메뉴 건너뛰기




Volumn , Issue , 2009, Pages 238-245

A new method for intrusion detection on hierarchical wireless sensor networks

Author keywords

Anomaly detection; Attack behaviors; Countermeasures; Intrusion detection; Wireless Sensor Networks

Indexed keywords

ANOMALY DETECTION; ATTACK BEHAVIOR; ATTACK BEHAVIORS; BATTLEFIELD DATA; COUNTERMEASURES; ISOLATION TABLE; PERSONAL HEALTH; WIRELESS INTRUSION; WIRELESS SENSOR NODE;

EID: 70349120334     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1516241.1516282     Document Type: Conference Paper
Times cited : (30)

References (28)
  • 3
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Bhuse, V, and Gupta, A. 2006. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, Vol. 15, pp 33-51.
    • (2006) Journal of High Speed Networks , vol.15 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 10
    • 84889340710 scopus 로고    scopus 로고
    • Karl, H. and Willig, A. 2005. Protocols and Architectures for Wireless Sensor Networks. C. John Wiley & Sons.
    • Karl, H. and Willig, A. 2005. Protocols and Architectures for Wireless Sensor Networks. C. John Wiley & Sons.
  • 11
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and Countermeasures
    • Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and Countermeasures. Ad Hoc Networks, Vol. 1, Issue 2-3, pp. 293-315.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 12
    • 20344364107 scopus 로고    scopus 로고
    • Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
    • Technical Report TR-CTIT-04-07, University of Twente, Computer Science Department
    • Law, Y W., Doumen, J., and Hartel, P. 2004. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. Technical Report TR-CTIT-04-07, University of Twente, Computer Science Department.
    • (2004)
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 18
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • Qing, E., and Perrig, A. 2004. Designing Secure Sensor Networks. IEEE Wireless Communication, Vol. 11, Issue 6, pp. 38-43.
    • (2004) IEEE Wireless Communication , vol.11 , Issue.6 , pp. 38-43
    • Qing, E.1    Perrig, A.2
  • 19
    • 33745914280 scopus 로고    scopus 로고
    • Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
    • Qing, L., Zhu, Q., and Wang, M. 2006. Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks. Computer Communications, Vol. 29, Issue 12, pp 2230-2237.
    • (2006) Computer Communications , vol.29 , Issue.12 , pp. 2230-2237
    • Qing, L.1    Zhu, Q.2    Wang, M.3
  • 22
    • 70349141880 scopus 로고    scopus 로고
    • Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code. C. John Wiley & Sons, Second edition.
    • Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code. C. John Wiley & Sons, Second edition.
  • 24
    • 33746150390 scopus 로고    scopus 로고
    • Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
    • Sobh, T. S., 2006. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & interfaces, Vol. 28, Issue. 6, pp. 670-694.
    • (2006) Computer Standards & interfaces , vol.28 , Issue.6 , pp. 670-694
    • Sobh, T.S.1
  • 26
    • 33845719807 scopus 로고    scopus 로고
    • eHIP: An Energy-Efficient Hybrid Intrusion Prohibition System for Cluster-based Wireless Sensor Networks
    • Su, W. T., Chang, K. M., and Kuo, Y H. 2007. eHIP: An Energy-Efficient Hybrid Intrusion Prohibition System for Cluster-based Wireless Sensor Networks. Computer Networks, Vol. 51, Issue 4, pp. 1151-1168.
    • (2007) Computer Networks , vol.51 , Issue.4 , pp. 1151-1168
    • Su, W.T.1    Chang, K.M.2    Kuo, Y.H.3
  • 28
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Wood, A. D., and Stankovic, J. A. 2002. Denial of Service in Sensor Networks. IEEE Computer, Vol. 35, Issue 10, pp. 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.