메뉴 건너뛰기




Volumn , Issue , 2013, Pages 600-607

Denial-of-Service detection in 6LoWPAN based Internet of Things

Author keywords

6LoWPAN; Denial of Service Detection; Internet of Things; Intrusion Detection Systems; Penetration Testing

Indexed keywords

6LOWPAN; DENIAL OF SERVICE; INTERNET OF THINGS (IOT); INTRUSION DETECTION SYSTEMS; PENETRATION TESTING;

EID: 84891714668     PISSN: 21619646     EISSN: 21619654     Source Type: Conference Proceeding    
DOI: 10.1109/WiMOB.2013.6673419     Document Type: Conference Paper
Times cited : (285)

References (32)
  • 1
    • 84861534112 scopus 로고    scopus 로고
    • Compression format for ipv6 datagrams over ieee 802.15.4-based networks
    • (ISSN: 2070-1721), Sept.
    • J. W. Hui and P. Thubert, "Compression format for ipv6 datagrams over ieee 802.15.4-based networks." IETF Proposed Standard, (ISSN: 2070-1721) Available [Online] http://tools.ietf.org/html/rfc6282, Sept. 2011.
    • (2011) IETF Proposed Standard
    • Hui, J.W.1    Thubert, P.2
  • 3
    • 84877727033 scopus 로고    scopus 로고
    • The internet of things: How the next evolution of the internet is changing everything
    • D. Evans, "The internet of things: How the next evolution of the internet is changing everything," CISCO white paper, 2011.
    • (2011) CISCO White Paper
    • Evans, D.1
  • 4
    • 84891702697 scopus 로고    scopus 로고
    • European project-"enabling the business-based internet of things and services", Accessed May 2013.
    • "European project-"enabling the business-based internet of things and services"." website [Online] http://www.ebbits-project.eu/ news.php, Accessed May 2013.
  • 6
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," Pervasive Computing, IEEE, vol. 7, no. 1, pp. 74-81, 2008.
    • (2008) Pervasive Computing, IEEE , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 7
    • 84988272488 scopus 로고    scopus 로고
    • Security considerations in the ip-based internet of things
    • Mar
    • O. Garcia-Morchon, S. Kumar, R. Struik, S. Keoh, and R. Hummen, "Security considerations in the ip-based internet of things." IETF (work in progress) Available [Online] http://tools.ietf.org/html/draft- garciacore-security-05, Mar. 2013.
    • (2013) IETF (Work in Progress)
    • Garcia-Morchon, O.1    Kumar, S.2    Struik, R.3    Keoh, S.4    Hummen, R.5
  • 11
    • 78650756028 scopus 로고    scopus 로고
    • Contikisec: A secure network layer for wireless sensor networks under the contiki operating system
    • Springer
    • L. Casado and P. Tsigas, "Contikisec: A secure network layer for wireless sensor networks under the contiki operating system," in Identity and Privacy in the Internet Age, pp. 133-147, Springer, 2009.
    • (2009) Identity and Privacy in the Internet Age , pp. 133-147
    • Casado, L.1    Tsigas, P.2
  • 14
    • 84871266331 scopus 로고    scopus 로고
    • Rpl: Ipv6 routing protocol for low-power and lossy networks
    • Mar
    • T. Winter, "Rpl: Ipv6 routing protocol for low-power and lossy networks." IETF RFC 6550, Available [Online], http://tools.ietf.org/html/ rfc6550, Mar. 2012.
    • (2012) IETF RFC 6550
    • Winter, T.1
  • 15
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2
  • 18
    • 84856348082 scopus 로고    scopus 로고
    • Specification-based IDS for securing RPL from topology attacks
    • A. Le, J. Loo, and Y. Luo, "Specification-based IDS for securing RPL from topology attacks," Wireless Days (WD), 2011, pp. 4-6, 2011.
    • (2011) Wireless Days (WD), 2011 , pp. 4-6
    • Le, A.1    Loo, J.2    Luo, Y.3
  • 19
    • 84865658341 scopus 로고    scopus 로고
    • 6lowpan: A study on qos security threats and countermeasures using intrusion detection system approach
    • A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach," International Journal of Communication Systems, vol. 25, no. 9, pp. 1189-1212, 2012.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.9 , pp. 1189-1212
    • Le, A.1    Loo, J.2    Lasebae, A.3    Aiash, M.4    Luo, Y.5
  • 20
    • 85015054943 scopus 로고    scopus 로고
    • Security bootstrapping solution for resource-constrained devices
