메뉴 건너뛰기




Volumn 38, Issue , 2012, Pages 3855-3863

Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network

Author keywords

Attacks; DDoS; Detection; IEEE 802.15.4; Mac layer; Phy layer

Indexed keywords


EID: 84874384931     PISSN: 18777058     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.proeng.2012.06.442     Document Type: Conference Paper
Times cited : (11)

References (23)
  • 1
    • 84869438107 scopus 로고    scopus 로고
    • A DOS attack intrusion detection and inhibition technique for wireless computer networks
    • July
    • Salem M., Sarhan A., Abu-Bakr M., "A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks", ICGST- CNIR, Volume 7, No.1, July 2007.
    • (2007) ICGST- CNIR , vol.7 , Issue.1
    • Salem, M.1    Sarhan, A.2    Abu-Bakr, M.3
  • 3
    • 84874349994 scopus 로고    scopus 로고
    • Towards secure low rate wireless personal area networks
    • Jun
    • Jianliang Zheng, Myung J. Lee, Michael Anshel, "Towards Secure Low Rate Wireless Personal Area Networks "IEEE Transactions on Mobile Computing, Volume. 20, No. 20, Jun 2010.
    • (2010) IEEE Transactions on Mobile Computing , vol.20 , Issue.20
    • Zheng, J.1    Lee, M.J.2    Anshel, M.3
  • 4
    • 45749134626 scopus 로고    scopus 로고
    • DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4- based wireless networks
    • USA, Jun
    • Anthony D. Wood, John A. Stankovic, and Gang Zhou, "DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4- based Wireless Networks, " IEEE conference on SECON, USA Volume 18, No 21, pp: 60-69, Jun 2007.
    • (2007) IEEE Conference on SECON , vol.18 , Issue.21 , pp. 60-69
    • Wood, A.D.1    Stankovic, J.A.2    Zhou, G.3
  • 6
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Nov
    • W. Xu, K. Ma, W. Trappe and Y. Zhang, "Jamming sensor networks: Attack and defense strategies", IEEE Network, volume.20, No.3, pp.41-47, Nov 2006.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 7
    • 84860422571 scopus 로고    scopus 로고
    • Survey on survival approaches in wireless network against jamming attack
    • Aug
    • Faraz Ahsan, Ali Zahir, Sajjad Mohsin, Khalid Hussain "Survey on Survival Approaches in Wireless Network Against Jamming Attack"JATIT, Volume 30, No.1, pp:55-67, Aug 2011.
    • (2011) JATIT , vol.30 , Issue.1 , pp. 55-67
    • Ahsan, F.1    Zahir, A.2    Mohsin, S.3    Hussain, K.4
  • 9
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • David R. Raymond and Scott F. Midkif. "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses", IEEE conference on Pervasive Computing, Volume 7, No.1, pp: 74-81, 2008.
    • (2008) IEEE Conference on Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkif, S.F.2
  • 10
    • 84978761501 scopus 로고    scopus 로고
    • Security in bluetooth, RFID and wireless sensor network
    • ACM 978-1-4503, Feb
    • Saroj Kumar Panigraphy, Sanjay Kumar jena "Security in Bluetooth, RFID and Wireless Sensor Network", ICCCS' 11, ACM 978-1-4503, Feb 2011.
    • (2011) ICCCS' 11
    • Panigraphy, S.K.1    Jena, S.K.2
  • 13
    • 0242365677 scopus 로고    scopus 로고
    • Designing power aware self-reconfiguring topology for mobile wireless personal area network using fuzzy logic
    • Aug
    • Qilian Liang "Designing power Aware self-reconfiguring Topology for mobile Wireless Personal Area Network Using Fuzzy Logic" IEEE transactions on Systems, man and cybernetics, Volume 33, No 3, Aug 2003.
    • (2003) IEEE Transactions on Systems, Man and Cybernetics , vol.33 , Issue.3
    • Liang, Q.1
  • 14
    • 33747378828 scopus 로고    scopus 로고
    • Jamming attack detection and countermeasures in wireless sensor network using and system
    • Orlando, May
    • R. Muraleedharan and L.A. Osadciw, "Jamming attack detection and countermeasures in wireless sensor network using And System" SPIE Defense and Security, Orlando, May 2006.
    • (2006) SPIE Defense and Security
    • Muraleedharan, R.1    Osadciw, L.A.2
  • 19
    • 74549219772 scopus 로고    scopus 로고
    • Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
    • Jan.
    • Haataja K, Toivanen P "Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures" IEEE Transactions on wireless communication, Volume 9, No 1, pp: 384-392, Jan 2010.
    • (2010) IEEE Transactions on Wireless Communication , vol.9 , Issue.1 , pp. 384-392
    • Haataja, K.1    Toivanen, P.2
  • 22
    • 79951737949 scopus 로고    scopus 로고
    • A triangle module operator and fuzzy logic based handoff algorithm for heterogeneous wireless network
    • ISBN: 978-1-4244-6868-3, Jan.
    • Sheng Lie, Tang Liangrui "A Triangle module operator and Fuzzy Logic Based Handoff Algorithm for Heterogeneous Wireless Network" 12th IEEE International Conference on Communication Technology, ISBN: 978-1-4244-6868-3, PP 448-451, Jan 2011.
    • (2011) 12th IEEE International Conference on Communication Technology , pp. 448-451
    • Sheng, L.1    Tang, L.2
  • 23
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor network from radio interference through channel adaptation
    • Aug
    • Xu W Trappe, Zhang Y "Defending Wireless Sensor Network from radio interference through channel adaptation" ACM Transaction on Sensor Network, Volume 4, No 4, pp:18-33, Aug 2009.
    • (2009) ACM Transaction on Sensor Network , vol.4 , Issue.4 , pp. 18-33
    • Xu, W.T.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.