메뉴 건너뛰기




Volumn 5, Issue 4, 2011, Pages 805-821

Unified Modeling Language based analysis of security attacks in wireless sensor networks: A survey

Author keywords

Security; Standard attack models; Unified modeling language; Wireless sensor networks

Indexed keywords


EID: 79956200557     PISSN: None     EISSN: 19767277     Source Type: Journal    
DOI: 10.3837/tiis.2011.04.010     Document Type: Article
Times cited : (19)

References (17)
  • 1
    • 33646518088 scopus 로고    scopus 로고
    • Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks
    • Mar., Article (CrossRef Link)
    • S. Hadim and N. Mohamed, "Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks, " IEEE Computer Society, vol. 7, no. 3, pp. 1-23, Mar. 2006. Article (CrossRef Link)
    • (2006) IEEE Computer Society , vol.7 , Issue.3 , pp. 1-23
    • Hadim, S.1    Mohamed, N.2
  • 2
    • 2942656255 scopus 로고    scopus 로고
    • Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    • Sep., Article (CrossRef Link)
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sep. 2003. Article (CrossRef Link)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 4
    • 56949088196 scopus 로고    scopus 로고
    • A Survey of Security Issues in Wireless Sensor Networks
    • Article (CrossRef Link)
    • Y. Wang, G. Attebury and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks, " IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006. Article (CrossRef Link)
    • (2006) IEEE Communications Surveys & Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 5
    • 29844457889 scopus 로고    scopus 로고
    • The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
    • in, Article (CrossRef Link)
    • W. Xu, W. Trappe, Y. Zhang and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, " in Proc. MobiHoc, pp. 46-57, 2005. Article (CrossRef Link)
    • (2005) Proc. MobiHoc , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 6
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
    • Article (CrossRef Link)
    • D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, " Pervasive Computing, pp. 74-81, 2008. Article (CrossRef Link)
    • (2008) Pervasive Computing , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 7
    • 84978098257 scopus 로고    scopus 로고
    • Power Management Techniques for Mobile Communication
    • in, Article (CrossRef Link)
    • R. Kravets and P. Krishnan, "Power Management Techniques for Mobile Communication, " in Proc. IEEE MOBICOM, pp. 157-168, 1998. Article (CrossRef Link)
    • (1998) Proc. IEEE MOBICOM , pp. 157-168
    • Kravets, R.1    Krishnan, P.2
  • 8
    • 2642584004 scopus 로고    scopus 로고
    • Denial-of-Service Attacks on Battery-powered Mobile Computers
    • in, Article (CrossRef Link)
    • T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers, " in Proc. PerCom, pp. 309-318, 2004. Article (CrossRef Link)
    • (2004) Proc. PerCom , pp. 309-318
    • Martin, T.1    Hsiao, M.2    Ha, D.3    Krishnaswami, J.4
  • 9
    • 33845958392 scopus 로고    scopus 로고
    • Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols
    • in, Article (CrossRef Link)
    • D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols, " in Proc. Workshop on Information Assurance, pp. 297-304, 2006. Article (CrossRef Link)
    • (2006) Proc. Workshop on Information Assurance , pp. 297-304
    • Raymond, D.1    Marchany, R.2    Brownfield, M.3    Midkiff, S.4
  • 10
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Article (CrossRef Link)
    • Anthony D. Wood and John A. Stankovic, "Denial of Service in Sensor Networks, " IEEE Computer Society Press, vol. 35, no. 10, pp. 48-56, 2002. Article (CrossRef Link)
    • (2002) IEEE Computer Society Press , vol.35 , Issue.10 , pp. 48-56
    • Wood, A.D.1    Stankovic, J.A.2
  • 12
    • 84949938425 scopus 로고    scopus 로고
    • DOS-Resistant Authentication with Client Puzzles
    • in, Article (CrossRef Link)
    • T. Aura, P. Nikander and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles, " in Proc. Security Protocols Workshop, pp. 170-177, 2000. Article (CrossRef Link)
    • (2000) Proc. Security Protocols Workshop , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 15
    • 85008056769 scopus 로고    scopus 로고
    • Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection
    • in, ACM Press, New York. Article (CrossRef Link)
    • S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection", in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94-106, 1997. Article (CrossRef Link)
    • (1997) Proc. Workshop on New Security Paradigms , pp. 94-106
    • Cheung, S.1    Levitt, K.N.2
  • 16
    • 0035438937 scopus 로고    scopus 로고
    • IEEE 802.15.4: A developing standard for low-power low-cost wireless personal area networks
    • Sep/Oct, Article (CrossRef Link)
    • Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., "IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks, " Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001. Article (CrossRef Link)
    • (2001) Network, IEEE , vol.15 , Issue.5 , pp. 12-19
    • Gutierrez, J.A.1    Naeve, M.2    Callaway, E.3    Bourgeois, M.4    Mitter, V.5    Heile, B.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.