메뉴 건너뛰기




Volumn 42, Issue 2, 2017, Pages 143-151

Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks

Author keywords

detection accuracy; false positive; intrusion detection; trust management; Wireless sensor network

Indexed keywords

COMPLEX NETWORKS; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY; SENSOR NODES;

EID: 85010748896     PISSN: 02562499     EISSN: 09737677     Source Type: Journal    
DOI: 10.1007/s12046-016-0588-2     Document Type: Article
Times cited : (9)

References (21)
  • 1
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor network
    • Butun I, Morgera S D and Sankar R 2013 A survey of intrusion detection systems in wireless sensor network. IEEE Commun. Surv. Tutor. 16(1): 266–282
    • (2013) IEEE Commun. Surv. Tut. , vol.16 , Issue.1 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 2
    • 84880080728 scopus 로고    scopus 로고
    • An intrusion detection system for cluster based wireless sensor networks
    • Deng X, Wu R, Wang W and Bu R 2013 An intrusion detection system for cluster based wireless sensor networks. Inf. Technol. J. 12(9): 1764–1771
    • (2013) Inf. Technol. J. , vol.12 , Issue.9 , pp. 1764-1771
    • Deng, X.1    Wu, R.2    Wang, W.3    Bu, R.4
  • 3
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Theodorakopoulos G and Baras J S 2006 On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 318–332
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 318-332
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 5
    • 77955109536 scopus 로고    scopus 로고
    • A survey of attacks, security mechanisms, and challenges in wireless sensor networks
    • Padmavathi G and Shanmugapriya D 2009 A survey of attacks, security mechanisms, and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 4(1–2): 117–125
    • (2009) Int. J. Comput. Sci. Inf. Technol. , vol.4 , Issue.1-2 , pp. 117-125
    • Padmavathi, G.1    Shanmugapriya, D.2
  • 6
    • 27644509266 scopus 로고    scopus 로고
    • Intrusion detection systems and intrusion prevention systems
    • Fuchsberger A 2005 Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3): 134–139
    • (2005) Inf. Secur. Tech. Rep. , vol.10 , Issue.3 , pp. 134-139
    • Fuchsberger, A.1
  • 7
    • 84909606246 scopus 로고    scopus 로고
    • Security enhancements for mobile adhoc networks with trust management using uncertain reasoning
    • Wei Z, Tang H, Yu F R, Wang M and Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9): 4647–4658
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.9 , pp. 4647-4658
    • Wei, Z.1    Tang, H.2    Yu, F.R.3    Wang, M.4    Mason, P.5
  • 8
    • 84903954065 scopus 로고    scopus 로고
    • Strategy to reduce false alarms in intrusion detection and prevention systems
    • Qassim Q, Patel A and Mahd-Zin A 2014 Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500–506
    • (2014) Int. Arab J. Inf. Technol. , vol.11 , Issue.5 , pp. 500-506
    • Qassim, Q.1    Patel, A.2    Mahd-Zin, A.3
  • 9
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad-hoc and sensor networks
    • Boukerch A, Xu L and El-Khatib K 2007 Trust-based security for wireless ad-hoc and sensor networks. Comput. Commun. 30(11–12): 2413–2427
    • (2007) Comput. Commun. , vol.30 , Issue.11-12 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 11
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: attack analysis and countermeasures
    • Yu Y, Li K, Zhou W and Li P 2012 Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3): 867–880
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 12
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington
    • Ganeriwal S and Srivastava M B 2004 Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, USA, pp. 66–77
    • (2004) USA , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.B.2
  • 14
    • 84863363838 scopus 로고    scopus 로고
    • Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering
    • Xiang G, Jianlin Q and Jin W 2012 Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering. Proc. Eng. 29: 909–913
    • (2012) Proc. Eng. , vol.29 , pp. 909-913
    • Xiang, G.1    Jianlin, Q.2    Jin, W.3
  • 15
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • Bao F, Chen I R, Chang M and Cho J H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169–183
    • (2012) IEEE Trans. Network Service Manage. , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, I.R.2    Chang, M.3    Cho, J.H.4
  • 16
    • 84905725635 scopus 로고    scopus 로고
    • Game theory model for intrusion detection in WSN using hierarchical trust management
    • Ram Prabha V and Latha P 2014 Game theory model for intrusion detection in WSN using hierarchical trust management. Int. Rev. Comput. Softw. 9(6): 1055–1064
    • (2014) Int. Rev. Comput. Software , vol.9 , Issue.6 , pp. 1055-1064
    • Ram Prabha, V.1    Latha, P.2
  • 18
    • 70349742570 scopus 로고    scopus 로고
    • Weighted trust calculation based malicious node detection for wireless sensor networks
    • Hu H and Chen Y 2009 Weighted trust calculation based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Secur. 3(2): 132–149
    • (2009) Int. J. Inf. Comput. Security , vol.3 , Issue.2 , pp. 132-149
    • Hu, H.1    Chen, Y.2
  • 19
    • 33845715578 scopus 로고    scopus 로고
    • Location verification and trust management for resilient geographic routing
    • Liu K, Abu-Ghazaleh N and Kang K D 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distrib. Comput. 67(2): 215–228
    • (2007) J. Parallel Distributed Comput. , vol.67 , Issue.2 , pp. 215-228
    • Liu, K.1    Abu-Ghazaleh, N.2    Kang, K.D.3
  • 21
    • 85014816886 scopus 로고    scopus 로고
    • Network Simulator
    • Network Simulator: http://www.isi.edu/nsnam


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.