An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks
暂无分享,去创建一个
Taekyoung Kwon | Sooyeon Shin | Youngman Park | Gil-yong Jo | Haekyu Rhee | Taekyoung Kwon | Sooyeon Shin | Gil-yong Jo | Youngman Park | Haekyu Rhee
[1] Youxian Sun,et al. Wireless sensor networks for industrial applications , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[2] Yookun Cho,et al. EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks , 2009, IEEE Transactions on Industrial Informatics.
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[5] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[6] Ossama Younis,et al. Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.
[7] Jean-Michel Friedt,et al. IEEE 802.15.4 Performance on a Hierarchical Hybrid Sensor Network Platform , 2009, 2009 Fifth International Conference on Networking and Services.
[8] Edward J. Coyle,et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Lionel M. Ni,et al. An Energy-Efficient K-Hop Clustering Framework for Wireless Sensor Networks , 2007, EWSN.
[10] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[11] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[12] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[13] Mark D. Yarvis,et al. Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea , 2005, SenSys '05.
[14] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[15] Ted Taekyoung Kwon,et al. Experimental Study on Wireless Sensor Network Security , 2006, ISI.
[16] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[17] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[19] Peng Ning,et al. Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[20] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[21] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[22] Meng Joo Er,et al. Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[23] Andreas Willig,et al. Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.
[24] Jean-Pierre Thomesse. The WORLDFIP Fieldbus , 2005, The Industrial Information Technology Handbook.
[25] Carlo Fischione,et al. System Level Design for Clustered Wireless Sensor Networks , 2007, IEEE Transactions on Industrial Informatics.
[26] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[27] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[28] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[29] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[30] Gerd Scholl,et al. Modular Wireless Real-Time Sensor/Actuator Network for Factory Automation Applications , 2007, IEEE Transactions on Industrial Informatics.
[31] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[32] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[33] Calvin Ko,et al. Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[34] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[35] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[36] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[37] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[38] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[39] Andreas Strikos. A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .