메뉴 건너뛰기




Volumn 31, Issue 18, 2008, Pages 4324-4332

Group-based intrusion detection system in wireless sensor networks

Author keywords

Detection accuracy; False alarm; Intrusion detection scheme; Security; Wireless sensor networks

Indexed keywords

ALARM SYSTEMS; ALGORITHMS; COMPUTER CRIME; ERRORS; HYBRID SENSORS; SENSOR NETWORKS; SENSORS; SIGNAL DETECTION; TELECOMMUNICATION EQUIPMENT; WIRELESS SENSOR NETWORKS;

EID: 56949096891     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.06.020     Document Type: Article
Times cited : (69)

References (20)
  • 2
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1 2 (2003) 293-315
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 3
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, November 2002, pp. 41-47.
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, November 2002, pp. 41-47.
  • 4
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perring, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 2003, pp. 197-213.
    • H. Chan, A. Perring, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 2003, pp. 197-213.
  • 5
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, October 2003, pp. 52-61.
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, October 2003, pp. 52-61.
  • 6
    • 4544293215 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: Proceedings of the 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks, 2003, pp. 72-82.
    • D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: Proceedings of the 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks, 2003, pp. 72-82.
  • 7
    • 33749664149 scopus 로고    scopus 로고
    • G. Li, J. He, Y. Fu, Key management in sensor networks, in: Proceedings of the International Conference on Wireless Algorithms, Systems and Applications 2006, August 2006, pp. 457-466.
    • G. Li, J. He, Y. Fu, Key management in sensor networks, in: Proceedings of the International Conference on Wireless Algorithms, Systems and Applications 2006, August 2006, pp. 457-466.
  • 8
    • 31844436263 scopus 로고    scopus 로고
    • M. Moharrum, M. Eltoweissy, A study of static versus dynamic keying schemes in sensor networks, in: Proceedings of the Second ACM international workshop on performance evaluation of wireless Ad Hoc, sensor, and ubiquitous networks, 2005, pp. 122-129.
    • M. Moharrum, M. Eltoweissy, A study of static versus dynamic keying schemes in sensor networks, in: Proceedings of the Second ACM international workshop on performance evaluation of wireless Ad Hoc, sensor, and ubiquitous networks, 2005, pp. 122-129.
  • 11
    • 84883897746 scopus 로고    scopus 로고
    • G. Jolly, M.C. Kuscu, P. Kokate, M. Younis, A low-energy key management protocol for wireless sensor networks, in: Proc. of Eighth IEEE international Symposium on Computers and Communications, June, 2003, pp. 335-340.
    • G. Jolly, M.C. Kuscu, P. Kokate, M. Younis, A low-energy key management protocol for wireless sensor networks, in: Proc. of Eighth IEEE international Symposium on Computers and Communications, June, 2003, pp. 335-340.
  • 12
    • 35248860267 scopus 로고    scopus 로고
    • G. Li, J. He, Y. Fu, A group-based dynamic key management scheme in wireless sensor networks, in: Proceedings of the 21st International Conference on Advanced Information Networking and Applications, 2007, pp. 127-132.
    • G. Li, J. He, Y. Fu, A group-based dynamic key management scheme in wireless sensor networks, in: Proceedings of the 21st International Conference on Advanced Information Networking and Applications, 2007, pp. 127-132.
  • 13
    • 3142684688 scopus 로고    scopus 로고
    • S. Doumit, D.P. Agrawal, Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network, in: Proceedings of the 2003 IEEE Military Communications Conference, vol. 22, no. 1, 2003, pp. 609-614.
    • S. Doumit, D.P. Agrawal, Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network, in: Proceedings of the 2003 IEEE Military Communications Conference, vol. 22, no. 1, 2003, pp. 609-614.
  • 14
    • 33845719807 scopus 로고    scopus 로고
    • eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
    • Su W., Chang K., and Kuo Y. eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks 51 4 (2007) 1151-1168
    • (2007) Computer Networks , vol.51 , Issue.4 , pp. 1151-1168
    • Su, W.1    Chang, K.2    Kuo, Y.3
  • 15
    • 18844454790 scopus 로고    scopus 로고
    • A. Agah, S. Das, K. Basu, M. Asadi, Intrusion detection in sensor networks: a non-cooperative game approach, in: Proceedings of the Third IEEE International Symposium on Network Computing and Applications, August 2004, pp. 343-346.
    • A. Agah, S. Das, K. Basu, M. Asadi, Intrusion detection in sensor networks: a non-cooperative game approach, in: Proceedings of the Third IEEE International Symposium on Network Computing and Applications, August 2004, pp. 343-346.
  • 16
    • 32144435943 scopus 로고    scopus 로고
    • A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, H. Wong, Decentralized intrusion detection in wireless sensor networks, in: Proceedings of the First ACM international workshop on Quality of service & security in wireless and mobile networks, 2005, pp. 16-23.
    • A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, H. Wong, Decentralized intrusion detection in wireless sensor networks, in: Proceedings of the First ACM international workshop on Quality of service & security in wireless and mobile networks, 2005, pp. 16-23.
  • 17
    • 34548364110 scopus 로고    scopus 로고
    • F. Liu, X. Cheng, D. Chen, Insider attacker detection in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications, 2007, pp. 1937-1945.
    • F. Liu, X. Cheng, D. Chen, Insider attacker detection in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications, 2007, pp. 1937-1945.
  • 18
    • 33745629327 scopus 로고    scopus 로고
    • A. Meka, A.K. Singh, Distributed Spatial Clustering in Sensor Networks, Lecture Notes in Computer Science 3896, Springer Verlag, Heidelberg, Germany, 2006, pp. 980-1000.
    • A. Meka, A.K. Singh, Distributed Spatial Clustering in Sensor Networks, Lecture Notes in Computer Science 3896, Springer Verlag, Heidelberg, Germany, 2006, pp. 980-1000.
  • 20
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • Hodge V.J., and Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review 22 2 (2004) 85-126
    • (2004) Artificial Intelligence Review , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.J.1    Austin, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.