메뉴 건너뛰기




Volumn , Issue , 2010, Pages 251-272

Attacks and countermeasures in sensor networks: A survey

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84868328245     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-73821-5_11     Document Type: Chapter
Times cited : (61)

References (65)
  • 1
    • 24944463915 scopus 로고    scopus 로고
    • Cluster-based routing in wireless sensor networks: Issues and challenge
    • J. ibriq and I. Mahgoub, "Cluster-based routing in wireless sensor networks: issues and challenge", in SPECS'04, 2004, pp. 759-766.
    • (2004) SPECS'04 , pp. 759-766
    • Ibriq, J.1    Mahgoub, I.2
  • 4
    • 0038276034 scopus 로고    scopus 로고
    • Eavesdropping games: A graph-theoretic approach to privacy in distributed systems
    • M. Franklin, Z. Galil, and M. Yung, "Eavesdropping games: a graph-theoretic approach to privacy in distributed systems", J. ACM, vol. 47, no. 2, pp. 225-243, 2000.
    • (2000) J. ACM , vol.47 , Issue.2 , pp. 225-243
    • Franklin, M.1    Galil, Z.2    Yung, M.3
  • 7
    • 84892103001 scopus 로고    scopus 로고
    • Online
    • [Online]. Available: http://www.faqs.org/rfcs/rfc1455.html
  • 13
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 19
    • 25844435733 scopus 로고    scopus 로고
    • Pike: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig, "Pike: Peer intermediaries for key establishment in sensor networks", in IEEE Infocom, 2005.
    • (2005) IEEE Infocom
    • Chan, H.1    Perrig, A.2
  • 24
    • 84892026817 scopus 로고    scopus 로고
    • Online
    • [Online]. Available: http://www.eweek.com/encyclopedia-term/0, 2542, t=MAC+layeri=46426, 00.asp
  • 27
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks", Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 28
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attacks and selfishness in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Prevention of denial of service attacks and selfishness in mobile ad hoc networks", in Institut Eurecom Research Report RR-02-063, 2002.
    • (2002) Institut Eurecom Research Report RR-02-063
    • Michiardi, P.1    Molva, R.2
  • 33
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of mac layer misbehavior in wireless networks
    • P. Kyasanur and N. H. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks." in DSN, 2003, pp. 173-182.
    • (2003) DSN , pp. 173-182
    • Kyasanur, P.1    Vaidya, N.H.2
  • 35
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks", Wirel. Netw., vol. 9, no. 5, pp. 545-556, 2003.
    • (2003) Wirel. Netw. , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 37
  • 39
    • 84948142128 scopus 로고    scopus 로고
    • Multiple access in ad-hoc wireless lans with noncooperative stations
    • J. Konorski, "Multiple access in ad-hoc wireless lans with noncooperative stations." in NET-WORKING, 2002, pp. 1141-1146.
    • (2002) NET-WORKING , pp. 1141-1146
    • Konorski, J.1
  • 47
    • 0013043106 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor networks
    • D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly- resilient, energy-efficient multipath routing in wireless sensor networks", SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 4, pp. 11-25, 2001.
    • (2001) SIGMOBILE Mob. Comput. Commun. Rev. , vol.5 , Issue.4 , pp. 11-25
    • Ganesan, D.1    Govindan, R.2    Shenker, S.3    Estrin, D.4
  • 48
    • 4444237581 scopus 로고    scopus 로고
    • Spread: Enhancing data confidentiality in mobile ad hoc networks
    • W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing data confidentiality in mobile ad hoc networks", in IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 50
    • 33845920022 scopus 로고    scopus 로고
    • Models of authentication in ad hoc networks and their related network properties
    • Online
    • K. Hoeper and G. Gong, "Models of authentication in ad hoc networks and their related network properties", in Tech Reports, 2004. [Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2004/cacr2004-03.pdf
    • (2004) Tech Reports
    • Hoeper, K.1    Gong, G.2
  • 51
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • J. Binkley and W. Trost, "Authenticated ad hoc routing at the link layer for mobile systems", Wirel. Netw., vol. 7, no. 2, pp. 139-145, 2001.
    • (2001) Wirel. Netw. , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1    Trost, W.2
  • 59
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • E. Shi and A. Perrig, "Designing secure sensor networks", IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 60
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks", Wirel. Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 63
    • 25844521520 scopus 로고    scopus 로고
    • Localized fault-tolerant event boundary detection in sensor networks
    • Miami, FL, March
    • M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks", in Proceedings of IEEE INFOCOM, Miami, FL, March 2005.
    • (2005) Proceedings of IEEE INFOCOM
    • Ding, M.1    Chen, D.2    Xing, K.3    Cheng, X.4
  • 64
    • 14344259796 scopus 로고    scopus 로고
    • Distributed deviation detection in sensor networks
    • T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed deviation detection in sensor networks", SIGMOD Rec., vol. 32, no. 4, pp. 77-82, 2003.
    • (2003) SIGMOD Rec. , vol.32 , Issue.4 , pp. 77-82
    • Palpanas, T.1    Papadopoulos, D.2    Kalogeraki, V.3    Gunopulos, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.