메뉴 건너뛰기




Volumn 17, Issue 2, 2010, Pages 87-102

Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps

Author keywords

intrusion detection; reputation systems; self organizing maps; Wireless sensor networks

Indexed keywords

CO-PROCESSORS; COMPROMISED NODES; COMPUTATIONAL RESOURCES; DISTRIBUTED INTRUSION DETECTION SYSTEMS; ENERGY EFFICIENT; FAST RESPONSE; HIGH POTENTIAL; KERNEL SELF-ORGANIZING MAP; MACHINE LEARNING TECHNIQUES; RE-CONFIGURABLE; REPUTATION SYSTEMS; RESEARCH GROUPS; SCALABLE SOLUTION; SENSOR UNITS; SIDE CHANNEL ATTACK; SOM ALGORITHMS; TESTING RESULTS;

EID: 77954553948     PISSN: 10692509     EISSN: None     Source Type: Journal    
DOI: 10.3233/ICA-2010-0334     Document Type: Conference Paper
Times cited : (33)

References (40)
  • 1
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless Ad Hoc and sensor networks
    • A. Boukerch, L. Xu and K. EL-Khatib, Trust-based Security for Wireless Ad Hoc and Sensor Networks, Comput Commun 30 (2007), 2413-2427.
    • (2007) Comput Commun , vol.30 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 2
    • 24644507953 scopus 로고    scopus 로고
    • On the security of cluster-based communication protocols for wireless sensor networks
    • Apr 17-21 Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D-69121, Germany, 2005
    • A.C. Ferreira, M.A. Vilaca, L.B. Oliveira, E. Habib, H.C. Wong and A.A. Loureiro, On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks, in: Networking-ICN2005, Apr 17-21 2005, vol.3420ofLecture Notes in Computer Science, Springer Verlag, Heidelberg, D-69121, Germany, 2005, pp. 449-458.
    • (2005) Networking-ICN2005 , vol.3420 , pp. 449-458
    • Ferreira, A.C.1    Vilaca, M.A.2    Oliveira, L.B.3    Habib, E.4    Wong, H.C.5    Loureiro, A.A.6
  • 3
    • 0031932940 scopus 로고    scopus 로고
    • Self-organizing maps for outlier detection
    • A. Mufioz and J. Muruzabal, Self-Organizing Maps for Outlier Detection, Neurocomputing 18(1-3) (1998), 33-60.
    • (1998) Neurocomputing , vol.18 , Issue.1-3 , pp. 33-60
    • Mufioz, A.1    Muruzabal, J.2
  • 7
    • 75849150575 scopus 로고    scopus 로고
    • Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
    • Springer
    • C. Wallenta, J. Kim, P.J. Bentley and S. Hailes, Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm, Applied Intelligence, Springer 32(1) (2010), 1-26.
    • (2010) Applied Intelligence , vol.32 , Issue.1 , pp. 1-26
    • Wallenta, C.1    Kim, J.2    Bentley, P.J.3    Hailes, S.4
  • 9
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
    • D. Malan, M. Welsh and M. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEESECON (2004), 71-80.
    • (2004) IEEESECON , pp. 71-80
    • Malan, D.1    Welsh, M.2    Smith, M.3
  • 11
    • 0030157012 scopus 로고    scopus 로고
    • Neural recognition of human pointing gestures in real images
    • Kluwer Academic Publishers
    • E. Littmann, A. Drees and H. Ritter, Neural Recognition of Human Pointing Gestures in Real Images, Neural Processing Letters (1996), 61-71, Kluwer Academic Publishers.
    • (1996) Neural Processing Letters , pp. 61-71
    • Littmann, E.1    Drees, A.2    Ritter, H.3
  • 12
    • 85071222392 scopus 로고    scopus 로고
    • Gcov tool, http://gcc.gnu.org/onlinedocs/gcc/Gcov.html.
    • Gcov Tool
  • 13
    • 77954546683 scopus 로고    scopus 로고
    • Gproftool, http://www.cs.utah.edu/dept/old/texinfo/as/gprof toc.html.
    • Gproftool
  • 15
    • 40649084778 scopus 로고    scopus 로고
    • On multidimensional scaling and the embedding of self-organising maps
    • H. Yin, On multidimensional scaling and the embedding of self-organising maps, Neural Networks 21(2-3) (2008), 160169.
    • (2008) Neural Networks , vol.21 , Issue.2-3 , pp. 160169
    • Yin, H.1
  • 17
    • 77954548310 scopus 로고    scopus 로고
    • Immune systems, http://uhaweb.hartford.edu/bugl/immune. htm.
    • Immune Systems
  • 18
    • 34547813675 scopus 로고    scopus 로고
    • Morphological neural networks and vision based simultaneous localization and mapping
    • I. Villaverde, M. Granaand A. d'Anjou, Morphological Neural Networks and Vision Based Simultaneous Localization and Mapping, Integrated Computer-Aided Engineering 14(No.4) (2007), 355-363.
    • (2007) Integrated Computer-Aided Engineering , vol.14 , Issue.4 , pp. 355-363
    • Villaverde, I.1    Granaand, M.2    D'Anjou, A.3
  • 22
    • 30244475453 scopus 로고
    • A self-organizing neural network for robot motion planning
