메뉴 건너뛰기




Volumn 56, Issue 10, 2011, Pages 2358-2368

Maximum damage battery depletion attack in mobile sensor networks

Author keywords

S I R D system; S I S system

Indexed keywords

BANG-BANG; MALWARES; MEDIA ACCESS; MOBILE SENSOR NETWORKS; OPTIMAL CONTROL PROBLEM; OPTIMUM SOLUTION; PONTRYAGIN'S MAXIMUM PRINCIPLE; POTENTIAL ATTACK; S-I-R-D SYSTEM; S-I-S SYSTEM; SCANNING RATE; SECURITY MEASURE; TRANSMISSION RANGES; WIRELESS SENSING;

EID: 80053630581     PISSN: 00189286     EISSN: None     Source Type: Journal    
DOI: 10.1109/TAC.2011.2163881     Document Type: Article
Times cited : (49)

References (38)
  • 1
    • 0002058575 scopus 로고    scopus 로고
    • Connecting the physical world with pervasive networks
    • Jan./Mar.
    • D. Estrin, D. Culler,K. Pister, and G. Sukhatme, "Connecting the physical world with pervasive networks," IEEE Pervasive Comp., vol. 1, no. 1, pp. 59-69, Jan./Mar. 2002.
    • (2002) IEEE Pervasive Comp. , vol.1 , Issue.1 , pp. 59-69
    • Estrin, D.1    Cullerk. Pister, D.2    Sukhatme, G.3
  • 2
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
    • (2003) Ad Hoc Netw. , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 5
    • 33746896615 scopus 로고    scopus 로고
    • Open problems in computer virology
    • E. Filiol, M. Helenius, and S. Zanero, "Open problems in computer virology," J. Comp. Virology, vol. 1, no. 3, pp. 55-66, 2006.
    • (2006) J. Comp. Virology , vol.1 , Issue.3 , pp. 55-66
    • Filiol, E.1    Helenius, M.2    Zanero, S.3
  • 12
    • 42149094983 scopus 로고    scopus 로고
    • On the malware spreading over nonpropagative wireless ad hoc networks: The attacker's perspective
    • Chania, Crete, Greece, Oct.
    • V. Karyotis and S. Papavassiliou, "On the malware spreading over nonpropagative wireless ad hoc networks: The attacker's perspective," in Proc. 3rd ACM Int.Workshop QoS Security Wireless Mobile Networks, Chania, Crete, Greece, Oct. 2007, pp. 156-159.
    • (2007) Proc. 3rd ACM Int.Workshop QoS Security Wireless Mobile Networks , pp. 156-159
    • Karyotis, V.1    Papavassiliou, S.2
  • 13
    • 67049128150 scopus 로고    scopus 로고
    • Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
    • [Online]
    • R. Racic, D. Ma, and H. Chen, "Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery," IEEE SecureComm pp. 1-10, 2006 [Online]. Available: http://www.docstoc.com/docs/74584714/Exploiting-MMS- Vulnerabilities-to-Stealthily-Exhaust-Mobile-pdf
    • (2006) IEEE SecureComm , pp. 1-10
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 18
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proc. ACM Workshop Rapid Malcode, 2003, pp. 51-60.
    • (2003) Proc. ACM Workshop Rapid Malcode , pp. 51-60
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 19
    • 34247478945 scopus 로고    scopus 로고
    • Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
    • V. Karyotis and S. Papavassiliou, "Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework," Comp. Netw., vol. 51, no. 9, pp. 2397-2410, 2007.
    • (2007) Comp. Netw. , vol.51 , Issue.9 , pp. 2397-2410
    • Karyotis, V.1    Papavassiliou, S.2
  • 20
    • 39449122187 scopus 로고    scopus 로고
    • Optimal internet worm treatment strategy based on the two-factor model
    • X. Yan and Y. Zou, "Optimal internet worm treatment strategy based on the two-factor model," ETRI J., vol. 30, no. 1, pp. 81-81, 2008.
    • (2008) ETRI J. , vol.30 , Issue.1 , pp. 81-81
