메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Intrusion detection systems in wireless sensor networks: A review

Author keywords

[No Author keywords available]

Indexed keywords

DATA-FORWARDING; INTRUSION DETECTION SYSTEMS; RESEARCH PROBLEMS; SECURITY ATTACKS; SURROUNDING ENVIRONMENT; WIRELESS MEDIUM; WIRELESS SENSOR NETWORK (WSNS); WSN SECURITY;

EID: 84878653416     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/167575     Document Type: Review
Times cited : (128)

References (48)
  • 1
    • 58649103569 scopus 로고    scopus 로고
    • Distributed intrusion detection for mobile ad hoc networks
    • 2-s2.0-58649103569 10.1016/S1004-4132(08)60163-2
    • Ping Y., Xinghao J., Yue W., Ning L., Distributed intrusion detection for mobile ad hoc networks. Journal of Systems Engineering and Electronics 2008 19 4 851 859 2-s2.0-58649103569 10.1016/S1004-4132(08)60163-2
    • (2008) Journal of Systems Engineering and Electronics , vol.19 , Issue.4 , pp. 851-859
    • Ping, Y.1    Xinghao, J.2    Yue, W.3    Ning, L.4
  • 3
    • 78649494711 scopus 로고    scopus 로고
    • Framework for intrusion detection in IEEE 802.11 wireless mesh networks
    • 2-s2.0-78649494711
    • Khan S., Loo K. K., Din Z. U., Framework for intrusion detection in IEEE 802.11 wireless mesh networks. International Arab Journal of Information Technology 2010 7 4 435 440 2-s2.0-78649494711
    • (2010) International Arab Journal of Information Technology , vol.7 , Issue.4 , pp. 435-440
    • Khan, S.1    Loo, K.K.2    Din, Z.U.3
  • 8
    • 84873368740 scopus 로고    scopus 로고
    • Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks
    • Khan S., Mast N., Loo J., Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks. Information 2009 12 1 8
    • (2009) Information , vol.12 , pp. 1-8
    • Khan, S.1    Mast, N.2    Loo, J.3
  • 9
    • 84856717994 scopus 로고    scopus 로고
    • Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks
    • 2-s2.0-77953045295 10.1007/s11277-010-0048-y
    • Khan S., Loo J., Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications 2010 62 1 201 214 2-s2.0-77953045295 10.1007/s11277-010-0048-y
    • (2010) Wireless Personal Communications , vol.62 , Issue.1 , pp. 201-214
    • Khan, S.1    Loo, J.2
  • 11
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI 10.1109/MWC.2004.1368895
    • Shi E., Perrig A., Designing secure sensor networks. IEEE Wireless Communications 2004 11 6 38 43 2-s2.0-11144340927 10.1109/MWC.2004.1368895 (Pubitemid 40021188)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 13
    • 84878634020 scopus 로고    scopus 로고
    • A comparison of physical attacks on wireless sensor networks
    • 10.5121/ijp2p.2011.2203
    • Mohammadi S., Jadidoleslamy H., A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks 2011 2 2 24 42 10.5121/ijp2p.2011.2203
    • (2011) International Journal of Peer to Peer Networks , vol.2 , Issue.2 , pp. 24-42
    • Mohammadi, S.1    Jadidoleslamy, H.2
  • 14
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • Wood A. D., Stankovic J. A., Denial of service in sensor networks. Computer 2002 35 10 54 62 2-s2.0-0036793924 10.1109/MC.2002.1039518 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 19
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof C., Wagner D., Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003 1 2-3 293 315 2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8 (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 20
    • 77954758626 scopus 로고    scopus 로고
    • SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks
    • 2-s2.0-77954758626 10.1007/s10922-009-9143-3
    • Khan S., Loo K.-K., Mast N., Naeem T., SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management 2010 18 2 190 209 2-s2.0-77954758626 10.1007/s10922-009-9143- 3
    • (2010) Journal of Network and Systems Management , vol.18 , Issue.2 , pp. 190-209
    • Khan, S.1    Loo, K.-K.2    Mast, N.3    Naeem, T.4
  • 21
    • 84856065256 scopus 로고    scopus 로고
    • Secure route selection in wireless mesh networks
    • 10.1016/j.comnet.2011.07.005
    • Khan S., Alrajeh N. A., Loo K.-K., Secure route selection in wireless mesh networks. Journal of Computer Networks 2012 56 2 491 503 10.1016/j.comnet.2011.07.005
