메뉴 건너뛰기




Volumn 30, Issue 11-12, 2007, Pages 2385-2400

Adaptive security design with malicious node detection in cluster-based sensor networks

Author keywords

Alarm return; Dynamic authentication; Sensor network; Trust values

Indexed keywords

ADAPTIVE SYSTEMS; AUTHENTICATION; COMPUTER CRIME; SECURITY OF DATA;

EID: 34548020232     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.04.008     Document Type: Article
Times cited : (69)

References (44)
  • 2
    • 2442519150 scopus 로고    scopus 로고
    • S. Tanachaiwiwat, P. Dave, R. Bhindwale, A. Helmy, Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks, Performance, Computing, and Communications, 2004 IEEE International Conference, pp. 463-469.
  • 3
    • 34548038668 scopus 로고    scopus 로고
    • Enrique J. Duarte-Melo, Mingyan Liu, The effect of organization on energy consumption in wireless sensor networks, in: IEEE Globecom, 2002.
  • 4
    • 1542317846 scopus 로고    scopus 로고
    • M. Boghe, W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, in: Proceedings of the 2003 ACM Workshop on Wireless Security, 2003, pp. 79-87.
  • 5
    • 34548028277 scopus 로고    scopus 로고
    • Rene Struik, Gregg Rasor, Mandatory ECC security algorithm suite, submissions to IEEE 802.15 Wireless Personal Area Network, March, 2002.
  • 7
    • 3042783638 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 42-51.
  • 8
    • 28444454539 scopus 로고    scopus 로고
    • D. Huang, M. Mehta, D. Medhi, Source routing based pairwise key establishment protocol for sensor networks, in: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 7-9 April 2005, pp. 177-183.
  • 9
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: The 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003.
  • 10
    • 0033877788 scopus 로고    scopus 로고
    • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), January 2000, pp. 3005-3014.
  • 11
    • 0036980295 scopus 로고    scopus 로고
    • H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks, in: ACM MOBICOM Wireless Security Workshop (WiSe'02), Atlanta, September 2002.
  • 12
    • 33645010795 scopus 로고    scopus 로고
    • Cluster-based self-organization management protocols for wireless sensor networks
    • Chang Y.C., Lin Z.S., and Chen J.L. Cluster-based self-organization management protocols for wireless sensor networks. IEEE Transactions on Consumer Electronics 52 1 (2006) 75-80
    • (2006) IEEE Transactions on Consumer Electronics , vol.52 , Issue.1 , pp. 75-80
    • Chang, Y.C.1    Lin, Z.S.2    Chen, J.L.3
  • 14
    • 1542286901 scopus 로고    scopus 로고
    • Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, in: Proceedings of the 2nd ACM international conference on WNA, 2003.
  • 15
    • 34548022659 scopus 로고    scopus 로고
    • A Manjeshwar, D.P. Agrawal, TEEN: a routing protocol for enhanced efficiency in wireless sensor networks, in: 1st International Workshop on parallel and distributed computing issues in wireless networks and mobile computing, April 2001.
  • 16
    • 34548013127 scopus 로고    scopus 로고
    • A. Manjeshwar, D.P. Agrrawal, APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks, in: Proceedings of the International Parallel and Distributed Processing Symposium, April 2002, pp. 48.
  • 17
    • 51949089156 scopus 로고    scopus 로고
    • S. Lindsey, C.S. Raghavendra, PEGASIS: power-efficient gathering in sensor information systems, in: IEEE Aerospace Conference Proceedings, vol. 3, March 2002, pp. 3-1125.
  • 18
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • IEEE Computer Society, Los Alamitos, CA
    • Chan H., Perrig A., and Song D. Random key predistribution schemes for sensor networks. Proceedings of 2003 Symposium on Security and Privacy (2003), IEEE Computer Society, Los Alamitos, CA 197-215
    • (2003) Proceedings of 2003 Symposium on Security and Privacy , pp. 197-215
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 19
    • 34548020020 scopus 로고    scopus 로고
    • R. Kannan, L. Ray, A. Durresi, Efficient key predistribution schemes for sensor networks, in: 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS'04), Heidelberg, Germany, August 2004.
  • 20
    • 4544301464 scopus 로고    scopus 로고
    • R.D. Pietro, L.V. Mancini, A. Mei, Random key assignment for secure wireless sensor networks, in: SASN '03: of the 1st ACM workshop on Security of Ad hoc and Sensor Networks, pp. 62-71, New York, USA, 2003.
  • 21
    • 24644507953 scopus 로고    scopus 로고
    • Adrian C. Ferreira et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks, LNCS vol. 3420, Springer, 2005, pp. 449-458.
  • 22
    • 34247216164 scopus 로고    scopus 로고
    • Loureiro, SecLEACH - a random key distribution solution for securing clustered sensor networks, in: 5th IEEE International Symposium on Network Computing and Applications (NCA'06), July 2006.
  • 23
    • 24944560667 scopus 로고    scopus 로고
