메뉴 건너뛰기




Volumn 2, Issue 2, 2009, Pages 105-115

LAID: A learning automata-based scheme for intrusion detection in wireless sensor networks

Author keywords

Adaptive learning; Intrusion detection; Learning automata; Performance evaluation; Security of wireless sensor networks

Indexed keywords

AUTOMATA THEORY; COMPUTER NETWORK PERFORMANCE EVALUATION; INTRUSION DETECTION;

EID: 67749133733     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.74     Document Type: Article
Times cited : (41)

References (26)
  • 3
    • 27644599432 scopus 로고    scopus 로고
    • ARRIVE: Algorithm for robust routing in volatile environments
    • Technical Report UCB//CSD-03-1233, University of California at Berkeley
    • Karlof C, Li Y, Polastre J. ARRIVE: algorithm for robust routing in volatile environments. Technical Report UCB//CSD-03-1233, University of California at Berkeley, 2003.
    • (2003)
    • Karlof, C.1    Li, Y.2    Polastre, J.3
  • 4
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks. Proceedings of ACM SenSys, 2004.
    • (2004) Proceedings of ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 5
    • 36349021963 scopus 로고    scopus 로고
    • Security for wireless sensor networks
    • Chapter 1. Kluwer Academic Publishers: Norwell
    • Avancha A, Undercoffer J, Joshi A, Pinkston J. Security for wireless sensor networks. In Wireless Sensor Networks, Chapter 1. Kluwer Academic Publishers: Norwell, 2004; 253-275.
    • (2004) Wireless Sensor Networks , pp. 253-275
    • Avancha, A.1    Undercoffer, J.2    Joshi, A.3    Pinkston, J.4
  • 6
    • 2942656255 scopus 로고    scopus 로고
    • Secure routinginwireless sensor networks: Attacks and countermeasures
    • Karlof C, Wagner D. Secure routinginwireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1: 293-315.
    • (2003) Ad Hoc Networks , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine; 1999; 13(6): 24-30.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 11
    • 53849148915 scopus 로고    scopus 로고
    • Chandrasekar R, Misra S, Obaidat MS. FORK: a novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks. Computer Communications 2008; (in press). 31(16): 3855-3869.
    • Chandrasekar R, Misra S, Obaidat MS. FORK: a novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks. Computer Communications 2008; (in press). 31(16): 3855-3869.
  • 12
    • 44349137568 scopus 로고    scopus 로고
    • Chandrasekar R, Obaidat MS, Misra S, Peña-Mora F. A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis. SIMULATION: Transactions of the Society for Modeling and Simulation International 2008; 84(2/3): 131-146.
    • Chandrasekar R, Obaidat MS, Misra S, Peña-Mora F. A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis. SIMULATION: Transactions of the Society for Modeling and Simulation International 2008; 84(2/3): 131-146.
  • 14
    • 33749041485 scopus 로고    scopus 로고
    • Applying intrusion detection systems to wireless sensor networks
    • Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. Proceedings of IEEE CCNC, 2006.
    • (2006) Proceedings of IEEE CCNC
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 16
    • 80053424324 scopus 로고    scopus 로고
    • Intrusion detection and failure recovery in sensor nodes
    • Tagungsband INFORMATIK 2005 Workshop Proceedings, Heidelberg, Germany, September, Springer-Verlag
    • Vogt H, Ringwald M, Strasser M. Intrusion detection and failure recovery in sensor nodes. Tagungsband INFORMATIK 2005 Workshop Proceedings, LNCS, Heidelberg, Germany, September 2005; Springer-Verlag.
    • (2005) LNCS
    • Vogt, H.1    Ringwald, M.2    Strasser, M.3
  • 18
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusion via sampling: A game theoretic approach
    • Kodialam M, Lakshman TV. Detecting network intrusion via sampling: a game theoretic approach, Proceedings of IEEE INFOCOM, 2003.
    • (2003) Proceedings of IEEE INFOCOM
    • Kodialam, M.1    Lakshman, T.V.2
  • 21
    • 0036896965 scopus 로고    scopus 로고
    • Discretized learning automata solutions to the capacity assignment problem for prioritized networks
    • Oommen BJ, Roberts TD. Discretized learning automata solutions to the capacity assignment problem for prioritized networks. IEEE Transactions on Systems, Man, and Cybernetics 2002; 32(6): 821-831.
    • (2002) IEEE Transactions on Systems, Man, and Cybernetics , vol.32 , Issue.6 , pp. 821-831
    • Oommen, B.J.1    Roberts, T.D.2
  • 23
    • 0032651125 scopus 로고    scopus 로고
    • Ott TJ, Lakshman TV, Wong LH. SRED: Stabilized RED. Proceedings of INFOCOM, 1999; 1346-1355.
    • Ott TJ, Lakshman TV, Wong LH. SRED: Stabilized RED. Proceedings of INFOCOM, 1999; 1346-1355.
  • 24
    • 34147120474 scopus 로고
    • Anote ontwo problemsinconnection with graphs
    • Dijkstra EW. Anote ontwo problemsinconnection with graphs. Numerische Mathematik 1959; 1: 269-2271.
    • (1959) Numerische Mathematik , vol.1 , pp. 269-2271
    • Dijkstra, E.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.