메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2038-2043

Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

HYBRID SENSORS; INTRUSION DETECTION; RELIABILITY; SENSOR NETWORKS; SENSORS;

EID: 58349114050     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICYCS.2008.489     Document Type: Conference Paper
Times cited : (7)

References (13)
  • 1
    • 0027610755 scopus 로고
    • The consensus problem in fault-tolerant computing
    • M. Barborak, A. Dahbura, and M, Malek. The consensus problem in fault-tolerant computing. ACM Computing Surveys, 25(2): 171-220, 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.2 , pp. 171-220
    • Barborak, M.1    Dahbura, A.2    Malek, M.3
  • 2
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • V. Bhuse and A. Gupta. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 15:33-51, 2006.
    • (2006) Journal of High Speed Networks , vol.15 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 4
    • 34247114268 scopus 로고    scopus 로고
    • Diagnosing anomalies and identifying faulty nodes in sensor networks
    • V. Chatzigiannakis and S. Papavassiliou. Diagnosing anomalies and identifying faulty nodes in sensor networks. IEEE Sensors Journal, 7(5):637-645, 2007.
    • (2007) IEEE Sensors Journal , vol.7 , Issue.5 , pp. 637-645
    • Chatzigiannakis, V.1    Papavassiliou, S.2
  • 5
    • 32144435943 scopus 로고    scopus 로고
    • A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pages 16-23, Canada, oct 2005.
    • A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pages 16-23, Canada, oct 2005.
  • 8
    • 35348928856 scopus 로고    scopus 로고
    • C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami. Intrusion detection for routing attacks in sensor networks. Int. Journal of Distributed Sensor Networks, 2:313-332, 2006.
    • C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami. Intrusion detection for routing attacks in sensor networks. Int. Journal of Distributed Sensor Networks, 2:313-332, 2006.
  • 10
    • 33750300697 scopus 로고    scopus 로고
    • LSec: Lightweight security protocol for distributed wireless sensor network
    • 11th IFIP Int. Conf. on Personal Wireless Comm, Albacete, Spain, Sept
    • R. A. Shaikh, S. Lee, M. A. U. Khan, and Y. J. Song. LSec: Lightweight security protocol for distributed wireless sensor network. In 11th IFIP Int. Conf. on Personal Wireless Comm., LNCS 4217, pages 367-377, Albacete, Spain, Sept. 2006.
    • (2006) LNCS , vol.4217 , pp. 367-377
    • Shaikh, R.A.1    Lee, S.2    Khan, M.A.U.3    Song, Y.J.4
  • 12
    • 10944266504 scopus 로고    scopus 로고
    • HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks
    • Oct
    • O. Younis and S. Fahmy. HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Trans. on Mobile Computing, 3(4):366-379, Oct 2004.
    • (2004) IEEE Trans. on Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 13
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • 1 l(3):l-37
    • Q. Zhang, T. Yu, and P. Ning. A framework for identifying compromised nodes in wireless sensor networks. ACM Trans. Inf. Syst. Secur., 1 l(3):l-37, 2008.
    • (2008) ACM Trans. Inf. Syst. Secur
    • Zhang, Q.1    Yu, T.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.