    • C.C. Su, K.M. Chang, M.F. Horng, Y.H. Kuo, The new intrusion prevention and detection approaches for clustering-based sensor networks, in: IEEE Wireless Communications and Networking Conference (WCNC05), March 2005.
  • 24
    • 34548019516 scopus 로고    scopus 로고
    • S. Sanyal et al., Security scheme for distributed DoS in mobile ad hoc networks, in: 6th International Workshop on Distributed Computing (IWDC'04), vol. 3326, LNCS, Springer, 2004, p. 541.
  • 25
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: intrusion-tolerant routing for wireless sensor networks
    • Deng J., Han R., and Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29 2 (2006) 216-230
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 26
    • 27544468419 scopus 로고    scopus 로고
    • Issa Khalil, Saurabh Bagchi, Ness B. Shroff, LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless network, in: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
  • 27
    • 26444471877 scopus 로고    scopus 로고
    • Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks
    • Lin H.Y., Huang Y.M., and Wang T.I. Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks. IEICE Transaction on Communications E88-B 9 (2005) 3598-3613
    • (2005) IEICE Transaction on Communications , vol.E88-B , Issue.9 , pp. 3598-3613
    • Lin, H.Y.1    Huang, Y.M.2    Wang, T.I.3
  • 28
    • 1542287664 scopus 로고    scopus 로고
    • P. Papadimitratos, Z.J. Haas, Secure data transmission in mobile ad hoc networks, 2003 ACM Wksp, Wireless Security, San Diego, CA, USA, 2003, pp. 41-50.
  • 29
    • 85177502983 scopus 로고    scopus 로고
    • S. Marti et al., Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), August 2000.
  • 30
    • 34548011053 scopus 로고    scopus 로고
    • F. Kargl et al., Advanced detection of selfish or malicious nodes in ad hoc networks, in: 1st European Wksp. Security in Ad-Hoc and Sensor Networks, ESAS 2004, August 5-6, 2004.
  • 31
    • 0036980295 scopus 로고    scopus 로고
    • H. Yang, X. Meng, S. Lu, Self-organized network layer security in mobile ad hoc networks, in: ACM MOBICOM Wireless Security Wksp (WiSe'02), September 2002.
  • 32
    • 34548040729 scopus 로고    scopus 로고
    • P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security 2002 Conference, Portoroz, Slovenia, September 26-27, 2002.
  • 33
    • 34548038810 scopus 로고    scopus 로고
    • B. Awerbuch et al., An on-demand secure routing protocol resilient to byzantine failures, in: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 2002.
  • 34
    • 84866538231 scopus 로고    scopus 로고
    • F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA 2004), 2004.
  • 35
    • 0035101078 scopus 로고    scopus 로고
    • Toward self-organized mobile ad hoc networks: the terminodes project
    • Hubaux J., et al. Toward self-organized mobile ad hoc networks: the terminodes project. IEEE Communication Magazine 39 1 (2001) 118-124
    • (2001) IEEE Communication Magazine , vol.39 , Issue.1 , pp. 118-124
    • Hubaux, J.1
  • 36
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Buttyan L., and Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8 5 (2003) 579-592
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.2
  • 37
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Rabin M. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36 2 (1989) 335-348
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 38
    • 0035789243 scopus 로고    scopus 로고
    • S. Yi, P. Naldurg, R. Kravets, Security-aware ad-hoc routing for wireless networks, in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, pp. 299-302.
  • 39
    • 23844494215 scopus 로고    scopus 로고
    • Cluster-based trust evaluation scheme in an ad hoc network
    • Jin S., Park C., Choi D., Chung K., and Yoon H. Cluster-based trust evaluation scheme in an ad hoc network. ETRI Journal 27 4 (2005) 465-468
    • (2005) ETRI Journal , vol.27 , Issue.4 , pp. 465-468
    • Jin, S.1    Park, C.2    Choi, D.3    Chung, K.4    Yoon, H.5
  • 40
    • 34548017685 scopus 로고    scopus 로고
    • C.E. Perkins, Terminology for ad-hoc networking, Draft-IETF-MANET-terms-00.txt, November 1997.
  • 42
    • 24644489093 scopus 로고    scopus 로고
    • L.B. Oliveira, Hao Cho Wang, A.A Loureiro, LHA-SP: secure protocols for hierarchical wireless sensor networks, in: 9th IFIP/IEEE International Symposium on Integrated Network Management, May 2005, pp 31-44.
  • 43
    • 33745378852 scopus 로고    scopus 로고
    • M.Y. Hsieh, Y.M. Huang, A secure on-demand source routing with distributed authentication for trust-based ad hoc networks, LNCS 3779, 2005, pp. 343-350.
  • 44
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Preneel B. (Ed), Springer
    • Rivest R.L. The RC5 encryption algorithm. In: Preneel B. (Ed). Fast Software Encryption (1995), Springer 86-96
    • (1995) Fast Software Encryption , pp. 86-96
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.