메뉴 건너뛰기




Volumn 9, Issue 10, 2012, Pages 1636-1652

A survey of intrusion detection schemes in Wireless Sensor Networks

Author keywords

Data Mining and Computational Intelligence (DM CI); Intrusion Detection Systems (IDS); Mobile Ad hoc Networks (MANET); Wireless Sensor Networks (WSNs)

Indexed keywords


EID: 84867604390     PISSN: 15469239     EISSN: 15543641     Source Type: Journal    
DOI: 10.3844/ajassp.2012.1636.1652     Document Type: Article
Times cited : (55)

References (53)
  • 2
    • 13944283393 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • Akkaya, K. and M. Younis, 2005. A survey on routing protocols for wireless sensor networks, Ad Hoc Netw., 3: 325-349.
    • (2005) Ad Hoc Netw. , vol.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 3
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI: 10.1016/S1389-1286(01)00302-4
    • Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Netw., 38: 393-422. DOI: 10.1016/S1389-1286(01)00302-4
    • (2002) Comput. Netw. , vol.38 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 4
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • DOI: 10.1109/MWC.2004.1368893
    • Al-Karaki, J.N. and A.E. Kamal, 2004. Routing techniques in wireless sensor networks: A survey, IEEE Wireless Commun., 11: 6-28. DOI: 10.1109/MWC.2004.1368893
    • (2004) IEEE Wireless Commun. , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 6
    • 78751642052 scopus 로고    scopus 로고
    • Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
    • DOI: 10.1016/j.comcom.2010.04.008
    • Baig, Z.A., 2011. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Comput. Commun., 34: 468-484. DOI: 10.1016/j.comcom.2010.04.008
    • (2011) Comput. Commun. , vol.34 , pp. 468-484
    • Baig, Z.A.1
  • 8
    • 33745736659 scopus 로고    scopus 로고
    • Statistical Wormhole Detection in Sensor Networks
    • In: Molva, R., G. Tsudik and D. Westhoff (Eds.). Springer Berlin/Heidelberg
    • Buttyán, L., L. Dóra and I. Vajda, 2005. Statistical Wormhole Detection in Sensor Networks. In: Security and Privacy in Ad-hoc and Sensor Networks, Molva, R., G. Tsudik and D. Westhoff (Eds.). Springer Berlin/Heidelberg, pp: 128-141.
    • (2005) Security and Privacy in Ad-hoc and Sensor Networks , pp. 128-141
    • Buttyán, L.1    Dóra, L.2    Vajda, I.3
  • 10
  • 11
    • 33750559564 scopus 로고    scopus 로고
    • Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks
    • (FSKD' 26), Springer-Verlag Berlin, Heidelberg DOI: 10.1007/11881599_88
    • Chi, S.H. and T.H. Cho, 2006. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. Proceedings of the 3rd International Conference on Fuzzy Systems and Knowledge Discovery, (FSKD' 26), Springer-Verlag Berlin, Heidelberg, pp: 725-734. DOI: 10.1007/11881599_88
    • (2006) Proceedings of the 3rd International Conference on Fuzzy Systems and Knowledge Discovery , pp. 725-734
    • Chi, S.H.1    Cho, T.H.2
  • 12
    • 84925443479 scopus 로고    scopus 로고
    • Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives
    • DOI: 10.3390/fi2020096
    • Christin, D., P.S. Mogre and M. Hollick, 2010. Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives. Future Internet, 2: 96-125. DOI: 10.3390/fi2020096
    • (2010) Future Internet , vol.2 , pp. 96-125
    • Christin, D.1    Mogre, P.S.2    Hollick, M.3
  • 13
    • 47049129658 scopus 로고    scopus 로고
    • Malicious node detection in wireless sensor networks using an autoregression technique
    • IEEE Computer Society, June 19-25, IEEE Xplore Press, Athens DOI: 10.1109/ICNS.2007.79
    • Curiac, D.I., O. Banias, F. Dragan, C. Volosencu and O. Dranga, 2007. Malicious node detection in wireless sensor networks using an autoregression technique. Proceedings of the 3rd International Conference on Networking and Services, IEEE Computer Society, June 19-25, IEEE Xplore Press, Athens, pp: 83. DOI: 10.1109/ICNS.2007.79
    • (2007) Proceedings of the 3rd International Conference on Networking and Services , pp. 83
    • Curiac, D.I.1    Banias, O.2    Dragan, F.3    Volosencu, C.4    Dranga, O.5
  • 14
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Debar, H., M. Dacier and A. Wespi, 1999. Towards a taxonomy of intrusion-detection systems. Comput. Netw., 31: 805-822.
