메뉴 건너뛰기




Volumn , Issue , 2010, Pages 202-207

An intrusion detection architecture for clustered wireless ad hoc networks

Author keywords

Cluster; Denial of service attack; Intrusion detection; Security; Wireless ad hoc networks

Indexed keywords

CLUSTER; CLUSTER HEAD; CLUSTER-HEADS; COOPERATIVE ALGORITHM; COOPERATIVE INTRUSION DETECTION; DENIAL OF SERVICE ATTACKS; DISTRIBUTED INTRUSION DETECTION; INTRUSION DATA; MESSAGE COMMUNICATION; MONITORING POINTS; PROPOSED ARCHITECTURES; SECURITY; SECURITY VULNERABILITIES; SIMULATION RESULT; WIRELESS COMMUNICATIONS;

EID: 78649811349     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CICSyN.2010.51     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 4
    • 0031234161 scopus 로고    scopus 로고
    • Adaptive clustering for mobile wireless networks
    • September
    • C.R. Lin, M. Gerla, "Adaptive clustering for mobile wireless networks" IEEE Journal on Selected Areas in Communications, Vol. 15, No. 7, September 1997, pp. 1265-1275.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1265-1275
    • Lin, C.R.1    Gerla, M.2
  • 6
    • 0035009259 scopus 로고    scopus 로고
    • A clustering scheme for hierarchical control in wireless networks
    • S. Banerjee, S. Khullar, "A clustering scheme for hierarchical control in wireless networks", Proc. of the IEEE INFOCOM, 2001
    • (2001) Proc. of the IEEE INFOCOM
    • Banerjee, S.1    Khullar, S.2
  • 12
    • 85005954407 scopus 로고    scopus 로고
    • Zone-based intrusion detection for mobile ad hoc networks
    • B. Sun, K. Wu, U.W. Pooch. "Zone-based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc and Sensor Wireless Networks", Vol 2, No. 3, 2006.
    • (2006) Ad Hoc and Sensor Wireless Networks , vol.2 , Issue.3
    • Sun, B.1    Wu, K.2    Pooch, U.W.3
  • 15
    • 84870407423 scopus 로고    scopus 로고
    • URL
    • NS-2 Simulator. URL: http://www.isi.edu/nsnam/ns.
    • NS-2 Simulator
  • 16
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May-June
    • Y.-C. Hu, A. Perrig, "A survey of secure wireless ad hoc routing", IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 28-39, May-June 2004.
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.