메뉴 건너뛰기




Volumn 8, Issue , 2006, Pages 3383-3389

On the intruder detection for sinkhole attack in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SIMULATION; FLOWCHARTING; NETWORK ROUTING; WIRELESS SENSOR NETWORKS;

EID: 42549138436     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255595     Document Type: Conference Paper
Times cited : (138)

References (21)
  • 1
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
    • Aug
    • th ACM MobiCom, Aug 2000, pp. 243-254.
    • (2000) th ACM MobiCom , pp. 243-254
    • Kaip, B.1    Kung, H.T.2
  • 2
    • 85141900323 scopus 로고    scopus 로고
    • st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp.1-15.
    • st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp.1-15.
  • 3
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Dec
    • E. Shi and A. Perrig, "Designing Secure Sensor Networks," IEEE Wireless Communications, vol. 11, no. 6, Dec 2004, pp. 38-43.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 6
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion Detection in Wireless Ad-Hoc Networks
    • Aug
    • th ACM MobiCom, Aug 2000, pp. 275-283.
    • (2000) th ACM MobiCom , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 11
    • 0041973497 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, In Proc. of the 22th IEEE INFOCOM 2003, April 2003, pp. 1976-1986.
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proc. of the 22th IEEE INFOCOM 2003, April 2003, pp. 1976-1986.
  • 15
    • 0035271352 scopus 로고    scopus 로고
    • An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information Systems
    • N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information Systems," Quality and Reliability Engineering International, vol. 17, no. 2, 2001, pp. 105-112.
    • (2001) Quality and Reliability Engineering International , vol.17 , Issue.2 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 20
    • 42549158852 scopus 로고    scopus 로고
    • MPR/MID User's Manual
    • Rev. B, Crossbow Technology, Inc, April
    • "MPR/MID User's Manual," Document 7430-0021-06, Rev. B, Crossbow Technology, Inc., April 2005.
    • (2005) Document 7430-0021-06
  • 21
    • 31844451627 scopus 로고    scopus 로고
    • Battery Lifetime Estimation and Optimization for Underwater Sensor Networks
    • R. Jurdak, C. V. Lopes, P. Baldi, "Battery Lifetime Estimation and Optimization for Underwater Sensor Networks," IEEE Sensor Operations, 2004.
    • (2004) IEEE Sensor Operations
    • Jurdak, R.1    Lopes, C.V.2    Baldi, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.