메뉴 건너뛰기




Volumn 4, Issue 2, 2008, Pages 83-109

Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks

Author keywords

Distributed computing; Intrusion detection system; Security; Sensor networks

Indexed keywords

COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; INTRUSION DETECTION; MERCURY (METAL); SENSOR NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 46249127003     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1080/15501320802001119     Document Type: Article
Times cited : (21)

References (29)
  • 1
    • 46249087291 scopus 로고    scopus 로고
    • Intrusion detection in sensor networks: A non-copporative game approach
    • A. Agah, S. Das, and K. Basu. Intrusion detection in sensor networks: A non-copporative game approach. In IEEE NCA 2004.
    • (2004) IEEE NCA
    • Agah, A.1    Das, S.2    Basu, K.3
  • 2
    • 84996787881 scopus 로고    scopus 로고
    • Routing with guaranteed delivery in ad hoc wireless networks
    • P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. In DIALM 1999.
    • (1999) DIALM
    • Bose, P.1    Morin, P.2    Stojmenovic, I.3    Urrutia, J.4
  • 4
    • 70350562860 scopus 로고    scopus 로고
    • Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
    • J. Deng, R. Han, and S. Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In IEEE DSN 2004.
    • (2004) IEEE DSN
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 5
    • 46249086755 scopus 로고    scopus 로고
    • LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
    • R. Di Pietro, S. Etalle, P. Havinga, Y. W. Law, and L. V. Mancini. LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In WiSPr 2003.
    • (2003) WiSPr
    • Di Pietro, R.1    Etalle, S.2    Havinga, P.3    Law, Y.W.4    Mancini, L.V.5
  • 6
    • 33749648939 scopus 로고    scopus 로고
    • Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment
    • R. Di Pietro, L. V. Mancini, and A. Mei. Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. In WMAN 2004.
    • (2004) WMAN
    • Di Pietro, R.1    Mancini, L.V.2    Mei, A.3
  • 7
    • 25844521520 scopus 로고    scopus 로고
    • Localized faulttolerant event boundary detection in sensor networks
    • M. Ding, D. Chen, K. Xing, and X. Cheng. Localized faulttolerant event boundary detection in sensor networks. In INFOCOM 2005.
    • (2005) INFOCOM
    • Ding, M.1    Chen, D.2    Xing, K.3    Cheng, X.4
  • 8
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks
    • S. Doumit and D. Agrawal. Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks. In MILCOM 2003.
    • (2003) MILCOM
    • Doumit, S.1    Agrawal, D.2
  • 9
    • 33746313270 scopus 로고    scopus 로고
    • Lad: Localization anomaly detection for wireless sensor networks
    • W. Du, L. Fang, and P. Ning, Lad: Localization anomaly detection for wireless sensor networks. In IPDPS 2005.
    • (2005) IPDPS
    • Du, W.1    Fang, L.2    Ning, P.3
  • 10
  • 11
    • 8344224464 scopus 로고    scopus 로고
    • Locating and bypassing, routing holes in sensor networks
    • Q. Fang, J. Gao, and L. Guibas. Locating and bypassing, routing holes in sensor networks. In INFOCOM 2004.
    • (2004) INFOCOM
    • Fang, Q.1    Gao, J.2    Guibas, L.3
  • 12
    • 0033877788 scopus 로고    scopus 로고
    • Energy-Efficient Communication Protocols for Wireless Microsensor Networks
    • W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Efficient Communication Protocols for Wireless Microsensor Networks. In HICSS 2000.
    • (2000) HICSS
    • Heinzelman, W.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 14
    • 26444525727 scopus 로고    scopus 로고
    • A distributed intrusion detection approach for secure software architecture
    • P. Inverardi and L. Mostarda. A distributed intrusion detection approach for secure software architecture. In EWSA 2005.
    • (2005) EWSA
    • Inverardi, P.1    Mostarda, L.2
  • 15
    • 33751090748 scopus 로고    scopus 로고
    • Distributed idss for enhancing security in mobile wireless sensor networks
