메뉴 건너뛰기




Volumn 15, Issue 5, 2016, Pages 3718-3731

Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks

Author keywords

channel aware; packet dropping; reputation system; routing; selective forwarding attack; wireless sensor network

Indexed keywords

DROPS; PACKET LOSS; SENSOR NODES;

EID: 84969508563     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2016.2526601     Document Type: Article
Times cited : (120)

References (35)
  • 1
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • May
    • I. Butun, S. Morgera, and R. Sankar, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun. Surveys Tuts, vol. 16, no. 1, pp. 266-282, May 2014.
    • (2014) IEEE Commun. Surveys Tuts , vol.16 , Issue.1 , pp. 266-282
    • Butun, I.1    Morgera, S.2    Sankar, R.3
  • 2
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec
    • Y. Zou, X. Wang, and W. Shen, Physical-layer security with multiuser scheduling in cognitive radio networks, IEEE Trans. Commun, vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 3
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao, CHEMAS: Identify suspect nodes in selective forwarding attacks, J. Parallel Distrib. Comput, vol. 67, no. 11, pp. 1218-1230, 2007.
    • (2007) J. Parallel Distrib. Comput , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 4
    • 84978933144 scopus 로고    scopus 로고
    • AMD: Audit-based misbehavior detection in wireless ad hoc networks
    • Sep. to be published
    • Y. Zhang, L. Lazos, and W. Kozma, AMD: Audit-based misbehavior detection in wireless ad hoc networks, IEEE Trans. Mobile Comput., Sep. 2013, doi: 10.1109/TMC.2012.257, to be published
    • (2013) IEEE Trans. Mobile Comput
    • Zhang, Y.1    Lazos, L.2    Kozma, W.3
  • 5
    • 54949103489 scopus 로고    scopus 로고
    • Functional reputation based reliable data aggregation, and transmission for wireless sensor networks
    • S. Ozdemir, Functional reputation based reliable data aggregation, and transmission for wireless sensor networks, Comput. Commun, vol. 31, no. 17, pp. 3941-3953, 2008.
    • (2008) Comput. Commun , vol.31 , Issue.17 , pp. 3941-3953
    • Ozdemir, S.1
  • 6
    • 84866738779 scopus 로고    scopus 로고
    • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks
    • D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks, Comput. Commun, vol. 35, no. 17, pp. 2125-2137, 2012.
    • (2012) Comput. Commun , vol.35 , Issue.17 , pp. 2125-2137
    • Hao, D.1    Liao, X.2    Adhikari, A.3    Sakurai, K.4    Yokoo, M.5
  • 7
    • 84891775418 scopus 로고    scopus 로고
    • Enabling trustworthy service evaluation in service-oriented mobile social networks
    • Feb
    • X. Liang, X. Lin, and X. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks, IEEE Trans. Parallel Distrib. Syst, vol. 25, no. 2, pp. 310-320, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.2 , pp. 310-320
    • Liang, X.1    Lin, X.2    Shen, X.3
  • 8
    • 84930081899 scopus 로고    scopus 로고
    • SACRM: Social aware crowdsourcing with reputation management in mobile sensing
    • J. Ren, Y. Zhang, K. Zhang, and X. Shen, SACRM: Social aware crowdsourcing with reputation management in mobile sensing, Comput. Commun, vol. 65, no. 15, pp. 55-65, 2015.
    • (2015) Comput. Commun , vol.65 , Issue.15 , pp. 55-65
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Shen, X.4
  • 9
    • 76349123136 scopus 로고    scopus 로고
    • Time series forecasting with multiple candidate models: Selecting or combining
