메뉴 건너뛰기




Volumn 14, Issue 9, 2018, Pages 3801-3811

Defending ON-OFF attacks using light probing messages in smart sensors for industrial communication systems

Author keywords

ON OFF attack; probe routing; security; trust

Indexed keywords

INTELLIGENT CONTROL; PROBES; SENSOR NODES; SMART SENSORS;

EID: 85049491035     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2018.2836150     Document Type: Article
Times cited : (94)

References (34)
  • 1
    • 85012039893 scopus 로고    scopus 로고
    • QoS-aware cross-layer configuration for industrial wireless sensor networks
    • Oct.
    • F. Dobslaw, T. Zhang, andM. Gidlund, "QoS-aware cross-layer configuration for industrial wireless sensor networks," IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1679-1691, Oct. 2016.
    • (2016) IEEE Trans. Ind. Informat. , vol.12 , Issue.5 , pp. 1679-1691
    • Dobslaw, F.1    Zhang, T.2    Gidlund, M.3
  • 2
    • 85028941338 scopus 로고    scopus 로고
    • Survey and systematic mapping of industrial wireless sensor networks
    • D. Queiroz et al., "Survey and systematic mapping of industrial wireless sensor networks," J. Netw. Comput. Appl., vol. 97, pp. 96-125, 2017.
    • (2017) J. Netw. Comput. Appl. , vol.97 , pp. 96-125
    • Queiroz, D.1
  • 3
    • 85009775076 scopus 로고    scopus 로고
    • Efficient certificateless access control for industrial internet of things
    • F. Li, J. Hong, and A. Omala, "Efficient certificateless access control for industrial internet of things," Future Gener. Comput. Syst., vol. 76, pp. 285-292, 2017.
    • (2017) Future Gener. Comput. Syst. , vol.76 , pp. 285-292
    • Li, F.1    Hong, J.2    Omala, A.3
  • 4
    • 85011912102 scopus 로고    scopus 로고
    • XLCI protocol for high QoS in industrial wireless network
    • H. Salam and B. Khan, "XLCI protocol for high QoS in industrial wireless network," Wireless Pers. Commun., vol. 95, pp. 3057-3075, 2017.
    • (2017) Wireless Pers. Commun. , vol.95 , pp. 3057-3075
    • Salam, H.1    Khan, B.2
  • 6
    • 84921327876 scopus 로고    scopus 로고
    • Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems
    • Jan./Feb.
    • R. Mitchell and I. R. Chen, "Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems," IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 16-30, Jan./Feb. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.12 , Issue.1 , pp. 16-30
    • Mitchell, R.1    Chen, I.R.2
  • 7
    • 84978943536 scopus 로고    scopus 로고
    • ActiveTrust: Secure and trustable routing in wireless sensor networks
    • Sep.
    • Y. Liu, M. Dong, K. Ota, and A. Liu, "ActiveTrust: Secure and trustable routing in wireless sensor networks," IEEE Trans. Inf. Forensics Secur., vol. 11, no. 9, pp. 2013-2027, Sep. 2016.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.9 , pp. 2013-2027
    • Liu, Y.1    Dong, M.2    Ota, K.3    Liu, A.4
  • 8
    • 84959080993 scopus 로고    scopus 로고
    • Body sensor network for mobile health monitoring, a diagnosis and anticipating system
    • Dec.
    • J.Wannenburg and R. Malekian, "Body sensor network for mobile health monitoring, a diagnosis and anticipating system," IEEE Sens. J., vol. 15, no. 12, pp. 6839-6852, Dec. 2015.
    • (2015) IEEE Sens. J. , vol.15 , Issue.12 , pp. 6839-6852
    • Wannenburg, J.1    Malekian, R.2
  • 9
    • 84919466772 scopus 로고    scopus 로고
    • A novel enroute filtering scheme against false data injection attacks in cyber-physical networked systems
    • Jan.
    • X. Yang, J. Lin,W. Yu, P.-M. Moulema, X. Fu, andW. Zhao, "A novel enroute filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.1 , pp. 4-18
    • Yang, X.1    Lin, J.2    Yu, W.3    Moulema, P.-M.4    Fu, X.5    Zhao, W.6
  • 10
    • 84962598397 scopus 로고    scopus 로고
    • Energyefficient monitor deployment in collaborative distributed setting
    • Feb.
    • S. Ray, M. Debbabi,M.Allouche,N. Lechevin, and M.Belanger, "Energyefficient monitor deployment in collaborative distributed setting," IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 112-123, Feb. 2016.
    • (2016) IEEE Trans. Ind. Informat. , vol.12 , Issue.1 , pp. 112-123
    • Ray, S.1    Debbabi, M.2    Allouche, M.3    Lechevin, N.4    Belanger, M.5
  • 11
    • 84964290765 scopus 로고    scopus 로고
    • Vehicular networking for mobile crowd sensing
    • B. M. Masini, "Vehicular networking for mobile crowd sensing," Ad Hoc Netw., vol. 36, no. P2, pp. 407-408, 2016.
