메뉴 건너뛰기




Volumn , Issue , 2013, Pages 329-333

Security attacks in wireless sensor networks: A survey

Author keywords

Jamming; Security; Selective Forwarding; Sinkhole; Sybil; Wireless sensor networks; Wormhole

Indexed keywords

SECURITY; SELECTIVE FORWARDING; SINKHOLE; SYBIL; WORMHOLE;

EID: 84880241701     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSP.2013.6526929     Document Type: Conference Paper
Times cited : (54)

References (33)
  • 2
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks," in Proc. of IEEEINFOCOM, 2003, pp. 1976-1986, vol.3
    • (2003) Proc. of IEEEINFOCOM , vol.3 , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 3
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • Security (NDSS 04), San Diego; February
    • L. X. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. IEEE Symp. Network and Distributed System, Security (NDSS 04), San Diego; February 2004.
    • (2004) Proc. IEEE Symp. Network and Distributed System
    • Hu, L.X.1    Evans, D.2
  • 7
    • 11244309139 scopus 로고    scopus 로고
    • Visualization of wormholes in sensor networks
    • ACM workshop on Wireless Security, ACM Press
    • W. Wang and B. Bhargava, "Visualization of wormholes in sensor networks" WiSe'04, Proceeding of the 2004 ACM workshop on Wireless Security , ACM Press, pp. 51-60, 2004.
    • (2004) WiSe'04, Proceeding of the 2004 , pp. 51-60
    • Wang, W.1    Bhargava, B.2
  • 15
    • 84880205763 scopus 로고    scopus 로고
    • Determining the position of a jammer using a virtual-force iterative approach
    • Hongbo Liu, Zhenhua Liu, Yingying Chen and Wenyuan Xu, "Determining the position of a jammer using a virtual-force iterative approach" Wireless Network@ Springer, 2010, pp. 1-17
    • (2010) Wireless Network@ Springer , pp. 1-17
    • Liu, H.1    Liu, Z.2    Chen, Y.3    Xu, W.4
  • 18
  • 22
    • 51749097975 scopus 로고    scopus 로고
    • Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge
    • Tran Hoang Hai and Eui nam Huh "Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge" In NCA, pages 325-331, 2008.
    • (2008) NCA , pp. 325-331
    • Hai, T.H.1    Huh, E.N.2
  • 23
    • 51249104865 scopus 로고    scopus 로고
    • Detection of selective forwarding attacks in heterogeneous sensor networks
    • Jeremy Brown and Xiaojiang Du "Detection of selective forwarding attacks in heterogeneous sensor networks" In ICC, pages 1583-1587, 2008.
    • (2008) ICC , pp. 1583-1587
    • Brown, J.1    Du, X.2
  • 25
    • 42549138436 scopus 로고    scopus 로고
    • On the intruder detection for sinkhole attack in wireless sensor networks
    • Edith C. H. Ngai, Jiangchuan Liu and Michael R. Lyu; "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks" IEEE International Conference on Communications, 2006, Volume 8, pp. 3383-3389
    • (2006) IEEE International Conference on Communications , vol.8 , pp. 3383-3389
    • Ngai, C.H.1    Liu, J.2    Lyu, M.R.3
  • 26
    • 48149090928 scopus 로고    scopus 로고
    • Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
    • ICON 2007
    • Daniel Dallas, Christopher Leckie, Kotagiri Ramamohanarao; "Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks" 15th IEEE International Conference on Networks, 2007, ICON 2007, pp. 176-181
    • (2007) 15th IEEE International Conference on Networks , pp. 176-181
    • Dallas, D.1    Leckie, C.2    Ramamohanarao, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.