|
Volumn , Issue , 2009, Pages 824-828
|
Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
|
Author keywords
Blackhole attack; Cluster head; Intrusion detection; Watch dog
|
Indexed keywords
APPLICATION SPECIFIC;
ATTACK CLUSTER;
BLACK HOLES;
CHEMICAL LEAKAGE;
CLUSTER HEAD;
COMPUTATION RESOURCES;
FOREST FIRE MONITORING;
GLOBAL VIEW;
IN-NETWORK;
INTRUSION DETECTION SYSTEMS;
LIMITED COMMUNICATION;
LOCAL INFORMATION;
MALICIOUS BEHAVIOR;
MALICIOUS SOFTWARE;
MILITARY SURVEILLANCE;
PERFORMANCE EVALUATION;
REALISTIC MODELING;
COMPUTER CRIME;
COMPUTER NETWORK PERFORMANCE EVALUATION;
COMPUTER SCIENCE;
DEFORESTATION;
DETECTORS;
INFORMATION TECHNOLOGY;
SENSOR NETWORKS;
SENSOR NODES;
TELECOMMUNICATION EQUIPMENT;
WIRELESS SENSOR NETWORKS;
INTRUSION DETECTION;
COMPUTERS;
INFORMATION RETRIEVAL;
SAFETY;
SENSORS;
TELECOMMUNICATIONS;
|
EID: 77749339862
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCIT.2009.290 Document Type: Conference Paper |
Times cited : (61)
|
References (11)
|