Détection d'attaques dans un système WBAN de surveillance médicale à distance. (Attacks detection in a WBAN system for remote medical monitoring)
暂无分享,去创建一个
[1] Rabie A. Ramadan,et al. Wireless Sensor Networks, A Medical Perspective , 2013 .
[2] Ahmed Mehaoua,et al. Flooding attacks detection in backbone traffic using power divergence , 2012, PM2HW2N '12.
[3] Loukas Lazos,et al. Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.
[4] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[5] Stephen B. Wicker,et al. CareNet: an integrated wireless sensor networking environment for remote healthcare , 2008, BODYNETS.
[6] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[7] Bestoon Hussain Jaff,et al. A Wireless Body Area Network System for Monitoring Physical Activities and Health-Status via the Internet , 2009 .
[8] Ahmed Mehaoua,et al. A comparison between divergence measures for network anomaly detection , 2011, 2011 7th International Conference on Network and Service Management.
[9] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[10] Ismail Mansour,et al. Contribution à la sécurité des communications des réseaux de capteurs sans fil , 2013 .
[11] Kotagiri Ramamohanarao,et al. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.
[12] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[13] M. Beaumont-Gay,et al. A Comparison of SYN Flood Detection Algorithms , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[14] Farrukh Aslam Khan,et al. A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications , 2013, Int. J. Distributed Sens. Networks.
[15] Gil De Sousa,et al. Etude en vue de la réalisation de logiciels bas niveau dédiés aux réseaux de capteurs sans fil : microsystème de fichiers. (Design of low-level software dedicated to wireless sensor networks: micro-file system) , 2008 .
[16] Kang G. Shin,et al. SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[17] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[18] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2013, IEEE J. Sel. Areas Commun..
[19] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[20] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[21] Shahriar Mohammadi,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.
[22] Jean-Philippe Babau,et al. Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[23] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[24] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[25] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[26] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[27] Robert L. Winkler,et al. Scoring Rules, Generalized Entropy, and Utility Maximization , 2008, Oper. Res..
[28] Mario Gerla,et al. Bluetooth: an enabler for personal area networking , 2001, IEEE Netw..
[29] Jan Havrda,et al. Quantification method of classification processes. Concept of structural a-entropy , 1967, Kybernetika.
[30] Fan Zhang,et al. Securing communications between external users and wireless body area networks , 2013, HotWiSec '13.
[31] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[32] Kyung Sup Kwak,et al. An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[33] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.
[34] Balachander Krishnamurthy,et al. Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.
[35] Jim Morrison,et al. A schema for the selection of network topology for Wireless Body Area Networks , 2011, 2011 IEEE Radio and Wireless Symposium.
[36] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[37] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[38] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[39] Youssouf Zatout. Conception et évaluation de performances d'un réseau de capteurs sans fil hétérogène pour une application domotique , 2011 .
[40] David Martins,et al. État de l'art - Sécurité dans les réseaux de capteurs sans fil , 2008 .
[41] Antonio Nucci,et al. Robust and efficient detection of DDoS attacks for large-scale internet , 2007, Comput. Networks.
[42] Victor C. M. Leung,et al. Enabling technologies for wireless body area networks: A survey and outlook , 2009, IEEE Communications Magazine.
[43] Xiuzhen Cheng,et al. Localized Outlying and Boundary Data Detection in Sensor Networks , 2007 .
[44] Mohammed Bouhorma,et al. Analysis of Jamming Effects on IEEE 802.11 Wireless Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[45] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[46] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[47] Matt Welsh,et al. CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care , 2004 .
[48] David J. Edwards,et al. Ultra wideband: applications, technology and future perspectives , 2005 .
[49] Alexandros G. Fragkiadakis,et al. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..
[50] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[51] Jean-Christophe Lapayre,et al. Security in Medical Telediagnosis , 2010 .
[52] Jeff Rose,et al. MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..
[53] Wassim Znaidi. Quelques propositions de solutions pour la sécurité des réseaux de capteurs sans fil , 2010 .
[54] Benton H. Calhoun,et al. Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.
[55] Graham Cormode,et al. An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.
[56] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[57] Daihee Park,et al. Traffic flooding attack detection with SNMP MIB using SVM , 2008, Comput. Commun..