    • (2016) Ad Hoc Netw. , vol.36 , Issue.P2 , pp. 407-408
    • Masini, B.M.1
  • 12
    • 84925062174 scopus 로고    scopus 로고
    • Trust management for defending on-off attacks
    • Apr.
    • Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Trans.Parallel Distrib. Syst., vol. 26, no. 4, pp. 1178-1191, Apr. 2015.
    • (2015) IEEE Trans.Parallel Distrib. Syst. , vol.26 , Issue.4 , pp. 1178-1191
    • Chae, Y.1    DiPippo, L.C.2    Sun, Y.L.3
  • 13
    • 84900863804 scopus 로고    scopus 로고
    • Adaptive multichannel transmission power control for industrial wireless instrumentation
    • May.
    • W. Ikram, S. Petersen, P. Orten, and N. F. Thornhill, "Adaptive multichannel transmission power control for industrial wireless instrumentation," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 978-990, May 2014.
    • (2014) IEEE Trans. Ind. Informat. , vol.10 , Issue.2 , pp. 978-990
    • Ikram, W.1    Petersen, S.2    Orten, P.3    Thornhill, N.F.4
  • 14
    • 82555196697 scopus 로고    scopus 로고
    • BECAN: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
    • Jan.
    • R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A bandwidthefficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 1, pp. 32-43, Jan. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.1 , pp. 32-43
    • Lu, R.1    Lin, X.2    Zhu, H.3    Liang, X.4    Shen, X.5
  • 15
    • 85042117068 scopus 로고    scopus 로고
    • Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
    • 10.1016/j.jcss.2016.09.008
    • X. Liu et al., "Trace malicious source to guarantee cyber security for mass monitor critical infrastructure," J. Comput. Syst. Sci., 10.1016/j.jcss.2016.09.008.
    • J. Comput. Syst. Sci
    • Liu, X.1
  • 16
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • X. Bin, B. Yu, and C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," J. Parallel Distrib. Comput., vol. 67, no. 11, pp. 1218-1230, 2007.
    • (2007) J. Parallel Distrib. Comput. , vol.67 , Issue.11 , pp. 1218-1230
    • Bin, X.1    Yu, B.2    Gao, C.3
  • 17
    • 85028345951 scopus 로고    scopus 로고
    • Knowledge-aware proactive nodes selection approach for energy management in internet of things
    • X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledge-aware proactive nodes selection approach for energy management in internet of things," Future Gener. Comput. Syst., doi: https://doi.org/10.1016/j.future.2017.07.022.
    • Future Gener. Comput. Syst.
    • Liu, X.1    Zhao, S.2    Liu, A.3    Xiong, N.4    Vasilakos, A.V.5
  • 19
    • 84941918744 scopus 로고    scopus 로고
    • Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
    • Jun.
    • Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks," IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1632-1646, Jun. 2016.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.3 , pp. 1632-1646
    • Zhang, Y.1    He, S.2    Chen, J.3
  • 20
    • 85059047985 scopus 로고    scopus 로고
    • Context-aware collect data with energy efficient in cyber-physical cloud systems
    • Y. Liu, A. Liu, S. Guo, Z. Li, Y. J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in cyber-physical cloud systems," Future Gener. Comput. Syst., doi: 10.1016/j.future.2017.05.029.
    • Future Gener. Comput. Syst.
    • Liu, Y.1    Liu, A.2    Guo, S.3    Li, Z.4    Choi, Y.J.5    Sekiya, H.6
  • 21
    • 84902949347 scopus 로고    scopus 로고
    • Mobile target detection in wireless sensor networks with adjustable sensing frequency
    • Sep.
    • Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, "Mobile target detection in wireless sensor networks with adjustable sensing frequency," IEEE Syst. J., vol. 10, no. 3, pp. 1160-1171, Sep. 2016.
    • (2016) IEEE Syst. J. , vol.10 , Issue.3 , pp. 1160-1171
    • Hu, Y.1    Dong, M.2    Ota, K.3    Liu, A.4    Guo, M.5
  • 22
    • 84953790290 scopus 로고    scopus 로고
    • STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks
    • L. Lightfoot, Y. Li, and J. Ren, "STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks," Secur. Commun. Netw., vol. 9, no. 3, pp. 220-228, 2016.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.3 , pp. 220-228
    • Lightfoot, L.1    Li, Y.2    Ren, J.3
  • 23
    • 84937468948 scopus 로고    scopus 로고
    • An energy efficientmethod for secure and reliable data transmission in wireless body area networks using RelAODV
