메뉴 건너뛰기




Volumn 14, Issue 5, 2007, Pages 56-63

Intrusion detection techniques in mobile ad hoc and wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

IN-DEPTH PROTECTION;

EID: 36849062699     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2007.4396943     Document Type: Article
Times cited : (168)

References (16)
  • 1
    • 0037086890 scopus 로고    scopus 로고
    • Wireless Sensor Networks: A Survey
    • I. F. Akyildiz et al., "Wireless Sensor Networks: A Survey," Elsevier Comp. Networks, vol. 38, no. 2, 2002, pp. 393-422.
    • (2002) Elsevier Comp. Networks , vol.38 , Issue.2 , pp. 393-422
    • Akyildiz, I.F.1
  • 2
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy for Intrusion Detection Systems
    • H. Debar, M. Dacier, and A. Wespi, "A Revised Taxonomy for Intrusion Detection Systems," Annales des Telecommun., vol. 55, 2000, pp. 361-78.
    • (2000) Annales des Telecommun , vol.55 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Sept
    • Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM Wireless Networks, vol. 9, no. 5, Sept. 2003, pp. 545-56.
    • (2003) ACM Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 4
    • 0037629724 scopus 로고    scopus 로고
    • Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies
    • Providence, RI, May
    • Y. Huang et al., "Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies," Proc. IEEE ICDCS '03, Providence, RI, May 2003, pp. 478-87.
    • (2003) Proc. IEEE ICDCS '03 , pp. 478-487
    • Huang, Y.1
  • 5
    • 4544258840 scopus 로고    scopus 로고
    • A Cooperative Intrusion Detection System for Ad Hoc Networks
    • Fairfax, VA
    • Y. Huang, and W. Lee, "A Cooperative Intrusion Detection System for Ad Hoc Networks," ACM SASN '03, Fairfax, VA, 2003, pp. 135-47.
    • (2003) ACM SASN '03 , pp. 135-147
    • Huang, Y.1    Lee, W.2
  • 6
    • 34548323745 scopus 로고    scopus 로고
    • Y. Huang, and W. Lee, Attack Analysis and Detection for Ad Hoc Routing Protocols, Proc. RAID '04, French Riviera, France, Sept. 2004, pp. 125-45.
    • Y. Huang, and W. Lee, "Attack Analysis and Detection for Ad Hoc Routing Protocols," Proc. RAID '04, French Riviera, France, Sept. 2004, pp. 125-45.
  • 7
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
    • Boston, MA, Aug
    • S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM Mobicom 2000, Boston, MA, Aug. 2000, pp. 255-65.
    • (2000) ACM Mobicom 2000 , pp. 255-265
    • Marti, S.1
  • 8
    • 4544342574 scopus 로고    scopus 로고
    • A Specification-based Intrusion Detection System for AODV
    • Fairfax, VA
    • C.-Y. Tseng et al., "A Specification-based Intrusion Detection System for AODV," ACM SASN '03, Fairfax, VA, 2003, pp. 125-34.
    • (2003) ACM SASN '03 , pp. 125-134
    • Tseng, C.-Y.1
  • 10
    • 34250761381 scopus 로고    scopus 로고
    • Integration of Mobility and Intrusion Detection for Wireless Ad Hoc Networks
    • June
    • B. Sun et al., "Integration of Mobility and Intrusion Detection for Wireless Ad Hoc Networks," Wiley Int'l. J. Commun. Sys., vol. 20, no. 6, June 2007, pp. 695-721.
    • (2007) Wiley Int'l. J. Commun. Sys , vol.20 , Issue.6 , pp. 695-721
    • Sun, B.1
  • 11
    • 33744548460 scopus 로고    scopus 로고
    • LAD: Localization Anomaly Detection for Wireless Sensor Networks
    • July
    • W. Du, L. Fang, and P. Ning, "LAD: Localization Anomaly Detection for Wireless Sensor Networks," J. Parallel and Distrib. Comp., vol. 66, no. 7, July 2006, pp. 874-86.
    • (2006) J. Parallel and Distrib. Comp , vol.66 , Issue.7 , pp. 874-886
    • Du, W.1    Fang, L.2    Ning, P.3
  • 12
    • 33144467903 scopus 로고    scopus 로고
    • Attack-Resistant Location Estimation in Sensor Networks
    • Los Angeles, CA, Apr
    • D. Liu, P. Ning, and W. Du, "Attack-Resistant Location Estimation in Sensor Networks," ACM/IEEE IPSN '05, Los Angeles, CA, Apr. 2005, pp. 99-106.
    • (2005) ACM/IEEE IPSN '05 , pp. 99-106
    • Liu, D.1    Ning, P.2    Du, W.3
  • 13
    • 14844300164 scopus 로고    scopus 로고
    • Resilient Aggregation in Sensor Networks
    • Washington DC
    • D. Wagner, "Resilient Aggregation in Sensor Networks," ACM SASN '04, Washington DC, 2004, pp. 78-87.
    • (2004) ACM SASN '04 , pp. 78-87
    • Wagner, D.1
  • 14
    • 33748089962 scopus 로고    scopus 로고
    • SDAP: A Secure Hop-by- Hop Data Aggregation Protocol for Sensor Networks
    • Florence, Italy
    • Y. Yang et al., "SDAP: A Secure Hop-by- Hop Data Aggregation Protocol for Sensor Networks," ACM Mobihoc '06, Florence, Italy, 2006, pp. 356-67.
    • (2006) ACM Mobihoc '06 , pp. 356-367
    • Yang, Y.1
  • 15
    • 34547471023 scopus 로고    scopus 로고
    • RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks
    • Alexandria, VA
    • L. Buttyán, P. Schaffer, and I. Vajda, "RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks," ACM SASN '06, Alexandria, VA, 2006, pp. 83-90.
    • (2006) ACM SASN '06 , pp. 83-90
    • Buttyán, L.1    Schaffer, P.2    Vajda, I.3
  • 16
    • 36849027592 scopus 로고    scopus 로고
    • Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks
    • Glasgow, U.K, June
    • B. Sun et al., "Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks," IEEE ICC '07, Glasgow, U.K., June 2007.
    • (2007) IEEE ICC '07
    • Sun, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.