메뉴 건너뛰기




Volumn , Issue , 2007, Pages

DCLAD: Distributed Cluster Based Localization Anomaly Detection in wireless sensor networks using single mobile beacon

Author keywords

Anomaly detection; GPS; Localization; Mobile beacon; Wireless sensor networks

Indexed keywords

ACCURATE LOCATION; ANOMALY DETECTIONS; CIVILIAN APPLICATIONS; CLUSTER BASED; CLUSTER HEAD (CH); DIFFERENT ATTACKS; FALSE POSITIVE RATE (FPR); HIGH DETECTION RATE; MILITARY ENVIRONMENT; MOBILE BEACONS; WIRELESS SENSOR NETWORKS (WSNS); WIRELESS SENSORS;

EID: 47949096749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2007.4455300     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 4544268803 scopus 로고    scopus 로고
    • Movement-assisted sensor deployment
    • March
    • G. Wang, G. Cao, and T. La Porta, "Movement-assisted sensor deployment," INFOCOM, March 2004.
    • (2004) INFOCOM
    • Wang, G.1    Cao, G.2    La Porta, T.3
  • 2
    • 25844459686 scopus 로고    scopus 로고
    • Joint mobility and routing for lifetime elongation in wireless sensor networks
    • March
    • J. Luo and J. P. Hubaux, "Joint mobility and routing for lifetime elongation in wireless sensor networks," INFOCOM, March 2005.
    • (2005) INFOCOM
    • Luo, J.1    Hubaux, J.P.2
  • 3
    • 33745963889 scopus 로고    scopus 로고
    • A Security Architecture for Mobile Wireless Sensor Networks
    • August
    • S. Schmidt, H. Krahn, S. Fischer, and D. Wätjen, " A Security Architecture for Mobile Wireless Sensor Networks," ESAS, August 2004.
    • (2004) ESAS
    • Schmidt, S.1    Krahn, H.2    Fischer, S.3    Wätjen, D.4
  • 5
    • 27944459744 scopus 로고    scopus 로고
    • Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
    • D. Liu, P. Ning, and W. Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," ICDCS, 2005.
    • (2005) ICDCS
    • Liu, D.1    Ning, P.2    Du, W.3
  • 6
    • 47949128837 scopus 로고    scopus 로고
    • Localization of wireless sensor networks with a mobile Beacon
    • October
    • R. Peng and M. L. Sichitiu, "Localization of wireless sensor networks with a mobile Beacon," MASS, October 2004.
    • (2004) MASS
    • Peng, R.1    Sichitiu, M.L.2
  • 7
    • 2942668036 scopus 로고    scopus 로고
    • Comparison of distributed localization algorithm for sensor network with a mobile beacon
    • March
    • G.-L. Sun and W. Guo, "Comparison of distributed localization algorithm for sensor network with a mobile beacon," ICNSC, March 2004.
    • (2004) ICNSC
    • Sun, G.-L.1    Guo, W.2
  • 8
    • 79955500345 scopus 로고    scopus 로고
    • Localization in Sensor Networks with Fading and Mobility
    • September
    • P. Bergamo and G. Mazzini, "Localization in Sensor Networks with Fading and Mobility," PIMRC, September 2002.
    • (2002) PIMRC
    • Bergamo, P.1    Mazzini, G.2
  • 9
    • 3042819146 scopus 로고    scopus 로고
    • Distributed online localization in sensor networks using a moving target
    • April
    • A. Galstyan, B. Krishnamachari, K. Lerman, and S. Pattem, "Distributed online localization in sensor networks using a moving target," IPSN, April 2004.
    • (2004) IPSN
    • Galstyan, A.1    Krishnamachari, B.2    Lerman, K.3    Pattem, S.4
  • 11
    • 11244273945 scopus 로고    scopus 로고
    • Localization for mobile sensor networks
    • September
    • [11]L. Hu and D. Evans, "Localization for mobile sensor networks," MOBICOM, September 2004.
    • (2004) MOBICOM
    • Hu, L.1    Evans, D.2
  • 12
    • 1542317849 scopus 로고    scopus 로고
    • Secure verification of location claims
    • September
    • [12]N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," WiSE, September 2003.
    • (2003) WiSE
    • Sastry, N.1    Shankar, U.2    Wagner, D.3
  • 14
    • 4544258840 scopus 로고    scopus 로고
    • A cooperative intrusion detection system for ad hoc networks
    • October
    • Y. A. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," SASN, October 2003.
    • (2003) SASN
    • Huang, Y.A.1    Lee, W.2
  • 15
    • 34547371033 scopus 로고    scopus 로고
    • The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
    • October
    • M. Pirretti, S. Zhu, V. Narayanan, P. McDaniel, M. Kandemir, and R. Brooks, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense," ICADSN, October 2005.
    • (2005) ICADSN
    • Pirretti, M.1    Zhu, S.2    Narayanan, V.3    McDaniel, P.4    Kandemir, M.5    Brooks, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.