메뉴 건너뛰기




Volumn , Issue , 2007, Pages 109-115

DoS detection in cluster-Based sensor networks

Author keywords

Clustering; Denial of Service; Intrusion detection; Sensor networks

Indexed keywords

CLUSTER HEADS; CLUSTER TECHNOLOGIES; CLUSTER-BASED; CLUSTER-BASED SENSOR NETWORKS; CLUSTERING; CRITICAL TASKS; DENIAL OF SERVICE; DOS ATTACKS; DROP DATUM; INTRUSION DETECTION SYSTEMS; REDUNDANT DATUM; WIRELESS ENVIRONMENTS;

EID: 62649122300     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (24)
  • 1
    • 4143130116 scopus 로고    scopus 로고
    • Computer Emergency Response Team/Coordination Center
    • Computer Emergency Response Team/Coordination Center, "Denial of Service Attacks," 2001, http://www.cert.org/tech-tips/denial-of-service. html.
    • (2001) Denial of Service Attacks
  • 3
    • 0041472588 scopus 로고    scopus 로고
    • An energy efficient hierarchical clustering algorithm for wireless sensor networks
    • Seema Bandyopadhyay and E.J. Coyle (2003), An energy efficient hierarchical clustering algorithm for wireless sensor networks, INFOCOM 2003, Vol.3, pp. 1713-1723.
    • (2003) INFOCOM 2003 , vol.3 , pp. 1713-1723
    • Bandyopadhyay, S.1    Coyle, E.J.2
  • 7
    • 0037632539 scopus 로고    scopus 로고
    • G.. Gupta and M. Younis (2003), Load-balanced clustering of wireless sensor networks, IEEE International Conference on Communications, 3, pp. 1848-1852.
    • G.. Gupta and M. Younis (2003), Load-balanced clustering of wireless sensor networks, IEEE International Conference on Communications, Vol.3, pp. 1848-1852.
  • 11
    • 84954446828 scopus 로고    scopus 로고
    • Power-efficiency clustering method with power-limit constraint for sensor networks, Power-efficiency clustering method with power-limit constraint for sensor networks
    • Jain-Shing Liu and C.-H. P. Lin (2003), Power-efficiency clustering method with power-limit constraint for sensor networks, Power-efficiency clustering method with power-limit constraint for sensor networks, Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications, pp.129- 136.
    • (2003) Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications , pp. 129-136
    • Liu, J.-S.1    Lin, C.-H.P.2
  • 13
    • 0036964041 scopus 로고    scopus 로고
    • An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol
    • A.Manjeshwar, Qing-An Zeng and D.P. Agrawal (2002), An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol, IEEE Transactions on Parallel and Distributed Systems, Vol.3, No.12, pp.1290-1302.
    • (2002) IEEE Transactions on Parallel and Distributed Systems , vol.3 , Issue.12 , pp. 1290-1302
    • Manjeshwar, A.1    Zeng, Q.-A.2    Agrawal, D.P.3
  • 17
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • G. J. Pottie and W. J. Kaiser (2000), Wireless integrated network sensors, Communications of the ACM, Vol.43, No.5, pp. 51-58.
    • (2000) Communications of the ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 18
    • 33749392079 scopus 로고    scopus 로고
    • An energy-efficient voting-based clustering algorithm for sensor networks, First ACIS International Workshop on Self-Assembling
    • Min Qin and R. Zimmermann (2005), An energy-efficient voting-based clustering algorithm for sensor networks, First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 444-451.
    • (2005) Wireless Networks , pp. 444-451
    • Qin, M.1    Zimmermann, R.2
  • 19
    • 0842331554 scopus 로고    scopus 로고
    • Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
    • R. Rao and G. Kesidis (2003), Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited, IEEE Global Telecommunications Conference, Vol.5, pp.2957-2961.
    • (2003) IEEE Global Telecommunications Conference , vol.5 , pp. 2957-2961
    • Rao, R.1    Kesidis, G.2
  • 23
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A.D. Wood and J. A. Stankovic (2002), Denial of service in sensor networks, IEEE Computer, Vol.35, No.10, pp.54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 24
    • 10944266504 scopus 로고    scopus 로고
    • HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
    • O. Younis and S. Fahmy (2004), HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, Vol. 3, No.4, pp.366-379.
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.