메뉴 건너뛰기




Volumn 9, Issue 6, 2014, Pages 1055-1064

Game theory model for intrusion detection in WSN using hierarchical trust management

Author keywords

Game theory; Hierarchical trust management; Intrusion detection; Wireless Sensor Networks (WSN)

Indexed keywords


EID: 84905725635     PISSN: 18286003     EISSN: 18286011     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (18)
  • 2
    • 78651576751 scopus 로고    scopus 로고
    • An isolation intrusion detection system for hierarchical wireless sensor networks
    • Chen, Rung-Ching, Chia-Fen Hsieh, and Yung-Fa Huang. An isolation intrusion detection system for hierarchical wireless sensor networks. Journal of Networks 5.3 (2010): 335-342.
    • (2010) Journal of Networks , vol.5 , Issue.3 , pp. 335-342
    • Chen, R.-C.1    Hsieh, C.-F.2    Huang, Y.-F.3
  • 3
    • 61649086771 scopus 로고    scopus 로고
    • Cooperative intrusion detection in wireless sensor networks
    • Springer Berlin Heidelberg
    • Krontiris, Ioannis, et al. Cooperative intrusion detection in wireless sensor networks. Wireless Sensor Networks. Springer Berlin Heidelberg, 2009. 263-278.
    • (2009) Wireless Sensor Networks , pp. 263-278
    • Krontiris, I.1
  • 4
    • 77749339862 scopus 로고    scopus 로고
    • Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
    • ICCIT'09. Fourth International Conference on. IEEE
    • Tiwari, Mukesh, et al. Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Computer Sciences and Convergence Information Technology, 2009. ICCIT'09. Fourth International Conference on. IEEE, 2009.
    • (2009) Computer Sciences and Convergence Information Technology, 2009
    • Tiwari, M.1
  • 5
    • 58049120336 scopus 로고    scopus 로고
    • A novel reputation model for malicious node detection in wireless sensor network
    • WiCOM'08. 4th International Conference on. IEEE
    • Yin, Guisheng, et al. A novel reputation model for malicious node detection in wireless sensor network. Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on. IEEE, 2008.
    • (2008) Wireless Communications, Networking and Mobile Computing, 2008
    • Yin, G.1
  • 6
    • 80052648896 scopus 로고    scopus 로고
    • Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
    • 2010 First IEEE International Conference on. IEEE
    • Berthier, Robin, William H. Sanders, and Himanshu Khurana. Intrusion detection for advanced metering infrastructures: Requirements and architectural directions. Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 2010.
    • (2010) Smart Grid Communications (SmartGridComm)
    • Berthier, R.1    Sanders, W.H.2    Khurana, H.3
  • 8
    • 77955082590 scopus 로고    scopus 로고
    • Outlier detection techniques for wireless sensor networks: A survey
    • IEEE
    • Zhang, Yang, Nirvana Meratnia, and Paul Havinga. Outlier detection techniques for wireless sensor networks: A survey. Communications Surveys & Tutorials, IEEE 12.2 (2010): 159-170.
    • (2010) Communications Surveys & Tutorials , vol.12 , Issue.2 , pp. 159-170
    • Zhang, Y.1    Meratnia, N.2    Havinga, P.3
  • 10
    • 70449506562 scopus 로고    scopus 로고
    • A game theory approach to detect malicious nodes in wireless sensor networks
    • Third International Conference on. IEEE
    • Reddy, Yenumula B. A game theory approach to detect malicious nodes in wireless sensor networks. Sensor Technologies and Applications, 2009. SENSORCOMM'09. Third International Conference on. IEEE, 2009.
    • (2009) Sensor Technologies and Applications, 2009. SENSORCOMM'09
    • Reddy, Y.B.1
  • 11
    • 72349096262 scopus 로고    scopus 로고
    • Reputation-enabled self-modification for target sensing in wireless sensor networks
    • IEEE Transactions on
    • Wang, Xue, Liang Ding, and Daowei Bi. Reputation-enabled self-modification for target sensing in wireless sensor networks. Instrumentation and Measurement, IEEE Transactions on 59.1 (2010): 171-179.
    • (2010) Instrumentation and Measurement , vol.59 , Issue.1 , pp. 171-179
    • Wang, X.1    Ding, L.2    Bi, D.3
  • 12
    • 77954712914 scopus 로고    scopus 로고
    • Novel defense mechanism against data flooding attacks in wireless ad hoc networks
    • IEEE Transactions on
    • Kim, Hyojin, Ramachandra Bhargav Chitti, and JooSeok Song. Novel defense mechanism against data flooding attacks in wireless ad hoc networks. Consumer Electronics, IEEE Transactions on 56.2 (2010): 579-582.
    • (2010) Consumer Electronics , vol.56 , Issue.2 , pp. 579-582
    • Kim, H.1    Chitti, R.B.2    Song, J.3
  • 13
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • IEEE Transactions on
    • Bao, Fenye, et al. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network and Service Management, IEEE Transactions on 9.2 (2012): 169-183.
    • (2012) Network and Service Management , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1
  • 15
    • 85008524827 scopus 로고    scopus 로고
    • Thwarting Control-Channel Jamming Attacks from Inside Jammers
    • SEPTEMBER
    • Sisi Liu, Loukas Lazos and Marwan Krunz, " Thwarting Control-Channel Jamming Attacks from Inside Jammers" IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 9, SEPTEMBER 2012.
    • (2012) IEEE Transactions on Mobile Computing , vol.11 , Issue.9
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 16
    • 84905744453 scopus 로고    scopus 로고
    • Network Simulator
    • Network Simulator: http:///www.isi.edu/nsnam
  • 17
    • 84860171458 scopus 로고    scopus 로고
    • A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks
    • July
    • T. Ezzedine, M. Miladi, R. Bouallegue, "A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks", International Review on Computers and Software (IRECOS), Vol. 3. no. 4, pp. 337-348, July 2008.
    • (2008) International Review On Computers and Software (IRECOS) , vol.3 , Issue.4 , pp. 337-348
    • Ezzedine, T.1    Miladi, M.2    Bouallegue, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.