    • P. Inverardi, L. Mostarda, and A. Navarra. Distributed idss for enhancing security in mobile wireless sensor networks. In PCAC 2006.
    • (2006) PCAC
    • Inverardi, P.1    Mostarda, L.2    Navarra, A.3
  • 16
    • 70350012638 scopus 로고    scopus 로고
    • P. Inverardi, L. Mostarda, M. Tivoli, and M. Autili. Automatic synthesis of distributed adaptors for component-based system. In ASE 2005.
    • P. Inverardi, L. Mostarda, M. Tivoli, and M. Autili. Automatic synthesis of distributed adaptors for component-based system. In ASE 2005.
  • 17
    • 84942426861 scopus 로고    scopus 로고
    • Secure Routing in Sensor Networks: Attacks and Countermeasures
    • C. Karlof and D. Wagner. Secure Routing in Sensor Networks: Attacks and Countermeasures. In SNPA 2003.
    • (2003) SNPA
    • Karlof, C.1    Wagner, D.2
  • 18
    • 0034547115 scopus 로고    scopus 로고
    • Greedy perimeter stateless routing (GPSR) for wireless networks
    • B. Karp and H. Kung. Greedy perimeter stateless routing (GPSR) for wireless networks. In MobiCom 2000.
    • (2000) MobiCom
    • Karp, B.1    Kung, H.2
  • 19
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distribute system: A specification-based approach
    • C. Ko, M. Ruschitza, and K. Levitt. Execution monitoring of security-critical programs in distribute system: A specification-based approach. IEEE, 1997.
    • (1997) IEEE
    • Ko, C.1    Ruschitza, M.2    Levitt, K.3
  • 20
    • 23044528941 scopus 로고    scopus 로고
    • GRID: A fully location-aware routing protocol for mobile ad hoc networks
    • W.-H. Liao, J.-P. Sheu, and Y.-C. Tseng. GRID: A fully location-aware routing protocol for mobile ad hoc networks. Telecommunication Systems, 18(1-3), 2001.
    • (2001) Telecommunication Systems , vol.18 , Issue.1-3
    • Liao, W.-H.1    Sheu, J.-P.2    Tseng, Y.-C.3
  • 21
    • 0038675723 scopus 로고    scopus 로고
    • Leader election algorithms for mobile ad hoc networks
    • N. Malpani, J. Welch, and N. Vaidya. Leader election algorithms for mobile ad hoc networks. In DIALM 2000.
    • (2000) DIALM
    • Malpani, N.1    Welch, J.2    Vaidya, N.3
  • 22
    • 84962840943 scopus 로고    scopus 로고
    • Energetic trade-off between computing and communication resource in multimedia surveillance sensor network
    • D. Maniezzo, K. Yao, and G. Mazzini. Energetic trade-off between computing and communication resource in multimedia surveillance sensor network. In MWCN 2002.
    • (2002) MWCN
    • Maniezzo, D.1    Yao, K.2    Mazzini, G.3
  • 23
    • 28444490045 scopus 로고    scopus 로고
    • Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks
    • J. A. McCann, A. Navarra, and A. A. Papadopoulos. Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks. In IPCCC 2005.
    • (2005) IPCCC
    • McCann, J.A.1    Navarra, A.2    Papadopoulos, A.A.3
  • 24
    • 85085717737 scopus 로고    scopus 로고
    • Sensor-based intrusion detection for intra-domain distance-vector routing
    • V. Mittal and G. Vigne. Sensor-based intrusion detection for intra-domain distance-vector routing. In ACM CSS 2002.
    • (2002) ACM CSS
    • Mittal, V.1    Vigne, G.2
  • 26
    • 33750961928 scopus 로고    scopus 로고
    • An EFSM-based intrusion detection system for ad hoc networks
    • J.-M. Orset, B. Alcalde, and A. Cavalli. An EFSM-based intrusion detection system for ad hoc networks. In ATVA 2005.
    • (2005) ATVA
    • Orset, J.-M.1    Alcalde, B.2    Cavalli, A.3
  • 27
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 28
    • 33845568201 scopus 로고    scopus 로고
    • Secure Location Verification Using Radio Broadcast
    • A. Vora and M. Nesterenko. Secure Location Verification Using Radio Broadcast. In OPODIS 2004.
    • (2004) OPODIS
    • Vora, A.1    Nesterenko, M.2
  • 29
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireliless Networks, pp. 545-556, 2003.
    • (2003) Wireliless Networks , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.