메뉴 건너뛰기




Volumn 59, Issue 1, 2010, Pages 231-241

Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile Ad Hoc networks

Author keywords

Intrusion detection; Intrusion detection system; Mean time to security failure; Mission oriented group communication systems; Mobile ad hoc networks

Indexed keywords

GROUP COMMUNICATION SYSTEMS; HOSTILE ENVIRONMENTS; INSIDER ATTACK; INTRUSION DETECTION SYSTEMS; MEAN TIME TO FAILURE; MISSION EXECUTION; MISSION-ORIENTED GROUP COMMUNICATION SYSTEMS; OPERATIONAL CONDITIONS; OPTIMAL RATE; PARAMETER VALUES; SECURITY ATTACKS; SECURITY FAILURE; STOCHASTIC PETRI NETS; SYSTEM FAILURES; SYSTEM RELIABILITY; TECHNIQUES USED;

EID: 77949264858     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2010.2040534     Document Type: Article
Times cited : (50)

References (31)
  • 1
    • 37949034258 scopus 로고    scopus 로고
    • SPNP Users Manual Version 6
    • Department Electrical Engineering, Duke University
    • G. Ciardo, R. M. Fricks, J. K. Muppala, and K. S. Trivedi, Department Electrical Engineering, Duke University, "SPNP Users Manual Version 6," 1999.
    • (1999)
    • Ciardo, G.1    Fricks, R.M.2    Muppala, J.K.3    Trivedi, K.S.4
  • 2
    • 27644488112 scopus 로고    scopus 로고
    • On the distribution and revocation of cryptographic keys in sensor networks
    • July-Sept
    • H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247, July-Sept. 2005.
    • (2005) IEEE Trans. Dependable and Secure Computing , vol.2 , Issue.3 , pp. 233-247
    • Chan, H.1    Gligor, V.D.2    Perrig, A.3    Muralidharan, G.4
  • 3
    • 28244455776 scopus 로고    scopus 로고
    • On the lifetime of wireless sensor networks
    • Nov
    • Y. Chen and Q. Zhao, "On the lifetime of wireless sensor networks," IEEE Communications Letters, vol. 9, no. 11, pp. 976-978, Nov. 2005.
    • (2005) IEEE Communications Letters , vol.9 , Issue.11 , pp. 976-978
    • Chen, Y.1    Zhao, Q.2
  • 4
    • 77949267289 scopus 로고    scopus 로고
    • Quantitative assessment of operational security: Models and tools Laboratory for Analysis and Architecture of Systems
    • Technical Report 96493, May
    • M. Dacier, Y. Deswarte, and M. Kaâniche, Quantitative assessment of operational security: Models and tools Laboratory for Analysis and Architecture of Systems, Technical Report 96493, May 1996.
    • (1996)
    • Dacier, M.1    Deswarte, Y.2    Kaâniche, M.3
  • 6
    • 77949269102 scopus 로고    scopus 로고
    • Byzantine failures and security: Arbitrary is not (always) random Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences
    • Technical Report IC/2003/20
    • F. C. Gärtner, Byzantine failures and security: Arbitrary is not (always) random Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences, Technical Report IC/2003/20, 2003.
    • (2003)
    • Gärtner, F.C.1
  • 7
    • 41049089099 scopus 로고    scopus 로고
    • Node density control for maximizing wireless sensor network lifetime
    • March
    • M. Esseghir and N. Bouabdallah, "Node density control for maximizing wireless sensor network lifetime," Int'l Journal of Network Management, vol. 18, no. 2, pp. 159-170, March 2008.
    • (2008) Int'l Journal of Network Management , vol.18 , Issue.2 , pp. 159-170
    • Esseghir, M.1    Bouabdallah, N.2
  • 8
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • April
    • E. Jonsson and T. Olovsson, "A quantitative model of the security intrusion process based on attacker behavior," IEEE Trans. Software Engineering, vol. 23, no. 4, pp. 235-245, April 1997.
    • (1997) IEEE Trans. Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 9
    • 77949274695 scopus 로고    scopus 로고
    • T. Karygiannis and L. Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.: National Institute of Standards and Technology (NIST), 2002, pp. 800-48, Special Publication.