    • (1999) Comput. Netw. , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 15
    • 3142684688 scopus 로고    scopus 로고
    • Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
    • Oct. 13-16, IEEE Xplore Press DOI: 10.1109/MILCOM.2003.1290173
    • Doumit, S.S. and D.P. Agrawal, 2003. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. Proceedings of the Conference on IEEE Military Communications, Oct. 13-16, IEEE Xplore Press, pp: 609-614. DOI: 10.1109/MILCOM.2003.1290173
    • (2003) Proceedings of the Conference on IEEE Military Communications , pp. 609-614
    • Doumit, S.S.1    Agrawal, D.P.2
  • 16
    • 73349090552 scopus 로고    scopus 로고
    • Intrusion detection systems for wireless sensor networks: A survey
    • DOI: 10.1007/978-3-642-10844-0_29
    • Farooqi, A.H. and F.A. Khan, 2009. Intrusion detection systems for wireless sensor networks: A survey. Commun. Comput. Inform. Sci., 56: 234-241. DOI: 10.1007/978-3-642-10844-0_29
    • (2009) Commun. Comput. Inform. Sci. , vol.56 , pp. 234-241
    • Farooqi, A.H.1    Khan, F.A.2
  • 18
    • 64749090866 scopus 로고    scopus 로고
    • Intrusion detection for wireless sensor networks based on multi-agent and refined clustering
    • WRI, Jan. 6-8, IEEE Xplore Press, Yunnan DOI: 10.1109/CMC.2009.172
    • Huai-Bin, W., Y. Zheng and W. Chun-Dong, 2009. Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. Proceedings of the International Conference on Communications and Mobile Computing, WRI, Jan. 6-8, IEEE Xplore Press, Yunnan, pp: 450-454. DOI: 10.1109/CMC.2009.172
    • (2009) Proceedings of the International Conference on Communications and Mobile Computing , pp. 450-454
    • Huai-Bin, W.1    Zheng, Y.2    Chun-Dong, W.3
  • 19
    • 84867606395 scopus 로고    scopus 로고
    • An Ant based framework for preventing DDoS attack in wireless sensor networks
    • Juneja, D. and N. Arora, 2010. An Ant based framework for preventing DDoS attack in wireless sensor networks. Int. J. Adv. Technol., 1: 1-11.
    • (2010) Int. J. Adv. Technol. , vol.1 , pp. 1-11
    • Juneja, D.1    Arora, N.2
  • 20
    • 79952905718 scopus 로고    scopus 로고
    • Design and implementation of EAR algorithm for detecting routing attacks in WSN
    • Juneja, D., S. Bansal, G. Kaur and N. Arora, 2010. Design and implementation of EAR algorithm for detecting routing attacks in WSN. Int. J. Eng. Sci. Technol., 2: 1677-1683.
