메뉴 건너뛰기




Volumn 6, Issue 4, 2013, Pages 420-436

Modeling tools for detecting DoS attacks in WSNs

Author keywords

Detection method; DoS attacks; Modeling tools; Statistical model checking

Indexed keywords

ENERGY UTILIZATION; MODEL CHECKING; SENSOR NODES; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84875648770     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.630     Document Type: Article
Times cited : (19)

References (34)
  • 2
    • 59249100315 scopus 로고    scopus 로고
    • Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
    • Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:377-387.
    • (2009) Journal of Network and Computer Applications , vol.32 , pp. 377-387
    • Li, B.1    Batten, L.2
  • 3
    • 78649332013 scopus 로고    scopus 로고
    • A novel node level security policy framework for wireless sensor networks
    • Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428.
    • (2011) Journal of Network and Computer Applications , vol.34 , pp. 418-428
    • Claycomb, W.R.1    Shin, D.2
  • 4
    • 84856138141 scopus 로고    scopus 로고
    • Comparison of authenticated-encryption schemes in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany
    • Simplicio MA Jr., De Oliveira BT, Barreto PSLM, Margi CB, Carvalho TCMB, Naslund M. Comparison of authenticated-encryption schemes in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011.
    • (2011)
    • Simplicio Jr., M.A.1    De Oliveira, B.T.2    Barreto, P.S.L.M.3    Margi, C.B.4    Carvalho, T.C.M.B.5    Naslund, M.6
  • 5
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89.
    • (2005) Ad Hoc Networks , vol.3 , pp. 69-89
    • Hu, F.1    Sharma, N.2
  • 6
    • 24644440576 scopus 로고    scopus 로고
    • A cluster-based energy balancing scheme in heterogeneous wireless sensor networks. Proceedings of International Conference on Networking, April
    • Ai J, Turgut D, Bölöni L. A cluster-based energy balancing scheme in heterogeneous wireless sensor networks. Proceedings of International Conference on Networking, April 2005; 467-474.
    • (2005) , pp. 467-474
    • Ai, J.1    Turgut, D.2    Bölöni, L.3
  • 7
    • 0033877788 scopus 로고    scopus 로고
    • Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the IEEE Hawaii International Conference on System Sciences
    • Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the IEEE Hawaii International Conference on System Sciences, 2000.
    • (2000)
    • Heinzelman, W.R.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 8
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: a comprehensive overview
    • Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037.
    • (2009) Computer Networks , vol.53 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 9
    • 10944266504 scopus 로고    scopus 로고
    • HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks
    • Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379.
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 10
    • 83055177189 scopus 로고    scopus 로고
    • Fast and flexible unsupervised clustering algorithm based on ultrametric properties. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, USA
    • Fouchal S, Lavallée I. Fast and flexible unsupervised clustering algorithm based on ultrametric properties. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, USA, 2011.
    • (2011)
    • Fouchal, S.1    Lavallée, I.2
  • 11
    • 84856207437 scopus 로고    scopus 로고
    • Efficient temporal compression in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany
    • Liang Y. Efficient temporal compression in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011.
    • (2011)
    • Liang, Y.1
  • 12
    • 62649122300 scopus 로고    scopus 로고
    • Detecting denial of service attacks in sensor networks. Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS'07)
    • Lai GH, Chen CM. Detecting denial of service attacks in sensor networks. Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS'07); 109-115.
    • Lai, G.H.1    Chen, C.M.2
  • 13
    • 84875659362 scopus 로고    scopus 로고
    • Dynamic solution for detecting denial of service attacks in wireless sensor networks. ICC June .
    • Guechari M, Mokdad L, Tan S. Dynamic solution for detecting denial of service attacks in wireless sensor networks. ICC June 2012.
    • (2012)
    • Guechari, M.1    Mokdad, L.2    Tan, S.3
  • 14
    • 77954002155 scopus 로고    scopus 로고
    • Energy efficient and QoS aware medium access control for wireless sensor networks
    • Yahya B, Ben-Othman J. Energy efficient and QoS aware medium access control for wireless sensor networks. Concurrency and Computation: Practice and Experience 2010; 22(10):1252-1266.
    • (2010) Concurrency and Computation: Practice and Experience , vol.22 , Issue.10 , pp. 1252-1266
    • Yahya, B.1    Ben-Othman, J.2
  • 15
    • 79955784505 scopus 로고    scopus 로고
    • Energy efficient and QoS based routing protocol for wireless sensor networks
    • Ben-Othman J, Yahya B. Energy efficient and QoS based routing protocol for wireless sensor networks. Journal of Parallel and Distributed Computing 2010; 70(8):849-857.