    • Nov
    • R. Cragie, Y. Ohba, R. Moskowitz, Z. Cao, and B. Sarikaya, "Security bootstrapping solution for resource-constrained devices." IETF (work in progress) Available [Online] http://tools.ietf.org/html/draft-oflynn- corebootstrapping-03, Nov. 2010.
    • (2010) IETF (Work in Progress)
    • Cragie, R.1    Ohba, Y.2    Moskowitz, R.3    Cao, Z.4    Sarikaya, B.5
  • 21
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer communications, vol. 30, no. 11, pp. 2314-2341, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 22
    • 73349090552 scopus 로고    scopus 로고
    • Intrusion detection systems for wireless sensor networks: A survey
    • Springer
    • A. H. Farooqi and F. A. Khan, "Intrusion detection systems for wireless sensor networks: A survey," in Communication and networking, pp. 234-241, Springer, 2009.
    • (2009) Communication and Networking , pp. 234-241
    • Farooqi, A.H.1    Khan, F.A.2
  • 23
    • 77954316597 scopus 로고    scopus 로고
    • Intrusion detection techniques in sensor networks
    • ed. J. Lopez and J. Zhou
    • A. Mitrokotsa and A. Karygiannis, "Intrusion detection techniques in sensor networks," Wireless Sensor Network Security, ed. J. Lopez and J. Zhou, pp. 251-272, 2008.
    • (2008) Wireless Sensor Network Security , pp. 251-272
    • Mitrokotsa, A.1    Karygiannis, A.2
  • 25
    • 70849118379 scopus 로고    scopus 로고
    • Rides: Robust intrusion detection system for ip-based ubiquitous sensor networks
    • S. O. Amin, M. S. Siddiqui, C. S. Hong, and S. Lee, "Rides: Robust intrusion detection system for ip-based ubiquitous sensor networks," Sensors, vol. 9, no. 5, pp. 3447-3468, 2009.
    • (2009) Sensors , vol.9 , Issue.5 , pp. 3447-3468
    • Amin, S.O.1    Siddiqui, M.S.2    Hong, C.S.3    Lee, S.4
  • 26
    • 84869790242 scopus 로고    scopus 로고
    • Novel, hybrid intrusion detection system for clustered wireless sensor network
    • July, 2011
    • H. Sedjelmaci and M. Feham, "Novel, Hybrid Intrusion Detection System for Clustered Wireless Sensor Network," International Journal of Network Security &Its Applications (IJNSA), Vol.3, No.4, July 2011, vol. 3, no. 4, pp. 1-14, 2011.
    • (2011) International Journal of Network Security &Its Applications (IJNSA) , vol.3 , Issue.4 , pp. 1-14
    • Sedjelmaci, H.1    Feham, M.2
  • 28
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • Nov
    • Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and H. Rhy, "An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks," IEEE Transactions on Industrial Informatics, vol. 6, pp. 744-757, Nov. 2010.
    • (2010) IEEE Transactions on Industrial Informatics , vol.6 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.-Y.3    Park, Y.4    Rhy, H.5
  • 29
    • 77953756374 scopus 로고    scopus 로고
    • Frequency agility in ipv6-based wireless personal area networks (6lowpan)
    • (E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, eds.) 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg,.
    • R. Tomasi, H. Khaleel, F. Penna, C. Pastrone, R. Garello, and M. Spirito, "Frequency agility in ipv6-based wireless personal area networks (6lowpan)," in Wired/Wireless Internet Communications (E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, eds.), vol. 6074 of Lecture Notes in Computer Science, pp. 146-157, Springer Berlin Heidelberg, 2010.
    • (2010) Wired/Wireless Internet Communications , pp. 146-157
    • Tomasi, R.1    Khaleel, H.2    Penna, F.3    Pastrone, C.4    Garello, R.5    Spirito, M.6
  • 31
    • 84891695256 scopus 로고    scopus 로고
    • Suricata-The Next Generation Intrusion Detection System, Accessed May 2013.
    • "Suricata-The Next Generation Intrusion Detection System." [Online] http://www.openinfosecfoundation.org, Accessed May 2013.
  • 32
    • 84891723096 scopus 로고    scopus 로고
    • Contiki, the open source os for the internet of things, Accessed May 2013.
    • "Contiki, the open source os for the internet of things." [Online] http://www.contiki-os.org/, Accessed May 2013.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.