메뉴 건너뛰기




Volumn 12, Issue 9, 2013, Pages 1764-1771

An intrusion detection system for cluster based wireless sensor networks

Author keywords

Behavior characteristic; Evidence theory; Intrusion detection system; Security; Weight algorithm; Wireless sensor networks

Indexed keywords

BEHAVIOR CHARACTERISTIC; EVIDENCE THEORIES; INTRUSION DETECTION SYSTEMS; SECURITY; WEIGHT ALGORITHM;

EID: 84880080728     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2013.1764.1771     Document Type: Article
Times cited : (4)

References (17)
  • 4
    • 23044483906 scopus 로고    scopus 로고
    • New weighting factors assignment of evidence theory based one vidence distance
    • Chen, L., W. Shi and F. Du, 2005. New weighting factors assignment of evidence theory based one vidence distance. J. Syst. Eng. Electron., 16: 273-278.
    • (2005) J. Syst. Eng. Electron. , vol.16 , pp. 273-278
    • Chen, L.1    Shi, W.2    Du, F.3
  • 5
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • Dempster, A.P., 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat., 38: 325-339.
    • (1967) Ann. Math. Stat. , vol.38 , pp. 325-339
    • Dempster, A.P.1
  • 6
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • Depren, O., M. Topallar, E. Anarim and M.K. Ciliz, 2005. An intelligent Intrusion Detection System (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl, 29: 713-722.
    • (2005) Expert Syst. Appl , vol.29 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 10
    • 77951178321 scopus 로고    scopus 로고
    • Adaptive weighted fusion algorithm for monitoring system of forest fire based on wireless sensor networks
    • January 22-24, 2010, Sanya, Hainan, China
    • Lu, G. and W. Xue, 2010. Adaptive weighted fusion algorithm for monitoring system of forest fire based on wireless sensor networks. Proceedings of the 2nd International Conference on Computer Modeling and Simulation, Volume 4, January 22-24, 2010, Sanya, Hainan, China, pp: 414-417.
    • (2010) Proceedings of the 2nd International Conference on Computer Modeling and Simulation , vol.4 , pp. 414-417
    • Lu, G.1    Xue, W.2
  • 11
    • 84856640682 scopus 로고    scopus 로고
    • Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks
    • Moon, S.Y. and T.H. Cho, 2009. Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int. J. Comput. Sci. Network Secur., 9: 118-122.
    • (2009) Int. J. Comput. Sci. Network Secur. , vol.9 , pp. 118-122
    • Moon, S.Y.1    Cho, T.H.2
  • 14
    • 77949592506 scopus 로고    scopus 로고
    • Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
    • Communications and Signal Processing, December 8-10, 2009, Macau, China
    • Tumrongwittayapak, C. and R. Varakulsiripunth, 2009. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. Proceedings of the 7th International Conference on Information, Communications and Signal Processing, December 8-10, 2009, Macau, China, pp: 1-5.
    • (2009) Proceedings of the 7th International Conference on Information , pp. 1-5
    • Tumrongwittayapak, C.1    Varakulsiripunth, R.2
  • 15
    • 84861633844 scopus 로고    scopus 로고
    • On the topology of wireless sensor networks
    • March 25-30, 2012, Orlando, FL., USA.
    • Yang, S., X. Wang and L. Fu, 2012. On the topology of wireless sensor networks. Proceedings of the IEEE INFOCOM, March 25-30, 2012, Orlando, FL., USA., pp: 2095-2103.
    • (2012) Proceedings of the IEEE INFOCOM , pp. 2095-2103
    • Yang, S.1    Wang, X.2    Fu, L.3
  • 17
    • 70350692585 scopus 로고    scopus 로고
    • Security wireless sensor networks: A survey
    • Zhou, Y., Y. Fang and Y. Zhang, 2008. Security wireless sensor networks: A survey. Commun. Surv. Tutorials, 10: 6-28.
    • (2008) Commun. Surv. Tutorials , vol.10 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.