On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
暂无分享,去创建一个
Rodrigo Roman | Jianying Zhou | Lawrence Wai-Choong Wong | Al-Sakib Khan Pathan | Abror Abduvaliyev | R. Román | Jianying Zhou | A. Pathan | L. Wong | Abror Abduvaliyev
[1] 王淑卿,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .
[2] Eui-nam Huh,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[3] Magdy S. El-Soudani,et al. Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[5] S. Sitharama Iyengar,et al. Optimized broadcast protocol for sensor networks , 2005, IEEE Transactions on Computers.
[6] Raimir Holanda Filho,et al. A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.
[7] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[8] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[9] K. Q. Yan,et al. A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .
[10] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[11] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[12] Rung Ching Chen,et al. A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.
[13] Geng Yang,et al. Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[15] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[16] Tingting Zhang,et al. Detecting Anomaly Node Behavior in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[17] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[18] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[20] M. Krishnan. Intrusion Detection in Wireless Sensor Networks , 2006 .
[21] Alfredo Navarra,et al. Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks* , 2008, Int. J. Distributed Sens. Networks.
[22] Rodrigo Roman,et al. A cross-layer approach for integrating security mechanisms in sensor networks architectures , 2011, Wirel. Commun. Mob. Comput..
[23] Yenumula B. Reddy,et al. Game theory model for selective forward attacks in wireless sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.
[24] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[25] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[26] Jingsha He,et al. Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..
[27] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[28] Ali Miri,et al. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[29] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[30] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[31] Safiqul Islam,et al. Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .
[32] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[33] Ala I. Al-Fuqaha,et al. Detection of Masquerade Attacks on Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[34] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[35] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[36] S. Banerjee,et al. Intrusion Detection on Sensor Networks Using Emotional Ants , 2005 .
[37] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[38] Xiaodong Wang,et al. DIDS: A dynamic model of intrusion detection system in wireless sensor networks , 2008, 2008 International Conference on Information and Automation.
[39] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[40] Reihaneh Safavi-Naini,et al. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.
[41] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[42] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[43] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[44] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[45] Indranil Saha,et al. Location Verification Based Defense Against Sybil Attack in Sensor Networks , 2006, ICDCN.
[46] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[47] Piya Techateerawat,et al. Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[48] Song Jian-hua,et al. Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks , 2007, 2007 Second International Conference on Communications and Networking in China.
[49] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[50] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[51] Hossein Jadidoleslamy,et al. A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable , 2011, Wirel. Sens. Netw..
[52] Michael Riecker. Lightweight Intrusion Detection in Wireless Sensor Networks , 2015 .
[53] M. P. Singh,et al. Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks , 2011 .
[54] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[55] P. Venkata Krishna,et al. A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..
[56] Robert H. Deng,et al. Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.
[57] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[58] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[59] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[60] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[61] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[62] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[63] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[64] Fengqi Yu,et al. Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[65] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[66] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[67] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[68] Rituparna Chaki,et al. A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network , 2011, ArXiv.
[69] Haiguang Chen,et al. Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks , 2007, PAISI.
[70] Yizhong Ma,et al. The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.
[71] Sven Schaust,et al. Misbehaviour Detection for Wireless Sensor Networks-Necessary or Not ? , 2007 .
[72] Tzu Chiang Chiang,et al. Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks , 2010 .
[73] Marimuthu Palaniswami,et al. Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[74] Felix C. Freiling,et al. Intrusion Detection in Wireless Sensor Networks , 2009 .
[75] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[76] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[77] Rong Zheng,et al. ANDES: an Anomaly Detection System for Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[78] Md. Abdul Hamid,et al. Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .
[79] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[80] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[81] Chun Tung Chou,et al. Detecting Wormhole Attacks in Wireless Sensor Networks , 2006 .
[82] WangQiang,et al. Reprogramming wireless sensor networks , 2006 .
[83] Javier López,et al. An Asynchronous Node Replication Attack in Wireless Sensor Networks , 2008, SEC.
[84] Eui-nam Huh,et al. Hybrid Intrusion Detection System for Wireless Sensor Networks , 2007, ICCSA.
[85] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[86] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[87] José Manuel Moya,et al. Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps , 2010, Integr. Comput. Aided Eng..
[88] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[89] Suho Park. Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .
[90] Chia-Fen Hsieh,et al. Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology , 2010 .
[91] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[92] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[93] Adrian Perrig,et al. Refutation of "On the Difficulty of Software-Based Attestation o f Embedded Devices" , 2010 .
[94] Stefanos Gritzalis,et al. Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.
[95] Christopher Leckie,et al. New Variants of Wormhole Attacks for Sensor Networks , 2006 .
[96] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[97] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[98] Qiang Wang,et al. Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.
[99] Syed Abdul Sattar,et al. A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN , 2011, ACC.
[100] Rung Ching Chen,et al. A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.