메뉴 건너뛰기




Volumn , Issue , 2016, Pages 157-166

Towards a CDS-based intrusion detection deployment scheme for securing industrial wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA ACQUISITION; INTRUSION DETECTION; MERCURY (METAL); REAL TIME SYSTEMS; SCADA SYSTEMS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85015292005     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2016.48     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 1
    • 40349105129 scopus 로고    scopus 로고
    • The emergence of industrial control networks for manufacturing control, diagnostics, and safety data
    • Jan
    • J. R. Moyne and D. Tilbury, "The emergence of industrial control networks for manufacturing control, diagnostics, and safety data," Proceedings of the IEEE, vol. 95, no. 1, pp. 29-47, Jan 2007.
    • (2007) Proceedings of the IEEE , vol.95 , Issue.1 , pp. 29-47
    • Moyne, J.R.1    Tilbury, D.2
  • 3
    • 84964426687 scopus 로고    scopus 로고
    • Security issue of wirelesshart based SCADA systems
    • Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, ser. Lecture Notes in Computer Science, C. Lambrinoudakis and A. Gabillon, Eds. Springer
    • L. Bayou, D. Espes, N. Cuppens-Boulahia, and F. Cuppens, "Security issue of wirelesshart based SCADA systems," in Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, ser. Lecture Notes in Computer Science, C. Lambrinoudakis and A. Gabillon, Eds., vol. 9572. Springer, 2015, pp. 225-241. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-31811-0-14
    • (2015) Risks and Security of Internet and Systems - 10Th International Conference, CRiSIS 2015 , vol.9572 , pp. 225-241
    • Bayou, L.1    Espes, D.2    Cuppens-Boulahia, N.3    Cuppens, F.4
  • 5
    • 84900637145 scopus 로고    scopus 로고
    • A survey of intrusion detection in wireless network applications
    • R. Mitchell and I. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014. [Online]. Available: http://dx.doi.org/10.1016/j.comcom.2014.01.012
    • (2014) Computer Communications , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.2
  • 7
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://dx.doi.org/10.1016/S1570-8705(03)00008-8
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 8
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Cambridge, USA, ser. Lecture Notes in Computer Science, P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds. Springer
    • J. R. Douceur, "The sybil attack," in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, USA, ser. Lecture Notes in Computer Science, P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., vol. 2429. Springer, 2002, pp. 251-260. [Online]. Available: http://dx.doi.org/10.1007/3-540-45748-8-24
    • (2002) Peer-to-Peer Systems, First International Workshop, IPTPS 2002 , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 9
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • IPSN, USA, K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, Eds. ACM
    • J. Newsome, E. Shi, D. X. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proceedings of the Third International Symposium on Information Processing in Sensor Networks, IPSN, USA, K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, Eds. ACM, 2004, pp. 259-268. [Online]. Available: http://doi.acm.org/10.1145/984622.984660
    • (2004) Proceedings of the Third International Symposium on Information Processing in Sensor Networks , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.X.3    Perrig, A.4
  • 10
    • 34447283779 scopus 로고    scopus 로고
    • Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
    • I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Computer Networks, vol. 51, no. 13, pp. 3750-3772, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128607001004
    • (2007) Computer Networks , vol.51 , Issue.13 , pp. 3750-3772
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 11
    • 33749041485 scopus 로고    scopus 로고
    • Applying intrusion detection systems to wireless sensor networks
    • CCNC 2006. 3rd IEEE Jan
    • R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE, vol. 1, Jan 2006, pp. 640-644.
    • (2006) Consumer Communications and Networking Conference, 2006 , vol.1 , pp. 640-644
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 13
    • 84908262197 scopus 로고    scopus 로고
    • A self-stabilizing algorithm for edge monitoring problem
    • Paderborn, Germany, September 28 - October 1, 2014. Proceedings, ser. Lecture Notes in Computer Science, P. Felber and V. K. Garg, Eds. Springer
    • B. Neggazi, M. Haddad, V. Turau, and H. Kheddouci, "A self-stabilizing algorithm for edge monitoring problem," in Stabilization, Safety, and Security of Distributed Systems - 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 - October 1, 2014. Proceedings, ser. Lecture Notes in Computer Science, P. Felber and V. K. Garg, Eds., vol. 8756. Springer, 2014, pp. 93-105. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-11764-5-7
    • (2014) Stabilization, Safety, and Security of Distributed Systems - 16Th International Symposium, SSS 2014 , vol.8756 , pp. 93-105
    • Neggazi, B.1    Haddad, M.2    Turau, V.3    Kheddouci, H.4
  • 14
    • 84881313532 scopus 로고    scopus 로고
    • On the vital areas of intrusion detection systems in wireless sensor networks
    • A. Abduvaliyev, A. K. Pathan, J. Zhou, R. Roman, and W. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223-1237, 2013. [Online]. Available: http://dx.doi.org/10.1109/SURV.2012.121912.00006
    • (2013) IEEE Communications Surveys and Tutorials , vol.15 , Issue.3 , pp. 1223-1237
    • Abduvaliyev, A.1    Pathan, A.K.2    Zhou, J.3    Roman, R.4    Wong, W.5
  • 17
    • 34247609717 scopus 로고    scopus 로고
    • Positioning of base stations in wireless sensor networks
    • April
    • K. Akkaya, M. Younis, and W. Youssef, "Positioning of base stations in wireless sensor networks," IEEE Communications Magazine, vol. 45, no. 4, pp. 96-102, April 2007.
    • (2007) IEEE Communications Magazine , vol.45 , Issue.4 , pp. 96-102
    • Akkaya, K.1    Younis, M.2    Youssef, W.3
  • 18
    • 34548850872 scopus 로고    scopus 로고
    • A survey on clustering algorithms for wireless sensor networks
    • network Coverage and Routing Schemes for Wireless Sensor Networks
    • A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14-15, pp. 2826-2841, 2007, network Coverage and Routing Schemes for Wireless Sensor Networks. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0140366407002162
    • (2007) Computer Communications , vol.30 , Issue.14-15 , pp. 2826-2841
    • Abbasi, A.A.1    Younis, M.2
  • 19
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-207, 1983. [Online]. Available: http://dx.doi.org/10.1109/TIT.1983.1056650
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-207
    • Dolev, D.1    Yao, A.C.2
  • 22
    • 84871418616 scopus 로고    scopus 로고
    • Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey
    • J. Yu, N. Wang, G. Wang, and D. Yu, "Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey," Computer Communications, vol. 36, no. 2, pp. 121-134, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.comcom.2012.10.005
    • (2013) Computer Communications , vol.36 , Issue.2 , pp. 121-134
    • Yu, J.1    Wang, N.2    Wang, G.3    Yu, D.4
  • 23
    • 19644369843 scopus 로고    scopus 로고
    • Approximation algorithms for connected dominating sets
    • Apr.
    • S. Guha and S. Khuller, "Approximation algorithms for connected dominating sets," Algorithmica, vol. 20, no. 4, pp. 374-387, Apr. 1998. [Online]. Available: http://dx.doi.org/10.1007/PL00009201
    • (1998) Algorithmica , vol.20 , Issue.4 , pp. 374-387
    • Guha, S.1    Khuller, S.2
  • 24
    • 84876476789 scopus 로고    scopus 로고
    • HART Communication Foundation, "WirelessHART," http://www.hartcom.org.
    • WirelessHART


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.