메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A defense technique for jamming attacks in wireless sensor networks based on SI

Author keywords

Swarm intelligence; Wireless sensor networks

Indexed keywords

CHANNEL INFORMATION; DEFENSE TECHNIQUES; IN-CHANNELS; JAMMERS; JAMMING TECHNIQUE; MAINTENANCE OVERHEAD; NETWORK TOPOLOGY; NEXT-HOP; SIMULATION RESULT; SINGLE CHANNELS; SWARM INTELLIGENCE; SWARM INTELLIGENCE TECHNIQUES; UNICAST; WIRELESS SENSOR; WIRELESS TRANSMISSIONS;

EID: 80052197204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PACC.2011.5978933     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 77952147526 scopus 로고    scopus 로고
    • Fuzzy logic-based decision making for detecting distributed node-exhaustion attacks in wireless sensor networks
    • Zubair A. Baig and Salman A. Khan "Fuzzy Logic-based Decision Making for Detecting Distributed Node-Exhaustion Attacks in Wireless Sensor Networks" Second International Conference on Future Networks, 2010.
    • (2010) Second International Conference on Future Networks
    • Baig, Z.A.1    Khan, S.A.2
  • 2
    • 80052193682 scopus 로고    scopus 로고
    • from http://en.wikipedia.org/wiki/Wireless-sensor-network.
  • 7
    • 70249102120 scopus 로고    scopus 로고
    • Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
    • Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku and Zhou Su "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation" SpringSim, 2008.
    • (2008) SpringSim
    • Atakli, I.M.1    Hu, H.2    Chen, Y.3    Ku, W.-S.4    Su, Z.5
  • 9
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • May 25-27, UrbanaChampaign, Illinois, USA
    • Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood "The feasibility of Launching and Detecting Jamming Attacks in Wireless Networks" MobiHoc'05, May 25-27, 2005, UrbanaChampaign, Illinois, USA.
    • (2005) MobiHoc'05
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 10
    • 77953766580 scopus 로고    scopus 로고
    • Optimal jamming attack strategies and network defense policies in wireless sensor networks
    • AUGUST
    • Mingyan Li, Iordanis Koutsopoulos and Radha Poovendran "Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks" IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 8, AUGUST 2010.
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.8
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 12
    • 45749134626 scopus 로고    scopus 로고
    • DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
    • A.D. Wood, J.A. Stankovic, and G. Zhou. "DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks". In Proc. of SECON'07, 2007.
    • (2007) Proc. of SECON'07
    • Wood, A.D.1    Stankovic, J.A.2    Zhou, G.3
  • 13
  • 15
    • 80052234154 scopus 로고    scopus 로고
    • Swarm intelligence algorithms in bioinformatics
    • Arpad Kelemen et al. (Eds.), Springer Verlag, Germany
    • Swagatam Das, Ajith Abraham and Amit Konar, "Swarm Intelligence Algorithms in Bioinformatics", Computational Intelligence in Bioinformatics, Arpad Kelemen et al. (Eds.), Springer Verlag, Germany, 2007.
    • (2007) Computational Intelligence in Bioinformatics
    • Das, S.1    Abraham, A.2    Konar, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.