    • (2010) Int. J. Eng. Sci. Technol. , vol.2 , pp. 1677-1683
    • Juneja, D.1    Bansal, S.2    Kaur, G.3    Arora, N.4
  • 21
    • 51349133681 scopus 로고    scopus 로고
    • Detecting selective forwarding attacks in wireless sensor networks using support vector machines
    • Sensor Networks and Information Dec. 3-6, IEEE Xplore Press, Melbourne, Qld. DOI: 10.1109/ISSNIP.2007.4496866
    • Kaplantzis, S., A. Shilton, N. Mani and Y.A. Sekercioglu, 2007. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Dec. 3-6, IEEE Xplore Press, Melbourne, Qld., pp: 335-340. DOI: 10.1109/ISSNIP.2007.4496866
    • (2007) Proceedings of the 3rd International Conference on Intelligent Sensors , pp. 335-340
    • Kaplantzis, S.1    Shilton, A.2    Mani, N.3    Sekercioglu, Y.A.4
  • 23
    • 70449485122 scopus 로고    scopus 로고
    • Reduced complexity intrusion detection in sensor networks using genetic algorithm
    • Jun. 14-18, IEEE Xplore Press, Dresden DOI: 10.1109/ICC.2009.5199399
    • Khanna, R., L. Huaping and C. Hsiao-Hwa, 2009. Reduced complexity intrusion detection in sensor networks using genetic algorithm. Proceedings of the IEEE International Conference on Communications, Jun. 14-18, IEEE Xplore Press, Dresden, pp: 1-5. DOI: 10.1109/ICC.2009.5199399
    • (2009) Proceedings of the IEEE International Conference on Communications , pp. 1-5
    • Khanna, R.1    Huaping, L.2    Hsiao-Hwa, C.3
  • 27
    • 78751692255 scopus 로고    scopus 로고
    • A new collaborative approach for intrusion detection system on wireless sensor networks
    • Netw. DOI: 10.1007/978-90-481-3662-9_41
    • Lemos, M.V.D.S., L.B. Leal and R.H. Filho, 2010. A new collaborative approach for intrusion detection system on wireless sensor networks. Novel Algorithms Techniques Telecommun. Netw. DOI: 10.1007/978-90-481-3662-9_41
    • (2010) Novel Algorithms Techniques Telecommun.
    • Lemos, M.V.D.S.1    Leal, L.B.2    Filho, R.H.3
  • 28
    • 56949096891 scopus 로고    scopus 로고
    • Group-based intrusion detection system in wireless sensor networks
    • DOI: 10.1016/j.comcom.2008.06.020
    • Li, G., J. He and Y. Fu, 2008. Group-based intrusion detection system in wireless sensor networks. Comput. Commun., 31: 4324-4332. DOI: 10.1016/j.comcom.2008.06.020
    • (2008) Comput. Commun. , vol.31 , pp. 4324-4332
    • Li, G.1    He, J.2    Fu, Y.3
  • 29
    • 35348928856 scopus 로고    scopus 로고
    • Intrusion detection for routing attacks in sensor networks
    • DOI: 10.1080/15501320600692044
    • Loo, C., M. Ng, C. Leckie and M. Palaniswami, 2006. Intrusion detection for routing attacks in sensor networks. Int. J. Distributed Sensor Netw., 2: 313-332. DOI: 10.1080/15501320600692044
    • (2006) Int. J. Distributed Sensor Netw. , vol.2 , pp. 313-332
    • Loo, C.1    Ng, M.2    Leckie, C.3    Palaniswami, M.4
  • 30
    • 27544432072 scopus 로고    scopus 로고
    • Detection of denial-of-message attacks on sensor network broadcasts
    • May 8-11, IEEE Xplore Press DOI: 10.1109/SP.2005.7
    • McCune, J.M., E. Shi, A. Perrig and M.K. Reiter, 2005. Detection of denial-of-message attacks on sensor network broadcasts. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, IEEE Xplore Press, pp: 64-78. DOI: 10.1109/SP.2005.7
    • (2005) Proceedings of the IEEE Symposium on Security and Privacy , pp. 64-78
    • McCune, J.M.1    Shi, E.2    Perrig, A.3    Reiter, M.K.4
  • 31
    • 84856640682 scopus 로고    scopus 로고
    • Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks
    • Moon, S.Y. and T.H. Cho, 2009. Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int. J. Comput. Sci. Netw. Security, 9: 118-122.