    • L. Yu, S. Wang, K. Lai, and Y. Nakamori, Time series forecasting with multiple candidate models: Selecting or combining, J. Syst. Sci. Complexity, vol. 18, no. 1, pp. 1-18, 2005.
    • (2005) J. Syst. Sci. Complexity , vol.18 , Issue.1 , pp. 1-18
    • Yu, L.1    Wang, S.2    Lai, K.3    Nakamori, Y.4
  • 10
    • 84949922201 scopus 로고    scopus 로고
    • Exploiting channel-Aware reputation system against selective forwarding attacks in WSNs
    • J. Ren, Y. Zhang, K. Zhang, and X. Shen, Exploiting channel-Aware reputation system against selective forwarding attacks in WSNs, in Proc. IEEE GLOBECOM, 2014, pp. 330-335.
    • (2014) Proc. IEEE GLOBECOM , pp. 330-335
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Shen, X.4
  • 11
    • 84857921036 scopus 로고    scopus 로고
    • Mitigating packet dropping problem in mobile ad hoc networks: Proposals, and challenges
    • Nov
    • S. Djahel, F. Nait-Abdesselam, and Z. Zhang, Mitigating packet dropping problem in mobile ad hoc networks: Proposals, and challenges, IEEE Commun. Surveys Tuts, vol. 13, no. 4, pp. 658-672, Nov. 2011.
    • (2011) IEEE Commun. Surveys Tuts , vol.13 , Issue.4 , pp. 658-672
    • Djahel, S.1    Nait-Abdesselam, F.2    Zhang, Z.3
  • 12
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgmentbased approach for the detection of routing misbehavior in MANETs
    • May
    • K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, An acknowledgmentbased approach for the detection of routing misbehavior in MANETs, IEEE Trans. Mobile Comput, vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Comput , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.3    Balakrishnan, K.4
  • 13
    • 80054815214 scopus 로고    scopus 로고
    • An integrated stimulation, and punishment mechanism for thwarting packet dropping attack in multihop wireless networks
    • Oct
    • E. Mahmoud, and X. Shen, An integrated stimulation, and punishment mechanism for thwarting packet dropping attack in multihop wireless networks, IEEE Trans. Veh. Technol, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
    • (2011) IEEE Trans. Veh. Technol , vol.60 , Issue.8 , pp. 3947-3962
    • Mahmoud, E.1    Shen, X.2
  • 14
    • 84868112157 scopus 로고    scopus 로고
    • EAACK-A secure intrusiondetection system for MANETs
    • Mar
    • E. Shakshuki, N. Kang, and T. Sheltami, EAACK-A secure intrusiondetection system for MANETs, IEEE Trans. Ind. Electron, vol. 60, no. 3, pp. 1089-1098, Mar. 2013.
    • (2013) IEEE Trans. Ind. Electron , vol.60 , Issue.3 , pp. 1089-1098
    • Shakshuki, E.1    Kang, N.2    Sheltami, T.3
  • 15
    • 84860678494 scopus 로고    scopus 로고
    • Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing
    • T. Shu, and M. Krunz, Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing, in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec), 2012, pp. 87-98.
    • (2012) Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec , pp. 87-98
    • Shu, T.1    Krunz, M.2
  • 16
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. ACM MobiCom, 2000, pp. 255-265.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 17
    • 80052176023 scopus 로고    scopus 로고
    • Side channel monitoring: Packet drop attack detection in wireless ad hoc networks
    • X. Li, R. Lu, X. Liang, and X. Shen, Side channel monitoring: Packet drop attack detection in wireless ad hoc networks, in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
    • (2011) Proc. IEEE Int. Conf. Commun. (ICC , pp. 1-5
    • Li, X.1    Lu, R.2    Liang, X.3    Shen, X.4
