메뉴 건너뛰기




Volumn 66, Issue 2, 2013, Pages 989-1007

Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach

Author keywords

Attacking efficiency; Energy cost; Node capture attack; Wireless sensor networks

Indexed keywords

COMPUTER PROGRAMMING; SOFTWARE ENGINEERING; WIRELESS SENSOR NETWORKS;

EID: 84887997518     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-013-0965-0     Document Type: Article
Times cited : (39)

References (37)
  • 2
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • 10.1145/990680.990707
    • Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53-57
    • (2004) Commun ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • 10.1016/S1570-8705(03)00008-8
    • Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2):293-315
    • (2003) Ad Hoc Netw , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 4
    • 34248339107 scopus 로고    scopus 로고
    • Modeling adaptive node capture attacks in multi-hop wireless networks
    • 10.1016/j.adhoc.2007.01.002
    • Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801-814
    • (2007) Ad Hoc Netw , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 6
    • 36048934000 scopus 로고    scopus 로고
    • Node compromise attacks and network connectivity
    • Chan K, Fekri F (2007) Node compromise attacks and network connectivity. Proc SPIE 6578:1-12
    • (2007) Proc SPIE , vol.6578 , pp. 1-12
    • Chan, K.1    Fekri, F.2
  • 9
    • 84887990248 scopus 로고    scopus 로고
    • A survey of black hole attacks in wireless mobile ad hoc networks
    • Fan-Hsun T, Li-Der C, Han-Chieh C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. J Converg. http://www.hcis-journal.com/ content/pdf/2192-1962-1-4.pdf
    • (2011) J Converg
    • Fan-Hsun, T.1    Li-Der, C.2    Han-Chieh, C.3
  • 11
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • 10.1007/3-540-45748-8-24
    • Douceur J (2002) The sybil attack. In: Peer-to-peer systems, pp 251-260
    • (2002) Peer-to-peer Systems , pp. 251-260
    • Douceur, J.1
  • 14
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • 10.1109/MNET.2006.1637931
    • Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41-47
    • (2006) IEEE Netw , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 15
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • 10.1109/MPRV.2008.6
    • Raymond D, Midkiff S (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74-81
    • (2008) IEEE Pervasive Comput , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.1    Midkiff, S.2
  • 17
    • 39049172951 scopus 로고    scopus 로고
    • Replication attack on random key pre-distribution schemes for wireless sensor networks
    • 10.1016/j.comcom.2007.10.026
    • Fu H, Kawamura S, Zhang M, Zhang L (2008) Replication attack on random key pre-distribution schemes for wireless sensor networks. Comput Commun 31(4):842-857
    • (2008) Comput Commun , vol.31 , Issue.4 , pp. 842-857
    • Fu, H.1    Kawamura, S.2    Zhang, M.3    Zhang, L.4
  • 18
    • 84874676371 scopus 로고    scopus 로고
    • The replication attack in wireless sensor networks: Analysis and defenses
    • Manjula V, Chellappan C (2011) The replication attack in wireless sensor networks: analysis and defenses. Adv Netw Commun, 169-178
    • (2011) Adv Netw Commun , pp. 169-178
    • Manjula, V.1    Chellappan, C.2
  • 23
    • 79956200557 scopus 로고    scopus 로고
    • Unified modeling language based analysis of security attacks in wireless sensor networks: A survey
    • 10.3837/tiis.2011.04.010
    • Hong S, Lim S, Song J (2011) Unified modeling language based analysis of security attacks in wireless sensor networks: a survey. KSII Trans Internet Inf Syst 5(5):805-821
    • (2011) KSII Trans Internet Inf Syst , vol.5 , Issue.5 , pp. 805-821
    • Hong, S.1    Lim, S.2    Song, J.3
  • 28
    • 67651048997 scopus 로고    scopus 로고
    • Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory
    • 10.1145/1525856.1525861
    • De P, Liu Y, Das S (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw 5(3):1-33
    • (2009) ACM Trans Sens Netw , vol.5 , Issue.3 , pp. 1-33
    • De, P.1    Liu, Y.2    Das, S.3
  • 30
    • 79953816985 scopus 로고    scopus 로고
    • Increasing resiliency in multiphase wireless sensor networks: Generation wise key predistribution approach
    • 10.1093/comjnl/bxq043
    • Ergun M, Levi A, Savas E (2011) Increasing resiliency in multiphase wireless sensor networks: generation wise key predistribution approach. Comput J 54(4):602-616
    • (2011) Comput J , vol.54 , Issue.4 , pp. 602-616
    • Ergun, M.1    Levi, A.2    Savas, E.3
  • 35
    • 67649198136 scopus 로고    scopus 로고
    • Evaluating the vulnerability of network traffic using joint security and routing analysis
    • 10.1109/TDSC.2008.60
    • Tague P, Slater D, Rogers J, Poovendran R (2008) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Dependable Secure Comput 6(2):111-123
    • (2008) IEEE Trans Dependable Secure Comput , vol.6 , Issue.2 , pp. 111-123
    • Tague, P.1    Slater, D.2    Rogers, J.3    Poovendran, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.