메뉴 건너뛰기




Volumn E99D, Issue 8, 2016, Pages 2010-2018

MDMA: A multi-data and multi-ACK verified selective forwarding attack detection scheme in WSNs

Author keywords

Identify malicious node; Multidata and multi ACK; Selective forwarding attack; Wireless Sensor Networks

Indexed keywords

DATA COMMUNICATION SYSTEMS; DATA TRANSFER; NETWORK SECURITY; WIRELESS SENSOR NETWORKS;

EID: 84983035772     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1587/transinf.2015INP0005     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 84938847954 scopus 로고    scopus 로고
    • An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs
    • Y. Hu and A. Liu, "An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs," The Computer Journal, vol.58, no.8, pp.1747-1762, 2015.
    • (2015) The Computer Journal , vol.58 , Issue.8 , pp. 1747-1762
    • Hu, Y.1    Liu, A.2
  • 2
    • 84961727422 scopus 로고    scopus 로고
    • Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks
    • M. Dong, K. Ota, A. Liu, and M. Guo, "Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst., vol.27, no.1, pp.225-236, 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.1 , pp. 225-236
    • Dong, M.1    Ota, K.2    Liu, A.3    Guo, M.4
  • 3
    • 84984709001 scopus 로고    scopus 로고
    • Mobile target detection in wireless sensor networks with adjustable sensing frequency
    • Y. Hu, M. Dong, K. Ota, et al., "Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency," IEEE System Journal, 2014.
    • (2014) IEEE System Journal
    • Hu, Y.1    Dong, M.2    Ota, K.3
  • 5
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, vol.67, no.11, pp.1218-1230, 2007.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 6
    • 82555196697 scopus 로고    scopus 로고
    • BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
    • R.R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.23, no.1, pp.32-43, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.1 , pp. 32-43
    • Lu, R.R.1    Lin, X.2    Zhu, H.3    Liang, X.4    Shen, X.5
  • 7
    • 84925063940 scopus 로고    scopus 로고
    • An incentive game based evolutionary model for crowd sensing networks
    • X. Liu, K. Ota, A. Liu, and Z. Chen, "An incentive game based evolutionary model for crowd sensing networks," Peer-to-Peer Networking and Applications, vol.9, no.4, pp.692-711, 2016.
    • (2016) Peer-to-Peer Networking and Applications , vol.9 , Issue.4 , pp. 692-711
    • Liu, X.1    Ota, K.2    Liu, A.3    Chen, Z.4
  • 8
    • 84963804113 scopus 로고    scopus 로고
    • Service pricing decision in cyber-physical systems: Insights from game theory
    • X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu, "Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory," IEEE Transactions on Services Computing, vol.9, no.2, pp.186-198, 2016.
    • (2016) IEEE Transactions on Services Computing , vol.9 , Issue.2 , pp. 186-198
    • Liu, X.1    Dong, M.2    Ota, K.3    Hung, P.4    Liu, A.5
  • 9
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol.1, no.2, pp.293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 10
    • 48649095029 scopus 로고    scopus 로고
    • An efficient countermea-sure to the selective forwarding attack in wireless sensor networks
    • Oct. 2007
    • H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermea-sure to the selective forwarding attack in wireless sensor networks," Proc. IEEE TENCON 2007, pp.1-4, Oct. 2007.
    • (2007) Proc. IEEE TENCON , pp. 1-4
    • Sun, H.-M.1    Chen, C.-M.2    Hsiao, Y.-C.3
  • 13
    • 84963850053 scopus 로고    scopus 로고
    • Energy and memory efficient clone detection in wireless sensor networks
    • Z. Zheng, A. Liu, L.X. Cai, Z. Chen, and X.S. Shen, "Energy and Memory Efficient Clone Detection in Wireless Sensor Networks," IEEE Trans. Mobile Comput., vol.15, no.5, pp.1130-1143, 2016.
    • (2016) IEEE Trans. Mobile Comput. , vol.15 , Issue.5 , pp. 1130-1143
    • Zheng, Z.1    Liu, A.2    Cai, L.X.3    Chen, Z.4    Shen, X.S.5
  • 14
    • 84902184986 scopus 로고    scopus 로고
    • Mobility and intruder prior information improving the barrier coverage of sparse sensor networks
    • S. He, J. Chen, X. Li, et al., "Mobility and intruder prior information improving the barrier coverage of sparse sensor networks," IEEE Trans. Mobile Comput., vol.13, no.6, pp.1268-1282, 2014.
    • (2014) IEEE Trans. Mobile Comput. , vol.13 , Issue.6 , pp. 1268-1282
    • He, S.1    Chen, J.2    Li, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.