메뉴 건너뛰기




Volumn , Issue , 2007, Pages 111-128

Intrusion detection in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84865656166     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (5)

References (29)
  • 3
    • 4143141932 scopus 로고    scopus 로고
    • Signature-based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols
    • Wireless Security Symposium, Orlando, FL
    • F. Anjum, D. Subhadrabandhu, and S. Sarkar. Signature-based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, Wireless Security Symposium, Orlando, FL, 2003.
    • Vehicular Technology Conference , pp. 2003
    • Anjum, F.1    Subhadrabandhu, D.2    Sarkar, S.3
  • 8
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized criticality and stochastic learningbased intrusion detection system for wireless sensor networks
    • S. S. Doumit and D.P. Agrawal. Self-organized criticality and stochastic learningbased intrusion detection system for wireless sensor networks. In MILCOM: IEEE Military Communications Conference, pages 609–614, 2003.
    • (2003) MILCOM: IEEE Military Communications Conference , pp. 609-614
    • Doumit, S.S.1    Agrawal, D.P.2
  • 10
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • F. Hu and N. K. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1):69–89, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.K.2
  • 12
    • 85056972884 scopus 로고    scopus 로고
    • IEEE. Standard for part 15.4:Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York
    • IEEE. Standard for part 15.4:Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York, Oct. 2003.
    • (2003)
  • 15
    • 24344456201 scopus 로고    scopus 로고
    • Applying mobile agent technology to intrusion detection
    • Technical University of Vienna
    • C. Kruegel. Applying mobile agent technology to intrusion detection. In Distributed Systems Group, Technical University of Vienna, 2002.
    • (2002) Distributed Systems Group
    • Kruegel, C.1
  • 17
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • A. Mishra, K. Nadkarni, and A. Patcha. Intrusion detection in wireless ad hoc networks. IEEEWireless Communications, Vol. 11, No. 1, pp. 48–60, February 2004.
    • (2004) Ieeewireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 22
    • 33749041485 scopus 로고    scopus 로고
    • Applying intrusion detection systems to wireless sensor networks
    • R. Roman, J. Zhou, and J. Lopez. Applying intrusion detection systems to wireless sensor networks. In Proc. CCNC 2006, pp. 640–644.
    • (2006) Proc. CCNC , pp. 640-644
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 23
    • 85056929157 scopus 로고    scopus 로고
    • http://www.snort.org, Date visited: April, 17, 2006.
    • (2006)
  • 26
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54–62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 29
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks, Vol. 9, pp. 545–556, 2003.
    • (2003) Wireless Networks , vol.9 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.