    • (2010) Journal of Parallel and Distributed Computing , vol.70 , Issue.8 , pp. 849-857
    • Ben-Othman, J.1    Yahya, B.2
  • 16
    • 64749095465 scopus 로고    scopus 로고
    • A Bayesian game approach for preventing DoS attacks in wireless sensor networks. International Conference on Communications and Mobile Computing
    • Mohi M, Movaghar A, Zadeh PM. A Bayesian game approach for preventing DoS attacks in wireless sensor networks. International Conference on Communications and Mobile Computing, 2009.
    • (2009)
    • Mohi, M.1    Movaghar, A.2    Zadeh, P.M.3
  • 17
    • 84877932069 scopus 로고    scopus 로고
    • Distributed Detection of Node Capture Attacks in Wireless Networks
    • In, Chinh HD, Tan YK (eds). Available from:
    • Ho J-W. Distributed Detection of Node Capture Attacks in Wireless Networks. In Smart Wireless Sensor Networks, Chinh HD, Tan YK (eds). 2010. Available from: http://www.intechopen.com/books/smart-wireless-sensor-networks/distributed-detection-of-node-capture-attacks-in-wireless-sensor-networks
    • (2010) Smart Wireless Sensor Networks
    • Ho, J.-W.1
  • 18
    • 77955715403 scopus 로고    scopus 로고
    • An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
    • Misra S, Krishna PV, Abraham KI, Sasikumar N, Fredun S. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Computers and Mathematics with Applications 2010; 60:294-306.
    • (2010) Computers and Mathematics with Applications , vol.60 , pp. 294-306
    • Misra, S.1    Krishna, P.V.2    Abraham, K.I.3    Sasikumar, N.4    Fredun, S.5
  • 20
    • 34547913472 scopus 로고    scopus 로고
    • SecLEACH - on the security of clustered sensor networks
    • Oliveira LB, Ferreirac A, Vilaça MA, et al. SecLEACH - on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895.
    • (2007) Signal Processing , vol.87 , pp. 2882-2895
    • Oliveira, L.B.1    Ferreirac, A.2    Vilaça, M.A.3
  • 22
    • 77955308709 scopus 로고    scopus 로고
    • Denial of service attack-resistant flooding authentication in wireless sensor networks
    • Son JH, Luo H, Seo SW. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542.
    • (2010) Computer Communications , vol.33 , pp. 1531-1542
    • Son, J.H.1    Luo, H.2    Seo, S.W.3
  • 23
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive security design with malicious node detection in cluster-based sensor networks
    • Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400.
    • (2007) Computer Communications , vol.30 , pp. 2385-2400
    • Hsieh, M.Y.1    Huang, Y.M.2    Chao, H.C.3
  • 24
    • 84962853206 scopus 로고    scopus 로고
    • Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks, Stockholm, Sweden
    • Handy MJ, Haase M, Timmerman D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks, Stockholm, Sweden, 2002.
    • (2002)
    • Handy, M.J.1    Haase, M.2    Timmerman, D.3
  • 25
    • 84878629995 scopus 로고    scopus 로고
    • HASL: an expressive language for statistical verification of stochastic models. Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), Cachan, France
    • Ballarini P, Djafr H, Duflot M, Haddad S, Pekergin N. HASL: an expressive language for statistical verification of stochastic models. Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), Cachan, France, 2011.
    • (2011)
    • Ballarini, P.1    Djafr, H.2    Duflot, M.3    Haddad, S.4    Pekergin, N.5
  • 26
    • 84875639698 scopus 로고    scopus 로고
    • The Network Simulator NS-2
    • The Network Simulator NS-2. http://www.isi.edu/nsnam/ns/
  • 29
    • 84875226332 scopus 로고    scopus 로고
    • Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, September DOI: 10.1002/cpe.1804.
    • Fouchal H, Habbas Z. Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, September 2011. DOI: 10.1002/cpe.1804.
    • (2011)
    • Fouchal, H.1    Habbas, Z.2
  • 30
    • 84871948539 scopus 로고    scopus 로고
    • IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s
    • In Wiley, In press.
    • Ben-Othman J, Saavedra Benitez Y. IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. In Concurrency and Computation: Practice and Experience. Wiley, In press.
    • Concurrency and Computation: Practice and Experience
    • Ben-Othman, J.1    Saavedra Benitez, Y.2
  • 31
    • 78449283412 scopus 로고    scopus 로고
    • Anomaly detection with wireless sensor networks. The 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), IEEE CS Press, Cambridge, MA, USA, July .
    • Dessart N, Fouchal H, Hunel P, Vidot N. Anomaly detection with wireless sensor networks. The 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), IEEE CS Press, Cambridge, MA, USA, July 2010.
    • (2010)
    • Dessart, N.1    Fouchal, H.2    Hunel, P.3    Vidot, N.4
  • 32
    • 84875676496 scopus 로고    scopus 로고
    • A low energy consumption MAC protocol for WSN. IEEE ICC 2012, Ottawa, Canada, June .
    • Bernard T, Fouchal H. A low energy consumption MAC protocol for WSN. IEEE ICC 2012, Ottawa, Canada, June 2012.
    • (2012)
    • Bernard, T.1    Fouchal, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.