메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Intrusion detection based on traffic analysis in wireless sensor networks

Author keywords

Attack detection; DoS attacks; Intrusion detection; Selective forwarding; Wireless sensor networks

Indexed keywords

ATTACK DETECTION; COMMUNICATION COST; COMPUTATIONAL REQUIREMENTS; DOS ATTACKS; INTER-ARRIVAL TIME; INTRUSION DETECTION METHOD; SELECTIVE FORWARDING; THRESHOLDING TECHNIQUES; TIME WINDOWS; TRAFFIC ANALYSIS; TRAFFIC INTENSITY; TRAFFIC PARAMETERS; TRANSMIT DATA; WIRELESS SENSOR;

EID: 77955614353     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOCC.2010.5510642     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 3
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
    • D.R. Raymond, S.F Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, v. 7, issue 1, pp. 74-81, 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 7
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks
    • November
    • B. Xiao, B. Yu, C. Gao, "CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks," Journal of Parallel and Distributed Computing, v. 67, issue 11, pp. 1218-1230, November 2007.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.