메뉴 건너뛰기




Volumn , Issue , 2009, Pages 63-90

Impact of packet injection models on misbehavior detection performance in wireless sensor networks

Author keywords

Artificial immune systems; Intrusion detection; Wireless sensor networks

Indexed keywords


EID: 84895229000     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (4)

References (85)
  • 2
    • 79955281664 scopus 로고    scopus 로고
    • AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles
    • special session on Recent developments in artificial immune systems, Singapore
    • Martin Drozda, Sven Schaust, Helena Szczerbicka. AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles. Proc. IEEE Congress on Evolutionary Computation (CEC'07), special session on Recent developments in artificial immune systems, pp. 3719-3726, Singapore, 2007.
    • (2007) Proc. IEEE Congress on Evolutionary Computation (CEC'07) , pp. 3719-3726
    • Drozda, M.1    Schaust, S.2    Szczerbicka, H.3
  • 17
    • 18744385858 scopus 로고    scopus 로고
    • JiST: an efficient approach to simulation using virtual machines
    • R. Barr, Z.J. Haas, R. van Renesse. JiST: an efficient approach to simulation using virtual machines. Software Practice and Experience, vol. 35, no. 6, pp. 539-576, 2005.
    • (2005) Software Practice and Experience , vol.35 , Issue.6 , pp. 539-576
    • Barr, R.1    Haas, Z.J.2    van Renesse, R.3
  • 22
    • 26844458123 scopus 로고    scopus 로고
    • An Artificial Immune System for Misbehavior Detection inMobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors
    • Slavǐsa Sarafijanovíc and Jean-Yves Le Boudec. An Artificial Immune System for Misbehavior Detection inMobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. Proc. ICARIS (Third international conference on artificial immune systems), 2004.
    • (2004) Proc. ICARIS (Third international conference on artificial immune systems)
    • Sarafijanovíc, S.1    Le Boudec, J.-Y.2
  • 23
    • 33745804827 scopus 로고    scopus 로고
    • An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks
    • J.Y. Le Boudec, S. Sarafijanovíc. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-Hoc Networks. Proc. Bio-ADIT, pp. 96-111, 2004.
    • (2004) Proc. Bio-ADIT , pp. 96-111
    • Le Boudec, J.Y.1    Sarafijanovíc, S.2
  • 29
    • 28444486324 scopus 로고    scopus 로고
    • Medium Access Control inWireless Sensor Networks
    • Kluwer Academic Publishers, Norwell, MA, USA
    • W. Ye and J. Heidemann. Medium Access Control inWireless Sensor Networks.Wireless Sensor Networks, pp. 73-91, Kluwer Academic Publishers, Norwell, MA, USA, 2004.
    • (2004) Wireless Sensor Networks , pp. 73-91
    • Ye, W.1    Heidemann, J.2
  • 31
  • 33
  • 36
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: a defense against wormhole attacks in wireless networks
    • Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 2003
    • Yih-Chun Hu, Adrian Perrig, David B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. Proc. INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 2003.
    • (2003) Proc. INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 38
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • Venkata N. Padmanabhan, Daniel R. Simon. Secure traceroute to detect faulty or malicious routing. ACM SIGCOMM Computer Communication Review, vol. 33, issue 1, pp. 77-82, 2003.
    • (2003) ACM SIGCOMM Computer Communication Review , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.N.1    Simon, D.R.2
  • 48
    • 0038282217 scopus 로고    scopus 로고
    • Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
    • D. Barbar`a and S. Jajodia (eds.), Kluwer Academic Publisher
    • Steven Noel, Duminda Wijesekera, Charles Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbar`a and S. Jajodia (eds.), Kluwer Academic Publisher, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Noel, S.1    Wijesekera, D.2    Youman, C.3
  • 52
    • 0036152263 scopus 로고    scopus 로고
    • On Credibility of Simulation Studies Of Telecommunication Networks
    • January
    • K. Pawlikowski, H.-D.J. Jeong and J.-S. Ruth Lee. On Credibility of Simulation Studies Of Telecommunication Networks. IEEE Communications Magazine, January [2002,] 132-139.
    • (2002) IEEE Communications Magazine , pp. 132-139
    • Pawlikowski, K.1    Jeong, H.-D.2    Lee, R.-S.3
  • 53
    • 0002893043 scopus 로고    scopus 로고
    • Immunology as information processing
    • edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press
    • S. Forrest and S.A. Hofmeyr. Immunology as information processing. In Design Principles for the Immune System and Other Distributed Autonomous Systems, edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press, 2001.
    • (2001) Design Principles for the Immune System and Other Distributed Autonomous Systems
    • Forrest, S.1    Hofmeyr, S.A.2
  • 58
    • 0035912764 scopus 로고    scopus 로고
