메뉴 건너뛰기




Volumn 7, Issue 8, 2009, Pages 1489-1500

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications

Author keywords

Mal packets; Percolation; Propagation dynamics; Wireless sensor networks

Indexed keywords

COMPONENT SIZE; CONNECTION RATIO; INFORMATION CONFIDENTIALITY; MAL-PACKETS; NETWORK DENSITY; OPERATING SYSTEMS; PACKET PROPAGATION; PERCOLATION; PERCOLATION THEORY; PERCOLATION THRESHOLDS; PHYSICAL SECURITY; PROPAGATION DYNAMICS; RANDOM GRAPH THEORY; SELF-PROPAGATING; SELFPROPAGATION; SERVICE AVAILABILITY; SURROUNDING ENVIRONMENT;

EID: 67650642299     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.04.003     Document Type: Article
Times cited : (23)

References (25)
  • 1
    • 85048913988 scopus 로고    scopus 로고
    • Towards a resilient operating system for wireless sensor networks
    • Boston, MA, June
    • H. Kim, H. Cha, Towards a resilient operating system for wireless sensor networks, in: USENIX Annual Technical Conference, Boston, MA, June 2006, pp. 103-108.
    • (2006) USENIX Annual Technical Conference , pp. 103-108
    • Kim, H.1    Cha, H.2
  • 2
    • 0041472588 scopus 로고    scopus 로고
    • S. Bandyopadhyay, E.J. Coyle, An energy efficient hierarchical clustering algorithm for wireless sensor networks, in: IEEE INFOCOM 2003, San Francisco, CA, 2003, pp. 1713-1723.
    • S. Bandyopadhyay, E.J. Coyle, An energy efficient hierarchical clustering algorithm for wireless sensor networks, in: IEEE INFOCOM 2003, San Francisco, CA, 2003, pp. 1713-1723.
  • 3
    • 67650595777 scopus 로고    scopus 로고
    • URL
    • URL: .
  • 4
    • 34748826946 scopus 로고    scopus 로고
    • Memory safety and untrusted extensions for TinyOS
    • Tech Report UUCS-05-009, University of Utah, School of Computing
    • J. Regehr, N. Cooprider, W. Archer, E. Eide, Memory safety and untrusted extensions for TinyOS, Tech Report UUCS-05-009, University of Utah, School of Computing, 2005.
    • (2005)
    • Regehr, J.1    Cooprider, N.2    Archer, W.3    Eide, E.4
  • 6
    • 34547408793 scopus 로고    scopus 로고
    • Understanding the causes of packet delivery success and failure in dense wireless sensor networks
    • Boulder, CO
    • K. Srinivasan, P. Dutta, A. Tavakoli, P. Levis, Understanding the causes of packet delivery success and failure in dense wireless sensor networks, in: ACM Sensys'06, Boulder, CO, 2006, pp. 419-420.
    • (2006) ACM Sensys'06 , pp. 419-420
    • Srinivasan, K.1    Dutta, P.2    Tavakoli, A.3    Levis, P.4
  • 9
    • 67650597398 scopus 로고    scopus 로고
    • G. Yan, S. Eidenbenz, Modeling propagation dynamics of bluetooth worms, in: IEEE ICDCS'07, Toronto, Canada, June 2007.
    • G. Yan, S. Eidenbenz, Modeling propagation dynamics of bluetooth worms, in: IEEE ICDCS'07, Toronto, Canada, June 2007.
  • 10
    • 67650577980 scopus 로고    scopus 로고
    • S.A. Khayam, H. Radha, A topologically-aware worm propagation model for wireless sensor networks, in: IEEE ICDCS International Workshop on Security in Distributed Computing Systems, June 2005, pp. 210-216.
    • S.A. Khayam, H. Radha, A topologically-aware worm propagation model for wireless sensor networks, in: IEEE ICDCS International Workshop on Security in Distributed Computing Systems, June 2005, pp. 210-216.
  • 11
    • 33845945205 scopus 로고    scopus 로고
    • Modeling node compromise spread in wireless sensor networks using epidemic theory
    • P. De, Y. Liu, S.K. Das, Modeling node compromise spread in wireless sensor networks using epidemic theory, in: International Workshop on Wireless Mobile Multimedia, 2006, pp. 237-243