    • (2009) Int. J. Comput. Sci. Netw. Security , vol.9 , pp. 118-122
    • Moon, S.Y.1    Cho, T.H.2
  • 32
    • 77953860661 scopus 로고    scopus 로고
    • An intrusion detection framework for sensor networks using ant colony
    • IEEE Xplore Press, Pacific Grove, California, USA DOI: 10.1109/ACSSC.2009.5470103
    • Muraleedharan, R. and L.A. Osadciw, 2009. An intrusion detection framework for sensor networks using ant colony. Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers, IEEE Xplore Press, Pacific Grove, California, USA, pp: 275-278. DOI: 10.1109/ACSSC.2009.5470103
    • (2009) Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers , pp. 275-278
    • Muraleedharan, R.1    Osadciw, L.A.2
  • 33
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic approach
    • IEEE Societies, Mar. 30-Apr. 3, IEEE Xplore Press DOI: 10.1109/INFCOM.2003.1209210
    • Murali, K. and T.V. Lakshman, 2003. Detecting network intrusions via sampling: a game theoretic approach. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Mar. 30-Apr. 3, IEEE Xplore Press, pp: 1880-1889. DOI: 10.1109/INFCOM.2003.1209210
    • (2003) Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. , pp. 1880-1889
    • Murali, K.1    Lakshman, T.V.2
  • 34
    • 33747302351 scopus 로고    scopus 로고
    • An intrusion detection system for wireless sensor networks
    • Networking And Communications, Aug. 22-24, IEEE Xplore Press DOI: 10.1109/WIMOB.2005.1512911
    • Onat, I. and A. Miri, 2005. An intrusion detection system for wireless sensor networks. Proceedings of the IEEE International Conference on, Wireless And Mobile Computing, Networking And Communications, Aug. 22-24, IEEE Xplore Press, pp: 253-259. DOI: 10.1109/WIMOB.2005.1512911
    • (2005) Proceedings of the IEEE International Conference on, Wireless And Mobile Computing , pp. 253-259
    • Onat, I.1    Miri, A.2
  • 37
    • 84856665180 scopus 로고    scopus 로고
    • Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
    • Ponomarchuk, Y.A. and Seo D.W., 2010. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J. Convergence, 1: 35-42.
    • (2010) J. Convergence , vol.1 , pp. 35-42
    • Ponomarchuk, Y.A.1    Seo, D.W.2
  • 38
    • 49749114376 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks
    • DOI: 10.1109/MWC.2008.4599219
    • Rajasegarar, S., C. Leckie and M. Palaniswami, 2008. Anomaly detection in wireless sensor networks. IEEE Wireless Commun., 15: 34-40. DOI: 10.1109/MWC.2008.4599219
    • (2008) IEEE Wireless Commun. , vol.15 , pp. 34-40
    • Rajasegarar, S.1    Leckie, C.2    Palaniswami, M.3
  • 39
    • 38549109147 scopus 로고    scopus 로고
    • Quarter sphere based distributed anomaly detection in wireless sensor networks
    • June 24-28, IEEE Xplore Press, Glasgow DOI: 10.1109/ICC.2007.637
    • Rajasegarar, S., C. Leckie, M. Palaniswami and J.C. Bezdek, 2007. Quarter sphere based distributed anomaly detection in wireless sensor networks. Proceedings of the IEEE International Conference on Communications, June 24-28, IEEE Xplore Press, Glasgow, pp: 3864-3869. DOI: 10.1109/ICC.2007.637
    • (2007) Proceedings of the IEEE International Conference on Communications , pp. 3864-3869
    • Rajasegarar, S.1    Leckie, C.2    Palaniswami, M.3    Bezdek, J.C.4
  • 40
    • 79955681745 scopus 로고    scopus 로고
    • Game theory model for selective forward attacks in wireless sensor networks
    • Jun. 24-26, IEEE Xplore Press, Thessaloniki DOI: 10.1109/MED.2009.5164584
    • Reddy, Y.B. and S. Srivathsan, 2009. Game theory model for selective forward attacks in wireless sensor networks, Proceedings of the 17th Mediterranean Conference on Control and Automation, Jun. 24-26, IEEE Xplore Press, Thessaloniki, pp: 458-463. DOI: 10.1109/MED.2009.5164584
    • (2009) Proceedings of the 17th Mediterranean Conference on Control and Automation , pp. 458-463
    • Reddy, Y.B.1    Srivathsan, S.2
  • 41
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI: 10.1109/MWC.2004.1368895 Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F
    • Shi, E. and A. Perrig, 2006. Designing secure sensor networks. IEEE Wireless Commun., 11: 38-43. DOI: 10.1109/MWC.2004.1368895 Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F.
