메뉴 건너뛰기




Volumn , Issue , 2010, Pages 711-716

Intrusion detection of sinkhole attacks in large-scale wireless sensor networks

Author keywords

Algorithm; Intrusion detection; Sensor network; Sinkhole attack; Wireless network

Indexed keywords

CHANGE POINT DETECTION; COMPROMISED NODES; DETECTION PROBLEMS; EXTENSIVE SIMULATIONS; LARGE-SCALE WIRELESS SENSOR NETWORKS; MALICIOUS NODES; NOVEL ALGORITHM; SINKHOLE ATTACK; UNIQUE FEATURES; VARIOUS ATTACKS;

EID: 77957658759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCINS.2010.5541872     Document Type: Conference Paper
Times cited : (46)

References (12)
  • 1
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • September
    • C. Karlof, and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " AdHoc Networks Journal, Vol. 1, No. 23, pp. 293-315, September 2003.
    • (2003) AdHoc Networks Journal , vol.1 , Issue.23 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 3
    • 70349686596 scopus 로고    scopus 로고
    • A Chain reaction DoS attack on 3G networks: Analysis and defenses
    • April
    • B. Zhao, C. Chi, W. Gao, S. Zhu, and G. Cao, "A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses, " in Proc. of IEEE INFOCOM, April 2009.
    • (2009) Proc. of IEEE INFOCOM
    • Zhao, B.1    Chi, C.2    Gao, W.3    Zhu, S.4    Cao, G.5
  • 7
    • 42549138436 scopus 로고    scopus 로고
    • On the intruder detection for sinkhole attack in wireless sensor networks
    • Edith C. H. Ngai, Jiangchuan Liu, and Michael R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, " in Proc. of IEEE ICC, pp. 3383-3389, 2006.
    • (2006) Proc. of IEEE ICC , pp. 3383-3389
    • Ngai, E.C.H.1    Liu, J.2    Lyu, M.R.3
  • 10
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in sensor networks
    • Article number 12, March
    • Q. Zhang, T. Yu, and P. Ning, "A Framework for Identifying Compromised Nodes in Sensor Networks, " ACM Transactions on Information and System Security, Vol. 11, No. 3, Article number 12, March 2008.
    • (2008) ACM Transactions on Information and System Security , vol.11 , Issue.3
    • Zhang, Q.1    Yu, T.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.