    • Yan, X.1    Zou, Y.2
  • 21
    • 80053654839 scopus 로고    scopus 로고
    • Optimal quarantining of wireless malware through power control
    • San Diego, CA
    • M. Khouzani, E. Altman, and S. Sarkar, "Optimal quarantining of wireless malware through power control," in Proc. 4rth Symp. Inform. Theory Appl., San Diego, CA, 2009, pp. 301-310.
    • (2009) Proc. 4rth Symp. Inform. Theory Appl. , pp. 301-310
    • Khouzani, M.1    Altman, E.2    Sarkar, S.3
  • 22
    • 77953320145 scopus 로고    scopus 로고
    • Maximum damage malware attack in mobile wireless networks
    • Mar.
    • M. Khouzani, S. Sarkar, and E. Altman, "Maximum damage malware attack in mobile wireless networks," in Proc. Infocom, San Diego, Mar. 2010, pp. 1-9.
    • (2010) Proc. Infocom, San Diego , pp. 1-9
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 23
    • 79953154031 scopus 로고    scopus 로고
    • Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
    • Atlanta, GA, Dec.
    • M. Khouzani, S. Sarkar, and E. Altman, "Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks," in Proc. 49th IEEE CDC, Atlanta, GA, Dec. 2010, pp. 1-8.
    • (2010) Proc. 49th IEEE CDC , pp. 1-8
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 24
    • 79960856823 scopus 로고    scopus 로고
    • Optimal control of epidemic evolution
    • Shanghai, China, Apr.
    • M. H. R. Khouzani, S. Sarkar, and E. Altman, "Optimal control of epidemic evolution," in Proc. Infocom, Shanghai, China, Apr. 2011, pp. 1683-1691.
    • (2011) Proc. Infocom , pp. 1683-1691
    • Khouzani, M.H.R.1    Sarkar, S.2    Altman, E.3
  • 27
    • 80053647353 scopus 로고    scopus 로고
    • VACCINE: War of the worms in wired and wireless networks
    • Barcelona, Spain, Apr.
    • S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 805-859.
    • (2006) Proc. IEEE INFOCOM , pp. 805-859
    • Tanachaiwiwat, S.1    Helmy, A.2
  • 28
    • 67349110460 scopus 로고    scopus 로고
    • Encounter-based worms: Analysis and defense
    • S. Tanachaiwiwat and A. Helmy, "Encounter-based worms: Analysis and defense," Ad Hoc Netw., vol. 7, no. 7, pp. 1414-1430, 2009.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.7 , pp. 1414-1430
    • Tanachaiwiwat, S.1    Helmy, A.2
  • 29
    • 0003259121 scopus 로고    scopus 로고
    • Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
    • C. Bettstetter, "Mobility modeling in wireless networks: Categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Comp. Commun. Rev., vol. 5, no. 3, pp. 55-66, 2001.
    • (2001) ACM SIGMOBILE Mobile Comp. Commun. Rev. , vol.5 , Issue.3 , pp. 55-66
    • Bettstetter, C.1
  • 30
    • 24144497473 scopus 로고    scopus 로고
    • The message delay in mobile ad hoc networks
    • R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Eval., vol. 62, no. 1-4, pp. 210-228, 2005.
    • (2005) Performance Eval. , vol.62 , Issue.1-4 , pp. 210-228
    • Groenevelt, R.1    Nain, P.2    Koole, G.3
  • 34
    • 77952737301 scopus 로고    scopus 로고
    • Symantec, Feb. 13
    • Symantec, "W32.sqlexp.worm," Feb. 13, 2007.
    • (2007) W32.sqlexp.worm
  • 35
    • 0002232633 scopus 로고
    • Solutions of ordinary differential equations as limits of pure jump Markov processes
    • T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," J. Appl. Prob., pp. 49-58, 1970.
    • (1970) J. Appl. Prob. , pp. 49-58
    • Kurtz, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.