메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE RATE; CONSERVE ENERGY; DENIAL OF SERVICE (DOS) ATTACKS; HOMELAND SECURITY (HLS); HOST-BASED INTRUSION DETECTION; MAC LAYERS; MISSION-CRITICAL APPLICATIONS; NETWORK DEVICES; ON CURRENT (ION); POTENTIAL BENEFITS; RATE LIMITING; RECEIVE MODE; SENSOR NODE (SN); WIRELESS SENSOR NETWORKS (WSNS); WIRELESS SENSORS;

EID: 47949099622     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2007.4455251     Document Type: Conference Paper
Times cited : (20)

References (17)
  • 1
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • April
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in International Workshop on Security Protocols, pp. 172-194, April 1999.
    • (1999) International Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 2
    • 33644854066 scopus 로고    scopus 로고
    • Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
    • March
    • D. Nash, T. Martin, D. Ha, and M. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in IEEE PerCom Workshops, pp. 141-145, March 2005.
    • (2005) IEEE PerCom Workshops , pp. 141-145
    • Nash, D.1    Martin, T.2    Ha, D.3    Hsiao, M.4
  • 3
    • 39749120747 scopus 로고    scopus 로고
    • Batterysensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection
    • Jan
    • T. Buennemeyer, F. Munshi, R. Marchany, and J. Tront, "Batterysensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection," in HICSS, p. 163b, Jan. 2007.
    • (2007) HICSS
    • Buennemeyer, T.1    Munshi, F.2    Marchany, R.3    Tront, J.4
  • 4
    • 33845958392 scopus 로고    scopus 로고
    • Effects of denial of sleep attacks on wireless sensor network MAC protocols
    • June
    • D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, "Effects of denial of sleep attacks on wireless sensor network MAC protocols," in IEEE IAW, pp. 297-304, June 2006.
    • (2006) IEEE IAW , pp. 297-304
    • Raymond, D.1    Marchany, R.2    Brownfield, M.3    Midkiff, S.4
  • 5
    • 0034291065 scopus 로고    scopus 로고
    • Protocols for self-organization of a wireless sensor network
    • Oct
    • K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie, "Protocols for self-organization of a wireless sensor network," IEEE Personal Communications, vol. 7, no. 5, pp. 16-27, Oct. 2000.
    • (2000) IEEE Personal Communications , vol.7 , Issue.5 , pp. 16-27
    • Sohrabi, K.1    Gao, J.2    Ailawadhi, V.3    Pottie, G.4
  • 6
    • 26444451023 scopus 로고    scopus 로고
    • Versatile low power media access for wireless sensor networks
    • Nov
    • J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," in ACM SenSys, pp. 95-107, Nov. 2004.
    • (2004) ACM SenSys , pp. 95-107
    • Polastre, J.1    Hill, J.2    Culler, D.3
  • 7
    • 4344714071 scopus 로고    scopus 로고
    • Medium access control with coordinated adaptive sleeping for wireless sensor networks
    • June
    • W. Ye, J. Heidemann, and D. Estrin, "Medium access control with coordinated adaptive sleeping for wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, June 2004.
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.3 , pp. 493-506
    • Ye, W.1    Heidemann, J.2    Estrin, D.3
  • 8
    • 18844402855 scopus 로고    scopus 로고
    • An adaptive energy-efficient MAC protocol for wireless sensor networks
    • Nov
    • T. van Dam and K. Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks," in ACM SenSys, pp. 171-180, Nov. 2003.
    • (2003) ACM SenSys , pp. 171-180
    • van Dam, T.1    Langendoen, K.2
  • 9
    • 67650304313 scopus 로고    scopus 로고
    • CrossBow Corporation, Accessed May 2006, Online, Available
    • CrossBow Corporation, "Mica2 datasheet," Accessed May 2006. [Online]. Available: http://www.xbow.com/
    • Mica2 datasheet
  • 10
    • 47949084165 scopus 로고    scopus 로고
    • TinyOS community forum, Accessed Aug. 2006, Online, Available
    • "TinyOS community forum," Accessed Aug. 2006. [Online]. Available: http://www.tinyos.net/
  • 11
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • Dec
    • E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, Dec. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 12
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Nov
    • C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in ACM SenSys, pp. 162-175, Nov. 2004.
    • (2004) ACM SenSys , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 13
    • 47949094791 scopus 로고    scopus 로고
    • Scalable, cluster-based anti-replay protection for wireless sensor networks
    • to appear in, June
    • D. Raymond, R. Marchany, and S. Midkiff, "Scalable, cluster-based anti-replay protection for wireless sensor networks," to appear in IEEE IAW, June 2007.
    • (2007) IEEE IAW
    • Raymond, D.1    Marchany, R.2    Midkiff, S.3
  • 16
    • 1342294845 scopus 로고    scopus 로고
    • OPNET Technologies Inc, Accessed Aug. 2006, Online, Available
    • OPNET Technologies Inc., "OPNET Modeler," Accessed Aug. 2006. [Online]. Available: http://www.opnet.com/
    • OPNET Modeler
  • 17
    • 47949131631 scopus 로고    scopus 로고
    • Accessed June 2006, Online, Available
    • "SourceForge," Accessed June 2006. [Online]. Available: http://sourceforge.net/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.