메뉴 건너뛰기




Volumn 11, Issue 3, 2011, Pages 426-441

A simple learning automata-based solution for intrusion detection in wireless sensor networks

Author keywords

intrusion detection; learning automata; wireless sensor networks

Indexed keywords

ENERGY AWARE; ENERGY EFFICIENT; ENERGY-AWARE PROTOCOLS; INTRUSION DETECTION SYSTEMS; INTRUSION PREVENTION; LEARNING AUTOMATA; LOW COMPLEXITY; PACKET SAMPLING; REMOTE LOCATION; SELF-LEARNING; SOLUTION APPROACH; STOCHASTIC LEARNING AUTOMATA;

EID: 79952563117     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.946     Document Type: Article
Times cited : (34)

References (36)
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • Zhou L, Haas Z,. Securing ad hoc networks. IEEE Network Magazine 1999; 13 (6): pp. 24-30. (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 5
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof C, Wagner D,. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1: 293-315. (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 6
    • 44349137568 scopus 로고    scopus 로고
    • A secure and energy-efficient scheme for group-based routing in heterogeneous ad hoc sensor networks and its simulation analysis
    • DOI 10.1177/0037549708091643
    • Chandrasekar R, Obaidat MS, Misra S, Peña-Mora F,. A Secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis. SIMULATION: Transactions of the Society for Modeling and Simulation International 2008; 84 (2/3): pp. 131-146. (Pubitemid 351736143)
    • (2008) Simulation , vol.84 , Issue.2-3 , pp. 131-146
    • Ramachandran, C.1    Obaidat, M.S.2    Misra, S.3    Pena-Mora, F.4
  • 10
    • 53849148915 scopus 로고    scopus 로고
    • FORK: A novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks
    • Elsevier:; (): pp.
    • Chandrasekar R, Misra S, Obaidat MS,. FORK: a novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks. Computer Communications, Elsevier: 2008; 31 (16): pp. 3855-3869.
    • (2008) Computer Communications , vol.31 , Issue.16 , pp. 3855-3869
    • Chandrasekar, R.1    Misra, S.2    Obaidat, M.S.3
  • 12
  • 17
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Karlof C, Sastry N, Wagner D,. TinySec: a link layer security architecture for wireless sensor networks. Proceedings of ACM SenSys, 2004.
    • (2004) Proceedings of ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 19
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof C, Wagner D,. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 2003; 1: pp. 293-315. (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 21
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • Zhou L, Haas Z,. Securing ad hoc networks. IEEE Network Magazine, 1999; 13 (6): pp. 24-30. (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 25
  • 27
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusion via sampling: A game theoretic approach
    • Kodialam M, Lakshman TV,. Detecting network intrusion via sampling: a game theoretic approach. Proceedings of IEEE INFOCOM 2003.
    • (2003) Proceedings of IEEE INFOCOM
    • Kodialam, M.1    Lakshman, T.V.2
  • 28
    • 77952135318 scopus 로고    scopus 로고
    • Cybernetics and learning automata
    • in: S. Nof (Ed.), Springer, (Chapter 12).
    • Oommen BJ, Misra S,. Cybernetics and learning automata. in:, S. Nof, (Ed.), Handbook of Automation, Springer, 2009 (Chapter 12).
    • (2009) Handbook of Automation
    • Oommen, B.J.1    Misra, S.2
  • 30
    • 77952120622 scopus 로고    scopus 로고
    • Learning automata based dynamic guard channel algorithms
    • In press.
    • Beigy H, Meybodi MR,. Learning automata based dynamic guard channel algorithms. Journal of High Speed Networks, 2009; In press.
    • (2009) Journal of High Speed Networks
    • Beigy, H.1    Meybodi, M.R.2
  • 31
    • 77953363115 scopus 로고    scopus 로고
    • Data aggregation in sensor networks using learning automata
    • In press.
    • Esnaashari M, Meybodi MR,. Data aggregation in sensor networks using learning automata. Wireless Networks, 2009; In press.
    • (2009) Wireless Networks
    • Esnaashari, M.1    Meybodi, M.R.2
  • 33
    • 0033204607 scopus 로고    scopus 로고
    • Self-adaptive TDMA protocols for WDM star networks: A learning-automata-based approach
    • Papadimitriou GI, Pomportsis AS,. Self-adaptive TDMA protocols for WDM star networks: a learning-automata-based approach. IEEE Photonics Technology Letters, 1999; 11 (10): 1332-1334.
    • (1999) IEEE Photonics Technology Letters , vol.11 , Issue.10 , pp. 1332-1334
    • Papadimitriou, G.I.1    Pomportsis, A.S.2
  • 34
    • 0030165065 scopus 로고    scopus 로고
    • Learning automata-based receiver conflict avoidance algorithms for WDM broadcast-and-select star networks
    • PII S1063669296044883
    • Papadimitriou GI, Maritsas DG,. Learning automata-based receiver conflict avoidance algorithms for WDM broadcast-and-select star networks. IEEE/ACM Transactions on Networking, 1996; 4 (3): 407-412. (Pubitemid 126777734)
    • (1996) IEEE/ACM Transactions on Networking , vol.4 , Issue.3 , pp. 407-412
    • Papadimitriou, G.I.1    Maritsas, D.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.