메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 89-100

DICAS: Detection, diagnosis and isolation of control attacks in sensor networks

Author keywords

Control attack; Neighbor monitoring; Node disjoint paths; Secure routing; Sensor network security

Indexed keywords

CONTROL ATTACKS; MALICIOUS NODES; NEIGHBOR MONITORING; NODE-DISJOINT PATHS; SECURE ROUTING; SENSOR NETWORK SECURITY;

EID: 33847326821     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURECOMM.2005.17     Document Type: Conference Paper
Times cited : (56)

References (40)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 2
    • 15844404847 scopus 로고    scopus 로고
    • Secure ad-hoc on-demand distance vector (SAODV) routing
    • Octobers
    • M. G. Zapata, "Secure ad-hoc on-demand distance vector (SAODV) routing," IETF MANET Mailing List, Octobers, 2001.
    • (2001) IETF MANET Mailing List
    • Zapata, M.G.1
  • 3
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," WMCSA 2002, pp. 3-13.
    • (2002) WMCSA , pp. 3-13
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 4
    • 85177181823 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, MobiCom 02, pp. 12-23.
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," MobiCom 02, pp. 12-23.
  • 6
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," MobiCom 2000.
    • (2000) MobiCom
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 7
    • 0034772133 scopus 로고    scopus 로고
    • Geography-informed energy conservation for ad hoc routing
    • Y. Xu, J. Heidemann, and D. Estrin, "Geography-informed energy conservation for ad hoc routing," Mobicom, 2001.
    • (2001) Mobicom
    • Xu, Y.1    Heidemann, J.2    Estrin, D.3
  • 8
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," MobiCom 2000, pp. 243-254.
    • (2000) MobiCom , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 10
    • 84904578657 scopus 로고    scopus 로고
    • A scalable solution to minimum cost forwarding in large sensor networks
    • F. Ye, A. Chen, S. Lu, and L. Zhang, "A scalable solution to minimum cost forwarding in large sensor networks," ICCCN 2001, pp. 304-309.
    • (2001) ICCCN , pp. 304-309
    • Ye, F.1    Chen, A.2    Lu, S.3    Zhang, L.4
  • 11
    • 0033877788 scopus 로고    scopus 로고
    • Energy efficient communication protocol for wireless micro sensor networks
    • W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy efficient communication protocol for wireless micro sensor networks," HICSS 2000, pp. 3005-3014.
    • (2000) HICSS , pp. 3005-3014
    • Heinzelman, W.R.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 13
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in Sensor Networks: Analysis & Defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in Sensor Networks: Analysis & Defenses," IPSN 2004, pp. 259-268.
    • (2004) IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 14
    • 0029530159 scopus 로고
    • A routing protocol for finding two node-disjoint paths in computer networks
    • K. Ishida, Y. Kakuda, and T. Kikuno, "A routing protocol for finding two node-disjoint paths in computer networks," ICNP 1992, pp. 340 347.
    • (1992) ICNP , pp. 340-347
    • Ishida, K.1    Kakuda, Y.2    Kikuno, T.3
  • 15
    • 0034772133 scopus 로고    scopus 로고
    • Geographyinformed energy conservation for ad hoc routing
    • Y. Xu, J. Heidemann, and D. Estrin, "Geographyinformed energy conservation for ad hoc routing," MobiCom, 2001.
    • (2001) MobiCom
    • Xu, Y.1    Heidemann, J.2    Estrin, D.3
  • 17
    • 0001341422 scopus 로고    scopus 로고
    • The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
    • C. Perkins, Ed. Addison-Wesley
    • D. Johnson, D. Maltz, and J. Broch, "The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks," Ad Hoc Networking, C. Perkins, Ed. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 19
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," MobiCom 2000.
    • (2000) MobiCom
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 20
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. C. Hu, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," IEEE InfoCom 2003.
    • IEEE InfoCom 2003
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 24
    • 51949089156 scopus 로고    scopus 로고
    • PEGASIS: Power-efficient gathering in sensor information systems
    • S. Lindsey and C. Raghavendra, "PEGASIS: power-efficient gathering in sensor information systems," IEEE Aerospace Conference, 2002.
    • (2002) IEEE Aerospace Conference
    • Lindsey, S.1    Raghavendra, C.2
  • 27
    • 33847250438 scopus 로고    scopus 로고
    • F. Zhao and L. Guibas (Eds.), A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks, IPSN 2003, pp. 349-364, 2003.
    • F. Zhao and L. Guibas (Eds.), "A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks," IPSN 2003, pp. 349-364, 2003.
  • 30
    • 0034844688 scopus 로고    scopus 로고
    • Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc
    • S.J. Lee and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks," ICC 2001, pp. 3201-3205.
    • (2001) Networks , vol.199 , pp. 3201-3205
    • Lee, S.J.1    Gerla, M.2
  • 31
    • 0035425905 scopus 로고    scopus 로고
    • Performance of Multipath Routing for On-demand protocols in Mobile Ad Hoc Networks
    • A. Nasipuri, R. Castaneda, and S.R. Das, "Performance of Multipath Routing for On-demand protocols in Mobile Ad Hoc Networks," ACM Mobile Networks and Applications (MONET), 2001, 6(4):339-349.
    • (2001) ACM Mobile Networks and Applications (MONET) , vol.6 , Issue.4 , pp. 339-349
    • Nasipuri, A.1    Castaneda, R.2    Das, S.R.3
  • 33
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 Distributed Coordination Function
    • March
    • G. Bianchi, "Performance analysis of the IEEE 802.11 Distributed Coordination Function," IEEE Journal on Selected Areas in Communications, March 2000, 18(3):535-547.
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 34
    • 26644463857 scopus 로고    scopus 로고
    • The Network Simulator ns-2
    • At: www.isi.edu/nsnam/ns
    • "The Network Simulator ns-2," At: www.isi.edu/nsnam/ns/
  • 36
    • 33847335075 scopus 로고    scopus 로고
    • S. Buchegger, J.-Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad-hoc NeTworks, in MobiHoc 2002.
    • S. Buchegger, J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad-hoc NeTworks," in MobiHoc 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.