메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Adversary information gathering model for node capture attack in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; ARBITRARY TIME; CONFIDENTIAL INFORMATION; EXPECTED TIME; INFORMATION GATHERING; NODE CAPTURE ATTACK; TARGET NODES;

EID: 84858134393     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDECOM.2011.5738552     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 2
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Second Quarter
    • Yong Wang, Garhan Attebury, and Byrav Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2):02-23, Second Quarter 2006.
    • (2006) IEEE Communications Surveys & Tutorials , vol.8 , Issue.2 , pp. 02-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Chris Karlof and David Wagner. Secure routing in wireless sensor networks:attacks and countermeasures. Ad Hoc Networks, 1(2 and 3):293-315, September 2003. (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 6
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 49-63. IEEE, May 2005. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 8
    • 56749181478 scopus 로고    scopus 로고
    • Emergent properties: Detection of the node capture attack in mobile wireless sensor networks
    • Alexandria, VA, USA, March-April, ACM Newyork, USA
    • Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. Emergent properties: Detection of the node capture attack in mobile wireless sensor networks. In Proceedings of the first ACM conference on Wireless network security, pages 214-219, Alexandria, VA, USA, March-April 2008. ACM Newyork, USA.
    • (2008) Proceedings of the First ACM Conference on Wireless Network Security , pp. 214-219
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 9
    • 51349151780 scopus 로고    scopus 로고
    • Vulnerability of network traffic under node capture attacks using circuit theoretic analysis
    • Phoenix, AZ, April, IEEE
    • Patrick Tague, David Slater, Jason Rogers, and Radha Poovendran. Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In The 27th Conference on Computer Communications, INFOCOM 2008, pages 161-165, Phoenix, AZ, April 2008. IEEE.
    • (2008) The 27th Conference on Computer Communications, INFOCOM 2008 , pp. 161-165
    • Tague, P.1    Slater, D.2    Rogers, J.3    Poovendran, R.4
  • 10
    • 34248339107 scopus 로고    scopus 로고
    • Modeling adaptive node capture attacks in multi-hop wireless networks
    • DOI 10.1016/j.adhoc.2007.01.002, PII S1570870507000133, Wireless Mesh Networks
    • Patrick Tague and Radha Poovendran. Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks, 5(6):801-814, August 2007. (Pubitemid 46729710)
    • (2007) Ad Hoc Networks , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 12
    • 67651183943 scopus 로고    scopus 로고
    • Mitigation of control channel jamming under node capture attacks
    • September
    • Patrick Tague, Mingyan Li, and Radha Poovendran. Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9):1221-1234, September 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , Issue.9 , pp. 1221-1234
    • Tague, P.1    Li, M.2    Poovendran, R.3
  • 13
    • 70449627837 scopus 로고    scopus 로고
    • Secure decentralized data transfer against node capture attacks for wireless sensor networks
    • Athens, March. IEEE
    • Eitaro Kohno, Tomoyuki Ohta, and Yoshiaki Kakuda. Secure decentralized data transfer against node capture attacks for wireless sensor networks. In Proceedings of International Symposium on Autonomous Decentralized Systems, pages 01-06, Athens, March 2009. IEEE.
    • (2009) Proceedings of International Symposium on Autonomous Decentralized Systems , pp. 01-06
    • Kohno, E.1    Ohta, T.2    Kakuda, Y.3
  • 15
    • 71249126189 scopus 로고    scopus 로고
    • Node capture attack impact on key management schemes for heterogeneous wireless sensor networks
    • Global, Hammemet, June, IEEE
    • Boushra Maala, Hatem Bettahar, Yacine Challal, and Abdelmadjid Bouabdallah. Node capture attack impact on key management schemes for heterogeneous wireless sensor networks. In Information Infrastructure Symposium, 2009. GIIS '09. Global, pages 1-7, Hammemet, June 2009. IEEE.
    • (2009) Information Infrastructure Symposium 2009. GIIS '09 , pp. 1-7
    • Maala, B.1    Bettahar, H.2    Challal, Y.3    Bouabdallah, A.4
  • 16
    • 77952378312 scopus 로고    scopus 로고
    • First stage detection of compromised nodes in sensor networks
    • Limerick, February. IEEE
    • Wei Ding, Bireswar Laha, and Sumanth Yenduri. First stage detection of compromised nodes in sensor networks. In IEEE Sensors Applications Symposium 2010, pages 20-24, Limerick, February 2010. IEEE.
    • (2010) IEEE Sensors Applications Symposium 2010 , pp. 20-24
    • Ding, W.1    Laha, B.2    Yenduri, S.3
  • 17
    • 70349684548 scopus 로고    scopus 로고
    • Fast detection of replica node attacks in mobile sensor networks using sequential analysis
    • IEEE, Rio de Janeiro, April. IEEE
    • Ho Jun-Won, M. Wright, and S.K.Das. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In INFOCOM 2009, IEEE, pages 1773-1781, Rio de Janeiro, April 2009. IEEE.
    • (2009) INFOCOM 2009 , pp. 1773-1781
    • Jun-Won, H.1    Wright, M.2    Das, S.K.3
  • 20
    • 84903930827 scopus 로고    scopus 로고
    • Elsevier Inc., 14th Floor, Tower 10B, DLF Cyber City, Phase-II, Gurgaon 122002, tenth edition
    • Sheldon M. Ross. Introduction to Probability Models. Elsevier Inc., 14th Floor, Tower 10B, DLF Cyber City, Phase-II, Gurgaon 122002, tenth edition, 2010.
    • (2010) Introduction to Probability Models
    • Ross, S.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.