    • How the immune system works to protect the host from infection: A personal view
    • C.A. Janeway Jr. How the immune system works to protect the host from infection: A personal view. Proc. the National Academy of Sciences, vol. 98, no. 13, pp. 7461- [7468,] 2001.
    • (2001) Proc. the National Academy of Sciences , vol.98 , Issue.13 , pp. 7461-7468
    • Janeway Jr., C.A.1
  • 60
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Tim Baas. Intrusion detection systems and multisensor data fusion. Communications of the ACM, vol. 43, issue 4, pp. 99-105, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Baas, T.1
  • 62
    • 0033892676 scopus 로고    scopus 로고
    • Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
    • Tel Aviv, Israel, March
    • S. Das, C. Perkins, and E. Royer. Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. Proc. IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, March 2000, pp. 3-12.
    • (2000) Proc. IEEE Conference on Computer Communications (INFOCOM) , pp. 3-12
    • Das, S.1    Perkins, C.2    Royer, E.3
  • 65
    • 0037936354 scopus 로고    scopus 로고
    • The transport layer: tutorial and survey
    • Sami Iren, Paul D. Amer, Phillip, T. Conrad, The transport layer: tutorial and survey, ACM Computing Surveys, vol. 31, no. 4, pp. 360-404, 1999.
    • (1999) ACM Computing Surveys , vol.31 , Issue.4 , pp. 360-404
    • Iren, S.1    Phillip, P.D.A.2    Conrad, T.3
  • 66
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • February
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Distributed Systems Security (SNDSS), pages 151- [165,] February 1999.
    • (1999) Distributed Systems Security (SNDSS) , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 73
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad HocWireless Networks
    • Tomasz Imielinski and Hank Korth, Eds
    • D. Johnson and D. Maltz. Dynamic Source Routing in Ad HocWireless Networks. In Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 75
    • 85031307530 scopus 로고
    • Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
    • August
    • C. E. Perkins and P. Bhagwat. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers Proc. SIGCOMM'94, pages 234-244, August 1994.
    • (1994) Proc. SIGCOMM'94 , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 77
    • 17644388014 scopus 로고
    • complexity theory: An introduction for practitioners of classification
    • P. Arabie and L. Hubert, Eds, World Scientific Publishing Co., Inc., River Edge, NJ
    • Day, W.H.E., 1992, complexity theory: An introduction for practitioners of classification. In Clustering and Classification, P. Arabie and L. Hubert, Eds, World Scientific Publishing Co., Inc., River Edge, NJ
    • (1992) Clustering and Classification
    • Day, W.H.E.1
  • 79
    • 0004161991 scopus 로고
    • Prentice Hall advanced reference series. Prentice Hall, Inc., Upper Saddle River, N.J
    • Jain and Dubes 1988, Algorithms for Clustering Data, Prentice Hall advanced reference series. Prentice Hall, Inc., Upper Saddle River, N.J.
    • (1988) Algorithms for Clustering Data
    • Jain1    Dubes2
  • 80
    • 0020848951 scopus 로고
    • A survey of recent advances in hierachical clustering algorithms which use cluster centers
    • Murtagh, F. 1984, A survey of recent advances in hierachical clustering algorithms which use cluster centers, Comput. J. 26, 354-359
    • (1984) Comput. J. , vol.26 , pp. 354-359
    • Murtagh, F.1
  • 81
    • 84869987612 scopus 로고
    • Automated construction of classifications, conceptual clustering versus heuristic methods for clustering
    • E.S. Gelsema und L.N. Kanal, Eds
    • Michalski, R., Stepp, R. E., and Diday, E., 1983, Automated construction of classifications, conceptual clustering versus heuristic methods for clustering, In Pattern Recognition in Practice, E.S. Gelsema und L.N. Kanal, Eds. 425-436
    • (1983) Pattern Recognition in Practice , pp. 425-436
    • Michalski, R.1    Stepp, R.E.2    Diday, E.3
  • 82
    • 0018183618 scopus 로고
    • Agglomerative clustering using the concept of mutual nearest neighborhood
    • Gowda, K. C. and Krishna, G. 1977, Agglomerative clustering using the concept of mutual nearest neighborhood, Pattern Regn. 10, 105-112
    • (1977) Pattern Regn , vol.10 , pp. 105-112
    • Gowda, K.C.1    Krishna, G.2
  • 83
    • 84944178665 scopus 로고
    • Hierachical grouping to optimize an objective funtion
    • Ward, J. H. Jr 1963, Hierachical grouping to optimize an objective funtion J. Am Stat. Assoc. 58, 236-244
    • (1963) J. Am Stat. Assoc. , vol.58 , pp. 236-244
    • Ward Jr., J.H.1
  • 84
    • 84895331534 scopus 로고    scopus 로고
    • ZigBee Alliance
    • ZigBee Alliance. www.zigbee.org.
    • www.zigbee.org
  • 85
    • 84895395801 scopus 로고    scopus 로고
    • Crossbow Technology Inc
    • Crossbow Technology Inc. www.xbow.com
    • www.xbow.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.