    • (2006) IEEE Wireless Commun. , vol.11 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 44
    • 25144439604 scopus 로고    scopus 로고
    • 1st Edn., Pearson Education India, ISBN-10: 8131714721
    • Tan, P.N., 2007. Introduction To Data Mining. 1st Edn., Pearson Education India, ISBN-10: 8131714721, pp: 792.
    • (2007) Introduction To Data Mining , pp. 792
    • Tan, P.N.1
  • 46
    • 80052033497 scopus 로고    scopus 로고
    • An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks, Expert Syst
    • DOI: 10.1016/j.eswa.2011.05.076
    • Wang, S.S., K.Q. Yan, S.C. Wang and C.W. Liu, 2011. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks, Expert Syst. Appli., 38: 15234-15243. DOI: 10.1016/j.eswa.2011.05.076
    • (2011) Appli. , vol.38 , pp. 15234-15243
    • Wang, S.S.1    Yan, K.Q.2    Wang, S.C.3    Liu, C.W.4
  • 47
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • DOI: 10.1109/COMST.2006.315852
    • Wang, Y., G. Attebury and B. Ramamurthy, 2006. A survey of security issues in wireless sensor networks. IEEE Commun. Surveys Tutorials, 8: 2-23. DOI: 10.1109/COMST.2006.315852
    • (2006) IEEE Commun. Surveys Tutorials , vol.8 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 48
    • 79956116601 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks: A survey
    • DOI: 10.1016/j.jnca.2011.03.004
    • Xie, M., S. Han, B. Tian and S. Parvin, 2011. Anomaly detection in wireless sensor networks: A survey. J. Network Comput. Appli., 34: 1302-1325. DOI: 10.1016/j.jnca.2011.03.004
    • (2011) J. Network Comput. Appli. , vol.34 , pp. 1302-1325
    • Xie, M.1    Han, S.2    Tian, B.3    Parvin, S.4
  • 49
    • 77955082590 scopus 로고    scopus 로고
    • Outlier detection techniques for wireless sensor networks: A survey
    • DOI: 10.1109/SURV.2010.021510.00088
    • Yang, Z., N. Meratnia and P. Havinga, 2010. Outlier detection techniques for wireless sensor networks: A survey. IEEE Commun. Surveys Tutorials, 12: 159-170. DOI: 10.1109/SURV.2010.021510.00088
    • (2010) IEEE Commun. Surveys Tutorials , vol.12 , pp. 159-170
    • Yang, Z.1    Meratnia, N.2    Havinga, P.3
  • 50
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • DOI: 10.1016/j.comnet.2008.04.002
    • Yick, J., B. Mukherjee and D. Ghosal, 2008. Wireless sensor network survey. Comput. Netw., 52: 2292-2330. DOI: 10.1016/j.comnet.2008.04.002
    • (2008) Comput. Netw. , vol.52 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 51
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • DOI: 10.1109/COMST.2008.4625802
    • Yun, Z., F. Yuguang and Z. Yanchao, 2008. Securing wireless sensor networks: A survey. IEEE Commun. Surveys Tutorials, 10: 6-28. DOI: 10.1109/COMST.2008.4625802
    • (2008) IEEE Commun. Surveys Tutorials , vol.10 , pp. 6-28
    • Yun, Z.1    Yuguang, F.2    Yanchao, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.