    • (2012) Journal of Computer Networks , vol.56 , Issue.2 , pp. 491-503
    • Khan, S.1    Alrajeh, N.A.2    Loo, K.-K.3
  • 24
    • 66149161650 scopus 로고    scopus 로고
    • Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
    • 2-s2.0-66149161650 10.1016/S1353-4858(09)70053-4
    • Khan S., Loo K.-K., Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Network Security 2009 2009 5 9 16 2-s2.0-66149161650 10.1016/S1353-4858(09) 70053-4
    • (2009) Network Security , vol.2009 , Issue.5 , pp. 9-16
    • Khan, S.1    Loo, K.-K.2
  • 26
    • 49949111918 scopus 로고    scopus 로고
    • Intrusion detection of Sinkhole attacks in wireless sensor networks
    • Springer Lecture Notes in Computer Science 2-s2.0-49949111918 10.1007/978-3-540-77871-4-14
    • Krontiris I., Dimitriou T., Giannetsos T., Mpasoukos M., Intrusion detection of Sinkhole attacks in wireless sensor networks. Algorithmic Aspects of Wireless Sensor Networks ALGOSENSORS 2008 4837 Springer 150 161 Lecture Notes in Computer Science 2-s2.0-49949111918 10.1007/978-3-540-77871-4-14
    • (2008) Algorithmic Aspects of Wireless Sensor Networks ALGOSENSORS , vol.4837 , pp. 150-161
    • Krontiris, I.1    Dimitriou, T.2    Giannetsos, T.3    Mpasoukos, M.4
  • 29
    • 33750520151 scopus 로고    scopus 로고
    • D-SCIDS: Distributed soft computing intrusion detection system
    • DOI 10.1016/j.jnca.2005.06.001, PII S1084804505000421, Network and Information Security: A Computational Intelligence Approach
    • Abraham A., Jain R., Thomas J., Han S. Y., D-SCIDS: distributed soft computing intrusion detection system. Journal of Network and Computer Applications 2007 30 1 81 98 2-s2.0-33750520151 10.1016/j.jnca.2005.06.001 (Pubitemid 44666484)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 81-98
    • Abraham, A.1    Jain, R.2    Thomas, J.3    Han, S.Y.4
  • 33
    • 84869405244 scopus 로고    scopus 로고
    • Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches
    • Islam M. S., Rahman S. A., Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches. International Journal of Advanced Sciences and Technology 2011 36 1 8
    • (2011) International Journal of Advanced Sciences and Technology , vol.36 , pp. 1-8
    • Islam, M.S.1    Rahman, S.A.2
  • 35
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Trusted Internet Workshop (TIW) 2004
    • Bhuse V., Gupta A., Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006 15 1 33 51 2-s2.0-32344436245 (Pubitemid 43221071)
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 36
    • 35348928856 scopus 로고    scopus 로고
    • Intrusion detection for routing attacks in sensor networks
    • 2-s2.0-35348928856 10.1080/15501320600692044
    • Loo C. E., Ng M. Y., Leckie C., Palaniswami M., Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks 2006 2 4 313 332 2-s2.0-35348928856 10.1080/15501320600692044
    • (2006) International Journal of Distributed Sensor Networks , vol.2 , Issue.4 , pp. 313-332
    • Loo, C.E.1    Ng, M.Y.2    Leckie, C.3    Palaniswami, M.4
  • 42
    • 84878641590 scopus 로고    scopus 로고
    • The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network
    • 10.5121/ijcses.2012.3204
    • Bhatnagar R., Shankar U., The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. International Journal of Computer Science & Engineering Survey 2012 3 2 31 38 10.5121/ijcses.2012. 3204
    • (2012) International Journal of Computer Science & Engineering Survey , vol.3 , Issue.2 , pp. 31-38
    • Bhatnagar, R.1    Shankar, U.2
  • 45
    • 38049159855 scopus 로고    scopus 로고
    • Hybrid intrusion detection system for wireless sensor networks
    • Berlin, Germany Springer Lecture Notes in Computer Science 2-s2.0-38049159855
    • Hai T. H., Khan F., Huh E. N., Hybrid intrusion detection system for wireless sensor networks. Computational Science and Its Applications-ICCSA 2007 2007 4706 Berlin, Germany Springer 383 396 Lecture Notes in Computer Science 2-s2.0-38049159855
    • (2007) Computational Science and Its Applications - ICCSA 2007 , vol.4706 , pp. 383-396
    • Hai, T.H.1    Khan, F.2    Huh, E.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.