networks, New York, USA, April 2004, pp. 259-268.
  • 15
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 16
    • 84942426861 scopus 로고    scopus 로고
    • C. Karlof, D. Wanger, Secure routing in wireless sensor networks: attacks and countermeasures, in: First IEEE Int. Workshop on Sensor Network Protocols and Applications, Alaska, USA, May 2003, pp. 113-127.
  • 17
    • 33845698146 scopus 로고    scopus 로고
    • C. Hartung, J. Balasalle, R. Han, Node compromise in sensor networks: the need for secure systems, Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado, January 2005.
  • 19
    • 17144411499 scopus 로고    scopus 로고
    • Y. Wu, D. Ma, T. Li, R.H. Deng, Classify encrypted data in wireless sensor networks, in: 60th IEEE Vehicular Technology Conference, Los Angeles, USA, September 2004, pp. 3236-3239.
  • 20
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Baltimore, USA, November 2004, pp. 162-175.
  • 22
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: 9th ACM Conference on Computer and Communications Security, Washington DC, USA, November 2002, pp. 41-47.
  • 24
    • 24944591357 scopus 로고    scopus 로고
    • X. Wang, H. Yu, How to break MD5 and other hash functions, in: Advances in Cryptology - Proceedings of EUROCRYPT 2005, LNCS 3494, 2005, pp. 19-35.
  • 25
    • 33845686213 scopus 로고    scopus 로고
    • X. Wang, Y.L. Yin, H. Yu, Finding collision in the full SHA-1, in: Advances in Cryptology - Proceedings of EUROCRYPT 2005, LNCS 3494, 2005, pp. 1-18.
  • 26
    • 33750029023 scopus 로고    scopus 로고
    • J. Kim, A. Birykov, B. Preneel, S. Hong, On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1, in: 5th Conference on Security and Cryptography for Networks, Miori, LNCS 4116, 2006, pp. 242-256.
  • 27
    • 0033690336 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Research in Security and Privacy, Oakland, Canada, May 2000, pp. 56-73.
  • 28
    • 85177183993 scopus 로고    scopus 로고
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: 7th Annual ACM Int. Conf. of Mobile Computing and Networks, Rome, Italy, July 2001, pp. 189-199.
  • 29
    • 33746313270 scopus 로고    scopus 로고
    • W. Du, L. Fang, P. Ning, LAD: localization anomaly detection for wireless sensor networks, in: 19th IEEE International Parallel and Distributed Processing Symposium, Denver, USA, April 2005, pp. 41a-41a.
  • 30
    • 33747302351 scopus 로고    scopus 로고
    • I. Onat, A. Miri, An intrusion detection system for wireless sensor networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Montreal, Canada, August 2005, pp. 253-259.
  • 31
    • 0036980295 scopus 로고    scopus 로고
    • H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile Ad Hoc networks, in: Int. Conf. on Mobile Computing and Networking, Atlanta, USA, September 2002, pp. 11-20.
  • 32
    • 0019633305 scopus 로고
    • The architecture organization of a mobile radio network via a distributed algorithm
    • Baker D.J., and Ephremides A. The architecture organization of a mobile radio network via a distributed algorithm. IEEE Transactions on Communication 29 11 (1981) 1694-1701
    • (1981) IEEE Transactions on Communication , vol.29 , Issue.11 , pp. 1694-1701
    • Baker, D.J.1    Ephremides, A.2
  • 33
    • 3142719292 scopus 로고
    • Multicluster, mobile, multimedia radio network
    • Gerla M., and Tsai J.T.C. Multicluster, mobile, multimedia radio network. ACM Journal on Wireless Networks 1 3 (1995) 255-265
    • (1995) ACM Journal on Wireless Networks , vol.1 , Issue.3 , pp. 255-265
    • Gerla, M.1    Tsai, J.T.C.2
  • 35
    • 0031357594 scopus 로고    scopus 로고
    • R. Ruppe, S. Griswald, P. Walsh, R. Martin, Near term digital radio (NTDR) system, in: IEEE Military Communication Conf., Monterey, USA, November 1997, pp. 1282-1287.
  • 36
    • 0027635417 scopus 로고
    • Routing frequency-hop packet radio networks with partial-band jamming
    • Pursley M.B., and Russell H.B. Routing frequency-hop packet radio networks with partial-band jamming. IEEE Transactions on Communication 41 7 (1993) 1117-1124
    • (1993) IEEE Transactions on Communication , vol.41 , Issue.7 , pp. 1117-1124
    • Pursley, M.B.1    Russell, H.B.2
  • 37
    • 33845707830 scopus 로고    scopus 로고
    • W.B. Heinzelman, ns2 LEACH CAD tool in MIT uAMPS Project. Available from: .
  • 38
    • 33845699652 scopus 로고    scopus 로고
    • The Network Simulator - ns2. Available from: .
  • 40
    • 33845696694 scopus 로고    scopus 로고
    • Crossbow Technology. Available from: .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.