메뉴 건너뛰기




Volumn 67, Issue 11, 2007, Pages 1218-1230

CHEMAS: Identify suspect nodes in selective forwarding attacks

Author keywords

Intrusion detection; Selective forwarding attacks; Wireless sensor networks

Indexed keywords

COMPUTER SIMULATION; INTRUSION DETECTION; MILITARY COMMUNICATIONS; SENSITIVITY ANALYSIS;

EID: 34548852836     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2007.04.014     Document Type: Article
Times cited : (126)

References (19)
  • 1
    • 25844439422 scopus 로고    scopus 로고
    • S. Capkun, J. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE InfoCom, 2005, pp. 1917-1928.
  • 2
    • 34548820802 scopus 로고    scopus 로고
    • J. Deng, R. Han, S. Mishra, INSENS: intrusion-tolerant routing in wireless sensor networks, Technical Report, November 2002.
  • 3
    • 33745969132 scopus 로고    scopus 로고
    • J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proceedings of the Third ACM on the Security of Ad hoc and Sensor Networks (SASN 2005), 2005, pp. 89-96.
  • 4
    • 33144472210 scopus 로고    scopus 로고
    • S. Ganeriwal, S. Capkun, C. Han, M.B. Srivastava, Secure time synchronization service for sensor networks, in: Proceedings of the Fourth ACM Workshop on Wireless Security (WiSe 06), 2006, pp. 97-106.
  • 5
    • 0034539015 scopus 로고    scopus 로고
    • C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM MobiCom, 2000, pp. 56-67.
  • 6
    • 84942426861 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proceedings of the 2003 IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113-127.
  • 7
    • 0034547115 scopus 로고    scopus 로고
    • B. Karp, H. Kung, GPSR: greedy perimeter stateless routing for wireless networks, in: Proceedings of ACM MobiCom, 2000, pp. 243-254.
  • 8
    • 33745949686 scopus 로고    scopus 로고
    • Y.W. Law, L.V. Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, in: Proceedings of the Third ACM on the Security of Ad hoc and Sensor Networks (SASN 05), 2005, pp. 76-88.
  • 9
    • 33745931868 scopus 로고    scopus 로고
    • M. Manzo, T. Roosta, S. Sastry, Time synchronization attacks in sensor networks, in: Proceedings of the Third ACM Workshop on Security of Ad hoc and Sensor Networks, 2005, pp. 107-116.
  • 10
    • 85177187964 scopus 로고    scopus 로고
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of ACM Mobicom, 2001, pp. 189-199.
  • 11
    • 0242443772 scopus 로고    scopus 로고
    • Y. Sankarasubramaniam, O.B. Akan, I.F. Akyildiz, ESRT: event to sink reliable transport in wireless sensor networks, in: Proceedings of ACM MobiHoc, 2003, pp. 177-188.
  • 12
    • 0036980191 scopus 로고    scopus 로고
    • C.Y. Wan, A.T. Campbell, L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in: Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002, pp. 1-11.
  • 13
    • 29844457889 scopus 로고    scopus 로고
    • W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of ACM MobiHoc, 2005, pp. 46-57.
  • 14
    • 29844441128 scopus 로고    scopus 로고
    • H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, in: Proceedings of ACM MobiHoc, 2005, pp. 34-45.
  • 15
    • 3543100577 scopus 로고    scopus 로고
    • F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Proceedings of IEEE InfoCom, 2004, pp. 2446-2457.
  • 16
    • 34548841765 scopus 로고    scopus 로고
    • B. Yu, B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, in: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), 2006, pp. 1-8.
  • 17
    • 34548851798 scopus 로고    scopus 로고
    • Y. Yu, D. Estrin, R. Govindan, Geographical and energy-aware routing: a recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, Technical Report, 2001.
  • 18
    • 85177502145 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of ACM MobiCom, 2000, pp. 275-283.
  • 19
    • 3543056512 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, N. Peng, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, 2004, pp. 259-271.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.