    • T. Karygiannis and L. Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.: National Institute of Standards and Technology (NIST), 2002, pp. 800-48, Special Publication.
  • 10
    • 77949272825 scopus 로고    scopus 로고
    • The utility of partial knowledge in behavior models: An evaluation for intrusion detection
    • Z. Li and A. Das, "The utility of partial knowledge in behavior models: An evaluation for intrusion detection," Int'l Journal of Network Security, vol. 1, no. 3, pp. 138-146, 2005.
    • (2005) Int'l Journal of Network Security , vol.1 , Issue.3 , pp. 138-146
    • Li, Z.1    Das, A.2
  • 11
    • 24344463001 scopus 로고    scopus 로고
    • Probabilistic power management for wireless ad hoc networks
    • Oct
    • Z. Li and B. Li, "Probabilistic power management for wireless ad hoc networks," ACM Mobile Networks and Applications, vol. 10, no. 5, pp. 771-782, Oct. 2005.
    • (2005) ACM Mobile Networks and Applications , vol.10 , Issue.5 , pp. 771-782
    • Li, Z.1    Li, B.2
  • 13
    • 4544291032 scopus 로고    scopus 로고
    • System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-spoke Technology
    • July/Aug
    • Y. Ma and J. H. Aylor, "System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-spoke Technology," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 286-294, July/Aug. 2004.
    • (2004) IEEE Trans. Mobile Computing , vol.3 , Issue.3 , pp. 286-294
    • Ma, Y.1    Aylor, J.H.2
  • 14
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • B. B. Madan, K. G. Popstojanova, K. Vaidyanathan, and K. S. Trivedi, "A method for modeling and quantifying the security attributes of intrusion tolerant systems," Performance Evaluation, vol. 56, no. 1-4, pp. 167-186, 2004.
    • (2004) Performance Evaluation , vol.56 , Issue.1-4 , pp. 167-186
    • Madan, B.B.1    Popstojanova, K.G.2    Vaidyanathan, K.3    Trivedi, K.S.4
  • 16
    • 0036969415 scopus 로고    scopus 로고
    • Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks
    • E. Melo and M. Liu, "Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks," IEEE Globecom, pp. 21-25, 2002.
    • (2002) IEEE Globecom , pp. 21-25
    • Melo, E.1    Liu, M.2
  • 18
    • 84874825833 scopus 로고    scopus 로고
    • A game theoretic formulation for intrusion detection in mobile ad hoc networks
    • A. Patcha and J. M. Park, "A game theoretic formulation for intrusion detection in mobile ad hoc networks," Int'l Journal of Network Security, vol. 2, no. 2, pp. 131-137, 2006.
    • (2006) Int'l Journal of Network Security , vol.2 , Issue.2 , pp. 131-137
    • Patcha, A.1    Park, J.M.2
  • 29
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area rekeying algorithms for secure wireless group communications
    • C. Zhang, B. DeCleene, J. Kurose, and D. Towsley, "Comparison of inter-area rekeying algorithms for secure wireless group communications," Performance Evaluation, vol. 49, no. 1/4, pp. 1-20, 2002.
    • (2002) Performance Evaluation , vol.49 , Issue.1-4 , pp. 1-20
    • Zhang, C.1    DeCleene, B.2    Kurose, J.3    Towsley, D.4
  • 30
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y. A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, pp. 545-556, 2003.
    • (2003) Wireless Networks , vol.9 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.A.3
  • 31
    • 19544370042 scopus 로고    scopus 로고
    • Energy efficient of large-scale wireless networks: Proactive versus reactive networking
    • May
    • Q. Zhao and L. Tong, "Energy efficient of large-scale wireless networks: Proactive versus reactive networking," IEEE Journal on Selected Areas in Communications, vol. 23, no. 5, pp. 1100-1112, May 2005.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.5 , pp. 1100-1112
    • Zhao, Q.1    Tong, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.