    • (2006) International Workshop on Wireless Mobile Multimedia , pp. 237-243
    • De, P.1    Liu, Y.2    Das, S.K.3
  • 12
    • 0013465021 scopus 로고    scopus 로고
    • Random graphs as models of networks
    • Bornholdt S., and Schuster H.G. (Eds), Wiley-VCH, Berlin
    • Newman M.E.J. Random graphs as models of networks. In: Bornholdt S., and Schuster H.G. (Eds). Handbook of Graphs and Networks (2003), Wiley-VCH, Berlin
    • (2003) Handbook of Graphs and Networks
    • Newman, M.E.J.1
  • 14
    • 18844399081 scopus 로고    scopus 로고
    • TOSSIM: Accurate and scalable simulation of entire TinyOS applications
    • Los Angeles, CA
    • P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: ACM Sensys 2003, Los Angeles, CA, 2003, pp. 126-137.
    • (2003) ACM Sensys 2003 , pp. 126-137
    • Levis, P.1    Lee, N.2    Welsh, M.3    Culler, D.4
  • 15
    • 34248995311 scopus 로고    scopus 로고
    • Modeling and simulation study of the propagation and defense of internet email worm
    • Zou C.C., Towsley D., and Gong W. Modeling and simulation study of the propagation and defense of internet email worm. IEEE Transaction on Dependable and Secure Computing 4 2 (2007) 105-118
    • (2007) IEEE Transaction on Dependable and Secure Computing , vol.4 , Issue.2 , pp. 105-118
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 16
    • 67650573993 scopus 로고    scopus 로고
    • URL
    • TinyOS, URL: .
  • 17
    • 67650628573 scopus 로고    scopus 로고
    • CrossBow Corporation, URL
    • CrossBow Corporation, URL: .
  • 18
    • 67650624686 scopus 로고    scopus 로고
    • Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard, 802.15.4-2003, May 2003, ISBN 0-7381-3677-5.
    • Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard, 802.15.4-2003, May 2003, ISBN 0-7381-3677-5.
  • 19
    • 84892785680 scopus 로고    scopus 로고
    • Improving sensor network immunity under worm attacks: A software diversity approach
    • Hong Kong
    • Y. Yang, S. Zhu, G. Cao, Improving sensor network immunity under worm attacks: a software diversity approach, in: ACM Mobihoc'08, Hong Kong, 2008.
    • (2008) ACM Mobihoc'08
    • Yang, Y.1    Zhu, S.2    Cao, G.3
  • 21
    • 21844473050 scopus 로고    scopus 로고
    • Comparison of routing metrics for static multi-hop wireless networks
    • Portland, OR, September
    • R. Draves, J. Padhye, B. Zill, Comparison of routing metrics for static multi-hop wireless networks, in: ACM SIGCOM'04, Portland, OR, September 2004, pp. 133-144.
    • (2004) ACM SIGCOM'04 , pp. 133-144
    • Draves, R.1    Padhye, J.2    Zill, B.3
  • 22
    • 77954257263 scopus 로고    scopus 로고
    • Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links
    • November, Sydney, Australia, pp
    • Y. Gu, T. He, Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links, in: ACM Sensys'07, November 2007, Sydney, Australia, pp. 321-344.
    • (2007) ACM Sensys'07 , pp. 321-344
    • Gu, Y.1    He, T.2
  • 24
    • 70349659420 scopus 로고    scopus 로고
    • A social network based patching scheme for worm containment in cellular networks
    • To appear in, Rio de Janeiro, Brazil
    • Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci, A social network based patching scheme for worm containment in cellular networks, To appear in IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
    • (2009) IEEE INFOCOM
    • Zhu, Z.1    Cao, G.2    Zhu, S.3    Ranjan, S.4    Nucci, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.