  • 18
    • 77952986444 scopus 로고    scopus 로고
    • Secure data collection in wireless sensor networks using randomized dispersive routes
    • Jul
    • T. Shu, M. Krunz, and S. Liu, Secure data collection in wireless sensor networks using randomized dispersive routes, IEEE Trans. Mobile Comput, vol. 9, no. 7, pp. 941-954, Jul. 2010.
    • (2010) IEEE Trans. Mobile Comput , vol.9 , Issue.7 , pp. 941-954
    • Shu, T.1    Krunz, M.2    Liu, S.3
  • 19
    • 84866503616 scopus 로고    scopus 로고
    • Secure, and energyefficient disjoint multipath routing for WSNs
    • Sep
    • A. Liu, Z. Zheng, C. Zhang, Z. Chen, and X. Shen, Secure, and energyefficient disjoint multipath routing for WSNs, IEEE Trans. Veh. Technol, vol. 61, no. 7, pp. 3255-3265, Sep. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.7 , pp. 3255-3265
    • Liu, A.1    Zheng, Z.2    Zhang, C.3    Chen, Z.4    Shen, X.5
  • 20
    • 84907599734 scopus 로고    scopus 로고
    • Adaptive, and secure load-balancing routing protocol for service-oriented wireless sensor networks
    • Sep
    • S. Li, S. Zhao, X. Wang, K. Zhang, and L. Li, Adaptive, and secure load-balancing routing protocol for service-oriented wireless sensor networks, IEEE Syst. J, vol. 8, no. 3, pp. 858-867, Sep. 2014.
    • (2014) IEEE Syst. J , vol.8 , Issue.3 , pp. 858-867
    • Li, S.1    Zhao, S.2    Wang, X.3    Zhang, K.4    Li, L.5
  • 21
    • 77952255404 scopus 로고    scopus 로고
    • Mitigating selective forwarding attacks with a channel-Aware approach in WMNs
    • May
    • D. M. Shila, Y. Cheng, and T. Anjali, Mitigating selective forwarding attacks with a channel-Aware approach in WMNs, IEEE Trans. Wireless Commun, vol. 9, no. 5, pp. 1661-1675, May 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.5 , pp. 1661-1675
    • Shila, D.M.1    Cheng, Y.2    Anjali, T.3
  • 22
    • 84890127638 scopus 로고    scopus 로고
    • FADE: Forwarding assessment based detection of collaborative grey hole attacks inWMNs
    • Oct
    • Q. Liu, J. Yin, V. Leung, and Z. Cai, FADE: Forwarding assessment based detection of collaborative grey hole attacks inWMNs, IEEE Trans. Wireless Commun, vol. 12, no. 10, pp. 5124-5137, Oct. 2013.
    • (2013) IEEE Trans. Wireless Commun , vol.12 , Issue.10 , pp. 5124-5137
    • Liu, Q.1    Yin, J.2    Leung, V.3    Cai, Z.4
  • 23
    • 84925880386 scopus 로고    scopus 로고
    • Exploiting mobile crowdsourcing for pervasive cloud services: Challenges, and solutions
    • Mar
    • J. Ren, Y. Zhang, K. Zhang, and X. Shen, Exploiting mobile crowdsourcing for pervasive cloud services: Challenges, and solutions, IEEE Commun. Mag, vol. 53, no. 3, pp. 98-105, Mar. 2015.
    • (2015) IEEE Commun. Mag , vol.53 , Issue.3 , pp. 98-105
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Shen, X.4
  • 24
    • 84888341461 scopus 로고    scopus 로고
    • A survey of MANET intrusion detection & prevention approaches for network layer attacks
    • Mar
    • A. Nadeem, and M. P. Howarth, A survey of MANET intrusion detection & prevention approaches for network layer attacks, IEEE Commun. Surveys Tuts, vol. 15, no. 4, pp. 2027-2045, Mar. 2013.
    • (2013) IEEE Commun. Surveys Tuts , vol.15 , Issue.4 , pp. 2027-2045
    • Nadeem, A.1    Howarth, M.P.2
  • 25
    • 84930504473 scopus 로고    scopus 로고
    • Efficient trust based information sharing schemes over distributed collaborative networks
    • Sep
