메뉴 건너뛰기




Volumn 30, Issue 11-12, 2007, Pages 2353-2364

An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks

Author keywords

Intruder detection; Intruder identification; Sinkhole attack; Wireless sensor network

Indexed keywords

BASE STATIONS; COMPUTER CRIME; SECURITY OF DATA; WIRELESS SENSOR NETWORKS;

EID: 34548031104     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.04.025     Document Type: Article
Times cited : (102)

References (37)
  • 1
    • 34548028991 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in sensor networks: attacks and countermeasures, in: Proceedings of the 1st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp. 1-15.
  • 2
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 (2002) 54-62
    • (2002) IEEE Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 3
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, Tinysec: a link layer security architecture for wireless sensor networks, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
  • 5
    • 32144435943 scopus 로고    scopus 로고
    • A. Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, H. Wong, Decentralized intrusion detection in wireless sensor networks, in: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005, pp. 16-23.
  • 6
    • 19544390497 scopus 로고    scopus 로고
    • B.J. Culpepper, H.C. Tseng, Sinkhole intrusion indicators in DSR MANETs, in: Proceedings of BroadNets '04, October 2004, pp. 681-688.
  • 8
    • 0034539015 scopus 로고    scopus 로고
    • C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: A scalable and robust communication paradigm for sensor networks, in: Proceedings of MobiCom '00, Aug 2000, pp. 56-67.
  • 9
    • 84904578657 scopus 로고    scopus 로고
    • F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: Proceedings of ICCCN '01, Oct 2001, pp. 304-309.
  • 10
    • 0036986248 scopus 로고    scopus 로고
    • D. Braginsky, D. Estrin, Rumour routing algorithm for sensor networks, in: Proceedings of the WSNA '02, September 2002, pp. 22-31.
  • 11
    • 0035789229 scopus 로고    scopus 로고
    • J. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of ACM MobiHoc '01, October 2001, pp. 146-155.
  • 12
    • 33646421331 scopus 로고    scopus 로고
    • Secure routing protocols for mobile ad-hoc wireless networks
    • Wysocki T.A., Dadej A., and Wysocki B.J. (Eds), Springer
    • Pirzada A.A., and McDonald C. Secure routing protocols for mobile ad-hoc wireless networks. In: Wysocki T.A., Dadej A., and Wysocki B.J. (Eds). Advanced Wired and Wireless Networks (2004), Springer
    • (2004) Advanced Wired and Wireless Networks
    • Pirzada, A.A.1    McDonald, C.2
  • 13
    • 33845492142 scopus 로고    scopus 로고
    • F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proceedings of SECON '05, September 2005, pp. 118-129.
  • 14
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: intrusion-tolerant routing for wireless sensor networks
    • Deng J., Han R., and Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Elsevier Computer Communications 29 (2006) 216-230
    • (2006) Elsevier Computer Communications , vol.29 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 16
    • 85177234360 scopus 로고    scopus 로고
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of MobiCom '01, July 2001, pp. 189-199.
  • 17
    • 84920389231 scopus 로고    scopus 로고
    • D.E. Denning, An intrusion detection model, in: Proceedings of the IEEE Symposium on Security and Privacy, 1986, pp. 118-131.
  • 18
    • 85177499741 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of MobiCom '00, August 2000, pp. 275-283.
  • 19
    • 4544258840 scopus 로고    scopus 로고
    • Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of SASN '03, October 2003, pp. 135-147.
  • 21
    • 34548013346 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks, in: Proceedings of INFOCOM '05, March 2005, pp. 1976-1986.
  • 22
    • 3142684688 scopus 로고    scopus 로고
    • S.S. Doumit, D.P. Agrawal, Self-organized critically & stochastic learning based intrusion detection system for wireless sensor networks, in: Proceedings of MILCOM '03, October 2003, pp. 609-614.
  • 23
    • 0348195762 scopus 로고    scopus 로고
    • A.D. Wood, J.A. Standovic, S.H. Son, JAM: A jammed-area mapping service for sensor networks, in: Proceedings of RTSS '03, December 2003, pp. 286-297.
  • 24
    • 0036986435 scopus 로고    scopus 로고
    • J. Staddon, D. Balfanz, G. Durfee, Efficient tracing of failed nodes in sensor networks, in: Proceedings of WSNA '02, September 2002, pp. 122-130.
  • 25
    • 25844521520 scopus 로고    scopus 로고
    • M. Ding, D. Chen, K. Xing, X. Cheng, Localized fault-tolerant event boundary detection in sensor networks, in: Proceedings of INFOCOM '05, March 2005, pp. 902-913.
  • 26
    • 3543100577 scopus 로고    scopus 로고
    • F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Proceedings of INFOCOM '04, March 2004, pp. 2446-2457.
  • 27
    • 24944466187 scopus 로고    scopus 로고
    • L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang, Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, in: Proceedings of WCNC '05, March 2005, pp.1193-1199.
  • 28
    • 11244273945 scopus 로고    scopus 로고
    • L. Hu, D. Evans, Localization for mobile sensor networks, in: Proceedings of MobiCom '04, September 2004, pp. 45-57.
  • 29
    • 14844300164 scopus 로고    scopus 로고
    • D. Wagner, Resilient aggregation in sensor networks, in: Proceedings of SASN '04, October 2004, pp. 78-87.
  • 30
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • Ye N., and Chen Q. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International 17 (2001) 105-112
    • (2001) Quality and Reliability Engineering International , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 32
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of CCS '03, October 2003, pp. 52-61.
  • 33
    • 1542376949 scopus 로고    scopus 로고
    • P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: Proceedings of WSNA '03, September 2003, pp. 151-159.
  • 34
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of CCS '03, October 2003, pp. 62-72.
  • 36
    • 34548020316 scopus 로고    scopus 로고
    • MPR/MID User's Manual, Document 7430-0021-06, Rev. B, Crossbow Technology, Inc., April 2005.
  • 37
    • 31844451627 scopus 로고    scopus 로고
    • Battery lifetime estimation and optimization for underwater sensor networks
    • Jurdak R., Lopes C.V., and Baldi P. Battery lifetime estimation and optimization for underwater sensor networks. IEEE Sensor Network Operations (2004)
    • (2004) IEEE Sensor Network Operations
    • Jurdak, R.1    Lopes, C.V.2    Baldi, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.