메뉴 건너뛰기




Volumn 25, Issue 9, 2012, Pages 1189-1212

6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach

Author keywords

6LoWPAN; anomaly; IDS; Internet of Things; operation; RPL; specification based

Indexed keywords

6LOWPAN; ANOMALY; IDS; INTERNET OF THINGS (IOT); OPERATION; RPL; SPECIFICATION-BASED;

EID: 84865658341     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2356     Document Type: Article
Times cited : (124)

References (57)
  • 2
    • 79960408982 scopus 로고    scopus 로고
    • The visions, technologies, applications and security issues of Internet of Things
    • Shanghai, China
    • Shen G, Liu B,. The visions, technologies, applications and security issues of Internet of Things. International Conference on E -Business and E -Government (ICEE), Shanghai, China, 2011; 1-4.
    • (2011) International Conference on e -Business and e -Government (ICEE) , pp. 1-4
    • Shen, G.1    Liu, B.2
  • 4
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • Atzori L, Iera A, Morabito G,. The Internet of Things: A survey. Computer Network 2010; 54 (15): 2787-2805.
    • (2010) Computer Network , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 84865631941 scopus 로고    scopus 로고
    • ITU Internet Reports 2005: The Internet of Things
    • ITU Internet Reports 2005: The Internet of Things. (Available form: http://www.itu.int/osg/spu/publications/internetofthings/).
  • 7
    • 55849087276 scopus 로고    scopus 로고
    • Protection against packet fragmentation attacks at 6LoWPAN adaptation layer
    • ICHIT '08, Daejeon
    • Kim H,. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Convergence and Hybrid Information Technology, ICHIT '08, Daejeon, 2008; 796-801.
    • (2008) Convergence and Hybrid Information Technology , pp. 796-801
    • Kim, H.1
  • 17
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI 10.1109/MWC.2004.1368895
    • Shi E, Perrig A,. Designing secure sensor networks. IEEE Wireless Communications 2004; 11 (6): 38-43. (Pubitemid 40021188)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 20
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the Internet: A security analysis
    • Roman R, Lopez J,. Integrating wireless sensor networks and the Internet: a security analysis. Internet Research 2009; 19 (2): 246-259.
    • (2009) Internet Research , vol.19 , Issue.2 , pp. 246-259
    • Roman, R.1    Lopez, J.2
  • 28
    • 84865656166 scopus 로고    scopus 로고
    • Chapter 6. Intrusion detection in wireless sensor networks
    • In, Xiao Y. (ed.). Auerbach Publication: Boca Raton, New York
    • Amini F, Mǐsíc VB, Mǐsíc J,. Chapter 6. Intrusion detection in wireless sensor networks. In Security in Distributed, Grid, Mobile, and Pervasive Computing, Xiao Y, (ed.). Auerbach Publication: Boca Raton, New York, 2007; 111-128.
    • (2007) Security in Distributed, Grid, Mobile, and Pervasive Computing , pp. 111-128
    • Amini, F.1    Mǐsíc, V.B.2    Mǐsíc, J.3
  • 29
    • 84865647884 scopus 로고    scopus 로고
    • Hierarchical and low-power IPv6 address configuration for wireless sensor networks
    • Wang X, Qian H,. Hierarchical and low-power IPv6 address configuration for wireless sensor networks. International Journal of Communication Systems 2011: 1099-1131.
    • (2011) International Journal of Communication Systems , pp. 1099-1131
    • Wang, X.1    Qian, H.2
  • 31
    • 80052252486 scopus 로고    scopus 로고
    • A semantic-based intrusion detection framework for wireless sensor network
    • Gyeongju, Korea (South)
    • Mao Y,. A semantic-based intrusion detection framework for wireless sensor network. 2010 6th International Conference on Networked Computing (INC), Gyeongju, Korea (South), 2010; 1-5.
    • (2010) 2010 6th International Conference on Networked Computing (INC) , pp. 1-5
    • Mao, Y.1
  • 34
    • 84856673526 scopus 로고    scopus 로고
    • Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
    • Xian, China
    • Chi SH, Cho TH,. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. FSKD 2006, Xian, China, 2006; 725-734.
    • (2006) FSKD 2006 , pp. 725-734
    • Chi, S.H.1    Cho, T.H.2
  • 35
    • 67549100215 scopus 로고    scopus 로고
    • Minimizing false alarms on intrusion detection for wireless sensor networks in realistic environments
    • Orlando, Florida
    • Parekh B, Cam H,. Minimizing false alarms on intrusion detection for wireless sensor networks in realistic environments. Military Communications Conference, Orlando, Florida, 2007; 1-7.
    • (2007) Military Communications Conference , pp. 1-7
    • Parekh, B.1    Cam, H.2
  • 36
    • 77950661084 scopus 로고    scopus 로고
    • Intrusion detection system based on payoff matrix for wireless sensor networks
    • Guilin China
    • Dong RS, Liu LL, Liu JM, Xu XL,. Intrusion detection system based on payoff matrix for wireless sensor networks. Genetic and Evolutionary Computing, Guilin China, 2009; 3-6.
    • (2009) Genetic and Evolutionary Computing , pp. 3-6
    • Dong, R.S.1    Liu, L.L.2    Liu, J.M.3    Xu, X.L.4
  • 44
    • 78651544367 scopus 로고    scopus 로고
    • Bayesian fusion algorithm for inferring trust in wireless sensor networks
    • Momani M,. Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Network 2010; 5 (7): 815-822.
    • (2010) Journal of Network , vol.5 , Issue.7 , pp. 815-822
    • Momani, M.1
  • 46
    • 79551622081 scopus 로고    scopus 로고
    • Feature selection: A hybrid approach based on selfadaptive ant colony and support vector machine
    • Wuhan, Hubei
    • Xiong W, Wang C,. Feature selection: A hybrid approach based on selfadaptive ant colony and support vector machine. International Conference on Computer Science and Software Engineering, Wuhan, Hubei, 2008; 751-754.
    • (2008) International Conference on Computer Science and Software Engineering , pp. 751-754
    • Xiong, W.1    Wang, C.2
  • 50
    • 74149086366 scopus 로고    scopus 로고
    • On the symbiosis of specification-based and anomaly-based detection
    • Stakhanova N, Basu S, Wong J,. On the symbiosis of specification-based and anomaly-based detection. Computers & Security 2010; 29 (2010): 253-268.
    • (2010) Computers & Security , vol.29 , Issue.2010 , pp. 253-268
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 55
    • 33646178576 scopus 로고    scopus 로고
    • An EFSM-based intrusion detection system for ad hoc networks
    • 2005 In, Springer-Verlag: Berlin Heidelberg
    • Orset J-M, Alcalde B, Cavalli A,. An EFSM-based intrusion detection system for ad hoc networks. In Lecture Notes in Computer Science, Vol. 3707/2005. Springer-Verlag: Berlin Heidelberg, 2005; 400-413.
    • (2005) Lecture Notes in Computer Science , vol.3707 , pp. 400-413
    • Orset, J.-M.1    Alcalde, B.2    Cavalli, A.3
  • 56
    • 46249127003 scopus 로고    scopus 로고
    • Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks
    • Mostarda L, Navarra A,. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks 2008; 4: 83-109.
    • (2008) International Journal of Distributed Sensor Networks , vol.4 , pp. 83-109
    • Mostarda, L.1    Navarra, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.