[58] Georgios Loukas,et al. Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..
[59] Shyamal Patel,et al. Mercury: a wearable sensor network platform for high-fidelity motion analysis , 2009, SenSys '09.
[60] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[61] D. Haussler,et al. MUTUAL INFORMATION, METRIC ENTROPY AND CUMULATIVE RELATIVE ENTROPY RISK , 1997 .
[62] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[63] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[64] Abdulaziz Rashid Alazemi. Defending WSNs against jamming attacks , 2013 .
[65] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[66] Sung-Hyuk Cha. Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .
[67] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[68] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[69] Alexandros G. Fragkiadakis,et al. Physical-layer intrusion detection for wireless networks using compressed sensing , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[70] Ahmet Turan Özcerit,et al. Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks , 2011 .
[71] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.
[72] Osman Salem,et al. A Novel Approach for Anomaly Detection over High-Speed Networks , 2008 .
[73] Shahriar Mohammadi,et al. A Comparison of Physical Attacks on Wireless Sensor Networks , 2011 .
[74] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[75] Guang-Zhong Yang,et al. Body Sensor Networks: Infrastructure for Life Science Sensing Research , 2006, 2006 IEEE/NLM Life Science Systems and Applications Workshop.
[76] Alexandros G. Fragkiadakis,et al. Effective and robust detection of jamming attacks , 2010, 2010 Future Network & Mobile Summit.
[77] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[78] Tuomas Aura. DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.
[79] Timothy A. Gonsalves,et al. Detection of Syn Flooding Attacks using Linear Prediction Analysis , 2006, 2006 14th IEEE International Conference on Networks.
[80] Athanasios V. Vasilakos,et al. Body Area Networks: A Survey , 2010, Mob. Networks Appl..
[81] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[82] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[83] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[84] Srdjan Capkun,et al. Detection of Reactive Jamming in Sensor Networks , 2009 .
[85] Ahmed Mehaoua,et al. Flooding attacks detection in traffic of backbone networks , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[86] Qiang Chen,et al. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data , 2003, IEEE Trans. Reliab..
[87] Oliver Obst,et al. Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies , 2011 .
[88] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[89] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[90] Garth V. Crosby,et al. Wireless Body Area Networks for Healthcare: A Survey , 2012 .
[91] Naima Kaabouch,et al. Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .
[92] Palaniappan Kannappan,et al. A Directed-Divergence Function of Type β , 1972, Inf. Control..
[93] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[94] Thomas Kunz,et al. Operating Systems for Wireless Sensor Networks: A Survey , 2011, Sensors.
[95] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[96] Fadila Khadar. Contrôle de topologie dans les réseaux de capteurs : de la théorie à la pratique , 2009 .
[97] Rahim Kacimi. Techniques de conservation d'énergie pour les réseaux de capteurs sans fil , 2009 .
[98] Bo Sheng,et al. Outlier detection in sensor networks , 2007, MobiHoc '07.
[99] P. Chainais,et al. Remote continuous cardiac arrhythmias detection and monitoring. , 2004, Studies in health technology and informatics.
[100] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[101] Sanjay Jha,et al. Securing data provenance in body area networks using lightweight wireless link fingerprints , 2013, TrustED '13.
[102] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[103] Optimisation d'accès au médium et stockage de données distribuées dans les réseaux de capteurs , 2008 .
[104] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[105] Mohamed Lehsaini. Diffusion et couverture basées sur le clustering dans les réseaux de capteurs : application à la domotique , 2009 .
[106] Joel J. P. C. Rodrigues,et al. Application of Wireless Sensor Networks to Healthcare Promotion , 2008 .
[107] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[108] Supakit Siripanadorn,et al. Anomaly detection in wireless sensor networks using self-organizing map and wavelets , 2010 .
[109] Hang Liu,et al. Error control schemes for networks: An overview , 1997, Mob. Networks Appl..
[110] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[111] Farrukh Aslam Khan,et al. Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications , 2013, EURASIP J. Wirel. Commun. Netw..
[112] Elena Deza,et al. Encyclopedia of Distances , 2014 .
[113] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[114] Dimitri Konstantas,et al. MobiHealth-Innovative 2.5/3G mobile services and applications for health care , 2002 .