    • H. Lin, X. Zhu, Y. Fang, D. Xing, C. Zhang, and Z. Cao, Efficient trust based information sharing schemes over distributed collaborative networks, IEEE J. Sel. Areas Commun, vol. 31, no. 9, pp. 279-290, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun , vol.31 , Issue.9 , pp. 279-290
    • Lin, H.1    Zhu, X.2    Fang, Y.3    Xing, D.4    Zhang, C.5    Cao, Z.6
  • 26
    • 84894446893 scopus 로고    scopus 로고
    • Real-Time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach
    • Jan
    • J. Tang, Y. Cheng, and W. Zhuang, Real-Time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach, IEEE Trans. Mobile Comput, vol. 13, no. 1, pp. 146-158, Jan. 2014.
    • (2014) IEEE Trans. Mobile Comput , vol.13 , Issue.1 , pp. 146-158
    • Tang, J.1    Cheng, Y.2    Zhuang, W.3
  • 27
    • 84865016804 scopus 로고    scopus 로고
    • Radio link quality estimation in wireless sensor networks: A survey
    • N. Baccour, et al., Radio link quality estimation in wireless sensor networks: A survey, ACM Trans. Sens. Netw, vol. 8, no. 4, pp. 1-34, 2012.
    • (2012) ACM Trans. Sens. Netw , vol.8 , Issue.4 , pp. 1-34
    • Baccour, N.1
  • 28
    • 84893367596 scopus 로고    scopus 로고
    • Data-driven link quality prediction using link features
    • T. Liu, and A. E. Cerpa, Data-driven link quality prediction using link features, ACM Trans. Sensor Netw. (TOSN), vol. 10, no. 2, p. 37, 2014.
    • (2014) ACM Trans. Sensor Netw. (TOSN , vol.10 , Issue.2 , pp. 37
    • Liu, T.1    Cerpa, A.E.2
  • 29
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Mar
    • G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Sel. Areas Commun, vol. 18, no. 3, pp. 535-547, Mar. 2000.
    • (2000) IEEE J. Sel. Areas Commun , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 31
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations, and trust dynamics in mobile ad hoc networks: A survey
    • May
    • K. Govindan, and P. Mohapatra, Trust computations, and trust dynamics in mobile ad hoc networks: A survey, IEEE Commun. Surveys Tuts, vol. 14, no. 2, pp. 279-298, May 2012.
    • (2012) IEEE Commun. Surveys Tuts , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 32
    • 70350070568 scopus 로고    scopus 로고
    • Group-based trust management scheme for clustered wireless sensor networks
    • Nov
    • R. Shaikh, H. Jameel, B. d?Auriol, H. Lee, S. Lee, and Y.-J. Song, Group-based trust management scheme for clustered wireless sensor networks, IEEE Trans. Parallel Distrib. Syst, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst , vol.20 , Issue.11 , pp. 1698-1712
    • Shaikh, R.1    Jameel, B.2    Dauriol, H.3    Lee, S.4    Lee, Y.-J.5    Song, H.6
  • 33
    • 84877297429 scopus 로고    scopus 로고
    • An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks
    • J. Ren, Y. Zhang, and K. Liu, An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks, Int. J. Distrib. Sensor Netw, vol. 2013, pp. 1-15, 2013.
    • (2013) Int. J. Distrib. Sensor Netw , vol.2013 , pp. 1-15
    • Ren, J.1    Zhang, Y.2    Liu, K.3
  • 34
    • 84963811324 scopus 로고    scopus 로고
    • Lifetime, and energy hole evolution analysis in data-gathering wireless sensor networks
    • to be published
    • J. Ren, Y. Zhang, K. Zhang, A. Liu, J. Chen, and X. Shen, Lifetime, and energy hole evolution analysis in data-gathering wireless sensor networks, IEEE Trans. Ind. Inf., doi: 10.1109/TII.2015.2411231, to be published
    • IEEE Trans. Ind. Inf
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Liu, A.4    Chen, J.5    Shen, X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.