    • S. Gielen and B. Kappen, eds, Springer Berlin Heidelberg
    • J.M. Vleugels, J.N. Kok and M.H. Overmars, A self-organizing neural network for robot motion planning, in: ICANN 93 Art. Neural Networks Conf. Proc, S. Gielen and B. Kappen, eds, Springer Berlin Heidelberg, 1993, pp. 281-284.
    • (1993) ICANN 93 Art. Neural Networks Conf. Proc , pp. 281-284
    • Vleugels, J.M.1    Kok, J.N.2    Overmars, M.H.3
  • 23
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • J. Newsome, E. Shi, D. Song and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proceedings of IPSN (2004), 259-268.
    • (2004) Proceedings of IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 24
    • 38949156579 scopus 로고    scopus 로고
    • Linear time computation of similari-ty for sequential data
    • K. Rieck and P. Laskov, Linear Time Computation ofSimilari-ty for Sequential Data, Journal of Machine Learning Research 9 (2008), 23-48.
    • (2008) Journal of Machine Learning Research , vol.9 , pp. 23-48
    • Rieck, K.1    Laskov, P.2
  • 25
    • 20344364947 scopus 로고    scopus 로고
    • Function approximation with continuous self-organizing maps using neighboring influence interpolation
    • Berlin, Germany, May
    • M. Aupetit, P. Couturier and P. Massote, Function Approximation with Continuous Self-Organizing Maps Using Neighboring Influence Interpolation, in: Proc. of Neural Computation (NC2000), Berlin, Germany, May 2000.
    • (2000) Proc. of Neural Computation (NC2000)
    • Aupetit, M.1    Couturier, P.2    Massote, P.3
  • 26
    • 77954555423 scopus 로고    scopus 로고
    • Ns-2 Simulator, http://www.isi.edu/nsnam/ns/.
    • Simulator, N.1
  • 27
    • 50249147298 scopus 로고    scopus 로고
    • Rule-based dependency models for security protocol analysis
    • Q. Chen, S. Zhang and Y.P. Chen, Rule-based Dependency Models for Security Protocol Analysis, Integrated Computer- Aided Engineering 15(4) (2008), 369-380.
    • (2008) Integrated Computer- Aided Engineering , vol.15 , Issue.4 , pp. 369-380
    • Chen, Q.1    Zhang, S.2    Chen, Y.P.3
  • 28
  • 32
    • 34547597104 scopus 로고    scopus 로고
    • Improved spiking neural networks for eeg classification and epilepsy and seizure detection
    • S. Ghosh-Dastidar and H. Adeli, Improved Spiking Neural Networks for EEG Classification and Epilepsy and Seizure Detection, Integrated Computer-Aided Engineering 14(No.3) (2007), 187-212.
    • (2007) Integrated Computer-Aided Engineering , vol.14 , Issue.3 , pp. 187-212
    • Ghosh-Dastidar, S.1    Adeli, H.2
  • 34
    • 77954599498 scopus 로고    scopus 로고
    • SOM Algorithm, http://www.ai-junkie.com/ann/som/som2. html.
    • SOM Algorithm
  • 36
    • 0002059002 scopus 로고    scopus 로고
    • Energy Functions for Self-organizing Maps
    • Elsevier, E. Oja and S. Kaski, eds
    • T. Heskes, Energy functions for self-organizing maps, in: Ko-honen Maps. Elsevier, E. Oja and S. Kaski, eds, 1999.
    • (1999) Ko-honen Maps
    • Heskes, T.1
  • 38
    • 24944566827 scopus 로고    scopus 로고
    • Secure routing in sensor networks: Security problem analysis and countermeasures
    • of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D- 69121, Germany
    • Y. Mun and C. Shin, Secure routing in sensor networks: Security problem analysis and countermeasures, in: International Conference on Computational Science and Its Applications - ICCSA 2005, vol.3480 of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D- 69121, Germany (2005), 459-467.
    • (2005) International Conference on Computational Science and Its Applications - ICCSA 2005 , vol.3480 , pp. 459-467
    • Mun, Y.1    Shin, C.2
  • 39
    • 77954556643 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks using re-configurable SORU processor and self-organizing maps
    • Z. Bankovic, J.M. Moya, A. Araujo and J.M. de Goyeneche, Anomaly Detection in Wireless Sensor Networks using Re-configurable SORU Processor and Self-Organizing Maps, Proceedings ofJCRA, (2009).
    • (2009) Proceedings of JCRA
    • Bankovic, Z.1    Moya, J.M.2    Araujo, A.3    De Goyeneche, J.M.4
  • 40
    • 50949089755 scopus 로고    scopus 로고
    • A framework of machine learning based intrusion detection for wireless sensor networks
    • Z. Yu and J. Tsai, A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks, Proceedings of SUTC (2008), 272-279.
    • (2008) Proceedings of SUTC , pp. 272-279
    • Yu, Z.1    Tsai, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.