    • K. S. Raja andU.Kiruthika, "An energy efficientmethod for secure and reliable data transmission in wireless body area networks using RelAODV," Wireless Pers. Commun., vol. 83, no. 4, pp. 2975-2997, 2015.
    • (2015) Wireless Pers. Commun. , vol.83 , Issue.4 , pp. 2975-2997
    • Raja, K.S.1    Kiruthika, U.2
  • 24
    • 84929353058 scopus 로고    scopus 로고
    • Bypassing infected areas in wireless sensor networks using BPR
    • Jun.
    • N. Yaakob, I. Khalil, H. Kumarage, M. Atiquzzaman, and Z. Tari, "Bypassing infected areas in wireless sensor networks using BPR," IEEE Trans. Comput., vol. 64, no. 6, pp. 1594-1606, Jun. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.6 , pp. 1594-1606
    • Yaakob, N.1    Khalil, I.2    Kumarage, H.3    Atiquzzaman, M.4    Tari, Z.5
  • 25
    • 84866503616 scopus 로고    scopus 로고
    • Secure and energyefficient disjointmulti-path routing for WSNs
    • Sep.
    • A. Liu, Z. Zheng, C. Zhang, Z. Chen, and X. Shen, "Secure and energyefficient disjointmulti-path routing for WSNs," IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3255-3265, Sep. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.7 , pp. 3255-3265
    • Liu, A.1    Zheng, Z.2    Zhang, C.3    Chen, Z.4    Shen, X.5
  • 26
    • 84943763970 scopus 로고    scopus 로고
    • TERP: A trust and energy aware routing protocol for wireless sensor network
    • Dec.
    • A. Ahmed, K. Abu Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, "TERP: A trust and energy aware routing protocol for wireless sensor network," IEEE Sens. J., vol. 15, no. 12, pp. 6962-6972, Dec. 2015.
    • (2015) IEEE Sens. J. , vol.15 , Issue.12 , pp. 6962-6972
    • Ahmed, A.1    Abu Bakar, K.2    Channa, M.I.3    Haseeb, K.4    Khan, A.W.5
  • 27
    • 84863128351 scopus 로고    scopus 로고
    • METrust: A mutual evaluation-based trust model for P2P networks
    • C. Cheng, X. Xu, and B. Gao, "METrust: A mutual evaluation-based trust model for P2P networks," Int. J. Autom. Comput., vol. 9, no. 1, pp. 63-71, 2012.
    • (2012) Int. J. Autom. Comput. , vol.9 , Issue.1 , pp. 63-71
    • Cheng, C.1    Xu, X.2    Gao, B.3
  • 28
    • 77952255404 scopus 로고    scopus 로고
    • Mitigating selective forwarding attacks with a channel-aware approach in WMNs
    • May.
    • D. M. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Trans. Wireless Commun., vol. 9, no. 5 pp. 1661-1675, May 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.5 , pp. 1661-1675
    • Shila, D.M.1    Cheng, Y.2    Anjali, T.3
  • 29
  • 30
    • 84931056000 scopus 로고    scopus 로고
    • On-off attacksmitigation against trust systems in wireless sensor networks
    • New York, NY, USA: Springer
    • N. Labraoui,M.Gueroui, and L. Sekhri, "On-off attacksmitigation against trust systems in wireless sensor networks," in Computer Science and Its Applications. New York, NY, USA: Springer, 2015, pp. 406-415.
    • (2015) Computer Science and Its Applications , pp. 406-415
    • Labraoui, N.1    Gueroui, M.2    Sekhri, L.3
  • 31
    • 84925062174 scopus 로고    scopus 로고
    • Trust management for defending on-off attacks
    • Apr.
    • Y. Chae, L. Dipippo, and Y. Sun, "Trust management for defending on-off attacks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 1178-1191, Apr. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.4 , pp. 1178-1191
    • Chae, Y.1    Dipippo, L.2    Sun, Y.3
  • 32
    • 84988950484 scopus 로고    scopus 로고
    • Defense against on-off packet droppers in a trust management framework for a mobile ad hoc network
    • S. Samreen and G. Narsimha, "Defense against on-off packet droppers in a trust management framework for a mobile ad hoc network," in Proc. IEEE Int. Conf. Internet Things Appl., 2016, pp. 448-453.
    • (2016) Proc. IEEE Int. Conf. Internet Things Appl. , pp. 448-453
    • Samreen, S.1    Narsimha, G.2
  • 33
    • 84947445464 scopus 로고    scopus 로고
    • Optimal base station mobility patterns for wireless sensor network lifetime maximization
    • Nov.
    • O. Cayirpunar, E. Kadioglu-Urtis, and B. Tavli, "Optimal base station mobility patterns for wireless sensor network lifetime maximization," IEEE Sens. J., vol. 15, no. 11, pp. 6592-6603, Nov. 2015.
    • (2015) IEEE Sens. J. , vol.15 , Issue.11 , pp. 6592-6603
    • Cayirpunar, O.1    Kadioglu-Urtis, E.2    Tavli, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.