메뉴 건너뛰기




Volumn 7, Issue 1, 2008, Pages 74-81

Denial-of-service in wireless sensor networks: Attacks and defenses

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE; SECURITY PROTOCOLS FOR SENSOR NETWORKS (SPINS);

EID: 38349154579     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2008.6     Document Type: Article
Times cited : (351)

References (21)
  • 1
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks," Computer, vol. 35, no. 10, 2002, pp. 54-62.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 2
    • 0034291065 scopus 로고    scopus 로고
    • Protocols for Self-Organization of a Wireless Sensor Network
    • K. Sohrabi et al., "Protocols for Self-Organization of a Wireless Sensor Network," IEEE Personal Comm., vol. 7, no. 5, 2000, pp. 16-27.
    • (2000) IEEE Personal Comm , vol.7 , Issue.5 , pp. 16-27
    • Sohrabi, K.1
  • 3
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensor Networks
    • A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 55, 2002, pp. 521-534.
    • (2002) Wireless Networks , vol.8 , Issue.55 , pp. 521-534
    • Perrig, A.1
  • 5
    • 38349109864 scopus 로고    scopus 로고
    • IEEE Std. 802.15.4, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
    • IEEE Std. 802.15.4, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
  • 6
    • 11244354854 scopus 로고    scopus 로고
    • Security Considerations for IEEE 802.15.4 Networks
    • ACM Press
    • N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 32-42.
    • (2004) Proc. ACM Workshop Wireless Security , pp. 32-42
    • Sastry, N.1    Wagner, D.2
  • 7
    • 29844457889 scopus 로고    scopus 로고
    • The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
    • ACM Press
    • W. Xu et al., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking, ACM Press, 2005, pp. 46-57.
    • (2005) Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking , pp. 46-57
    • Xu, W.1
  • 10
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for AdHoc Wireless Networks
    • Springer
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for AdHoc Wireless Networks," Proc. 7th Int'l Workshop Security Protocols, Springer, 1999, pp. 172-194.
    • (1999) Proc. 7th Int'l Workshop Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 11
    • 4344714071 scopus 로고    scopus 로고
    • Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks
    • W. Ye, J. Heidemann, and D. Estrin, "Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 12, no. 3, 2004, pp. 493-506.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.3 , pp. 493-506
    • Ye, W.1    Heidemann, J.2    Estrin, D.3
  • 16
    • 38349181460 scopus 로고    scopus 로고
    • Secure Distributed Cluster Formation in Wireless Sensor Networks
    • IEEE CS Press
    • K. Sun et al., "Secure Distributed Cluster Formation in Wireless Sensor Networks," Proc. 22nd Ann. Computer Security Applications Conf., IEEE CS Press, 2006, pp. 131-140.
    • (2006) Proc. 22nd Ann. Computer Security Applications Conf , pp. 131-140
    • Sun, K.1
  • 18
    • 4544298056 scopus 로고    scopus 로고
    • Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks
    • IEEE CS Press
    • J. Deng, R. Han, and S. Mishra, "Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks," Proc. Int'l Conf. Dependable Systems and Networks, IEEE CS Press, 2004, pp. 637-656.
    • (2004) Proc. Int'l Conf. Dependable Systems and Networks , pp. 637-656
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 20
    • 22744432612 scopus 로고    scopus 로고
    • The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale
    • ACM Press
    • J.W. Hui and D. Culler, "The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale," Proc. 2nd ACM Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 81-94.
    • (2004) Proc. 2nd ACM Conf. Embedded Networked Sensor Systems , pp. 81-94
    • Hui, J.W.1    Culler, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.