메뉴 건너뛰기




Volumn , Issue , 2010, Pages

On the use of Unified And-Or fuzzy operator for distributed node exhaustion attack decision-making in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AGGREGATION OPERATOR; ATTACK DETECTION; COMMUNICATION CAPABILITIES; CRITICAL APPLICATIONS; DISTRIBUTED ATTACK; DISTRIBUTED NODES; EMBEDDED SYSTEM DESIGN; FUZZY OPERATORS; MALICIOUS ATTACK; OPTIMAL PARAMETER; REAL TIME SENSING; SENSOR POWER; SIMULATION RESULT; WIRELESS COMMUNICATIONS; WIRELESS SENSOR TECHNOLOGY;

EID: 78549288531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FUZZY.2010.5584421     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 2
    • 78549251230 scopus 로고    scopus 로고
    • A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks
    • Z. A. Baig and A. I. Khan, "A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks," Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects, pp. 277290, 2008.
    • (2008) Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects , pp. 277290
    • Baig, Z.A.1    Khan, A.I.2
  • 5
    • 77952147526 scopus 로고    scopus 로고
    • Fuzzy-logic based decision making for detecting distributed node exhaustion attacks in wireless sensor networks
    • Z. A. Baig, S. A. Khan, "Fuzzy-Logic Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks," In Proc. of the 2nd Intl' Conf' on Future Networks, 2010.
    • (2010) Proc. of the 2nd Intl' Conf' on Future Networks
    • Baig, Z.A.1    Khan, S.A.2
  • 8
    • 34147191463 scopus 로고    scopus 로고
    • A new fuzzy operator and its application to topology design of distributed local area networks
    • S. A. Khan and A. P. Engelbrecht, "A New Fuzzy Operator and its Application to Topology Design of Distributed Local Area Networks," Information Sciences, vol. 177, no. 12, pp. 2692-2711, 2007.
    • (2007) Information Sciences , vol.177 , Issue.12 , pp. 2692-2711
    • Khan, S.A.1    Engelbrecht, A.P.2
  • 9
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communcations of the ACM, vol. 47, no. 6, pp. 5357, June 2004.
    • (2004) Communcations of the ACM , vol.47 , Issue.6 , pp. 5357
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 10
    • 2342540625 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer Magazine, pp. 5462, Oct. 2002.
    • (2002) IEEE Computer Magazine , pp. 5462
    • Wood, A.1    Stankovic, J.2
  • 11
    • 0023855863 scopus 로고
    • On ordered weighted averaging aggregation operators in multicriteria decision-making
    • Jan
    • R. Y. Yager, "On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision-making," IEEE Transactions on Systems, Man, and Cybernetics, vol. 18, no. 1, pp. 183190, Jan 1988.
    • (1988) IEEE Transactions on Systems, Man, and Cybernetics , vol.18 , Issue.1 , pp. 183190
    • Yager, R.Y.1
  • 13
  • 14
    • 0015558134 scopus 로고
    • Outline of a new approach to the analysis of complex systems and decision processes
    • L. A. Zadeh, "Outline of a New Approach to the Analysis of Complex Systems and Decision Processes," IEEE Transaction Systems, Man, and Cybernetics, vol. 3, no. 1, pp. 2844, 1973.
    • (1973) IEEE Transaction Systems, Man, and Cybernetics , vol.3 , Issue.1 , pp. 2844
    • Zadeh, L.A.1
  • 16
    • 69249213464 scopus 로고    scopus 로고
    • Network forensics based on fuzzy logic and expert system
    • N. Liao, S. Tiana, T. Wanga, "Network forensics based on fuzzy logic and expert system", Computer Communications, Vol. 32, no. 17, 2009, pp. 1881-1892.
    • (2009) Computer Communications , vol.32 , Issue.17 , pp. 1881-1892
    • Liao, N.1    Tiana, S.2    Wanga, T.3
  • 17
    • 78549240053 scopus 로고    scopus 로고
    • An approach to a new network security architecture for academic environments
    • M. Mohajerani, A. Moeini, "An Approach to a New Network Security Architecture for Academic Environments", Lecture Notes in Computer Science, Volume 2434, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2434
    • Mohajerani, M.1    Moeini, A.2
  • 19
    • 78549247632 scopus 로고    scopus 로고
    • Interleaved hop-by-hop authentication using fuzzy logic to defend against of false report injection by replaying an attack
    • J. H. Kim, T. H. Cho, "Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack", International Journal of Computer Science and Network Security, Vol. 9, no.7, 2009, pp. 91-96.
    • (2009) International Journal of Computer Science and Network Security , vol.9 , Issue.7 , pp. 91-96
    • Kim, J.H.1    Cho, T.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.