메뉴 건너뛰기




Volumn 5, Issue 3, 2010, Pages 335-342

An isolation intrusion detection system for hierarchical wireless sensor networks

Author keywords

Anomaly detection; Attack behaviors; Countermeasures; Intrusion detection; Wireless sensor networks

Indexed keywords

ANOMALY DETECTION; ATTACK BEHAVIOR; ATTACK BEHAVIORS; AUTONOMOUS DEVICES; BATTLEFIELD DATA; COUNTERMEASURES; ENVIRONMENTAL CONDITIONS; INTRUSION DETECTION SYSTEMS; ISOLATION TABLE; PERSONAL HEALTH; SAFE OPERATION; WIRED NETWORKS; WIRELESS INTRUSION;

EID: 78651576751     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.5.3.335-342     Document Type: Article
Times cited : (36)

References (23)
  • 1
    • 33847156085 scopus 로고    scopus 로고
    • PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)
    • R. Agarwal and M. V. Joshi, "PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)," Proceedings of First SIAM Conference on Data Mining, 2001.
    • (2001) Proceedings of First SIAM Conference On Data Mining
    • Agarwal, R.1    Joshi, M.V.2
  • 4
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," Journal of High Speed Networks, vol. 15, pp. 33-51, 2006.
    • (2006) Journal of High Speed Networks , vol.15 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 6
    • 33845507838 scopus 로고    scopus 로고
    • Group key distribution via local collaboration in wireless sensor networks
    • A. Chadha, Y. Liu, and S. K. Das, "Group key distribution via local collaboration in wireless sensor networks," in Sensor and Ad Hoc Communications and Networks, pp. 46-54, 2005.
    • (2005) Sensor and Ad Hoc Communications and Networks , pp. 46-54
    • Chadha, A.1    Liu, Y.2    Das, S.K.3
  • 9
    • 33646589837 scopus 로고    scopus 로고
    • An application-specific protocol architecture for wireless microsensor networks
    • W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," Wireless Communications, vol. 1, pp. 660-670, 2002.
    • (2002) Wireless Communications , vol.1 , pp. 660-670
    • Heinzelman, W.B.1    Chandrakasan, A.P.2    Balakrishnan, H.3
  • 10
    • 0037083574 scopus 로고    scopus 로고
    • Automated discovery of concise predictive rules for intrusion detection
    • G. Helmer, J. S. K. Wong, V. Honavar, and L. Miller, "Automated discovery of concise predictive rules for intrusion detection", Journal of Systems and Software, Vol. 60, Issue 3, pp. 165-175, 2002.
    • (2002) Journal of Systems and Software , vol.60 , Issue.3 , pp. 165-175
    • Helmer, G.1    Wong, J.S.K.2    Honavar, V.3    Miller, L.4
  • 12
  • 14
    • 85031307530 scopus 로고
    • Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
    • C. E. Perkins and P. Bhagwat, "Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, pp. 234-244, 1994.
    • (1994) ACM SIGCOMM Computer Communication Review , vol.24 , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 16
    • 33745914280 scopus 로고    scopus 로고
    • Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
    • L. Qing, Q. X. Zhu, and M. W. Wang, "Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks," Computer communications, vol. 29, pp. 2230-2237, 2006.
    • (2006) Computer Communications , vol.29 , pp. 2230-2237
    • Qing, L.1    Zhu, Q.X.2    Wang, M.W.3
  • 17
    • 59649125973 scopus 로고    scopus 로고
    • Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols
    • D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, "Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," Vehicular Technology, vol. 58, pp. 367-380, 2009.
    • (2009) Vehicular Technology , vol.58 , pp. 367-380
    • Raymond, D.R.1    Marchany, R.C.2    Brownfield, M.I.3    Midkiff, S.F.4
  • 19
    • 0034777089 scopus 로고    scopus 로고
    • Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks
    • E. Shih, et al, "Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks," in the 7th annual international conference on Mobile computing and networking, pp. 272-287, 2001.
    • (2001) 7th Annual International Conference On Mobile Computing and Networking , pp. 272-287
    • Shih, E.1
  • 20
    • 33746150390 scopus 로고    scopus 로고
    • Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
    • T. S. Sobh, "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art," Computer Standards & interfaces, vol. 28, pp. 670-694, 2006.
    • (2006) Computer Standards & Interfaces , vol.28 , pp. 670-694
    • Sobh, T.S.1
  • 22
    • 33845719807 scopus 로고    scopus 로고
    • eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
    • W. T. Su, K. M. Chang, and Y. H. Kuo, "eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks," Computer Networks, vol. 51, pp. 1151-1168, 2006.
    • (2006) Computer Networks , vol.51 , pp. 1151-1168
    • Su, W.T.1    Chang, K.M.2    Kuo, Y.H.3
  • 23
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.