Information Theory Based Intrusion Detection in Wireless Sensor Networks
Abstract
Keywords
Full Text:
PDFReferences
A. Yousuf, N.Alrajei and F.Mili, “Information Theory Based Intruder Detection in Sensor Networks,†3rd Indian International Conference on Artificial Intelligence, Dec 2007.
C. Edith, H. Ngai, “ Intrusion Detection for Wireless Sensor Networks,†Computer Networks, 55:3224-3245, 2011
M. Al- Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,†Journal of medical systems 36.1 (2012): 93-101.
I. Akyildiz, and V. Mehmet, “Wireless sensor networks,†Vol. 4. John Wiley & Sons, 2010.
Estrin, W. Michener, G. Bonito, and T. W. Participants, “Areport from a national science foundation sponsored workshop: Environmental cyberinfrastructure needs for distributed networks,†Technical report, Scripps Institute of Oceanography, Aug 2003.
N. Trigone, Y. Yao, J. Gehrke, and R. Rajaraman, “Multiquery optimization for sensor networks,†In International Conference on Distributed Processing on Sensor Systems (DCOSS), 2005.
Y. Yao and J. Gehrke, “The cougar approach to in-network query processing in sensor networks,†ACM Sigmod record, 31(3), September 2002.
Y. Yao and J. Gehrke, “Query processing for sensor networks,†In First Biennial Conference on Innova tive Data Systems Research, January 2003
C. Intanagonwiwa, R. Govindan, and D. Estrin, “Directed diffusion: A scalable and robust communication paradigm for sensor networks,†In 6th annual international conference on Mobile Computing and Networking, 2000.
S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “Tinydb: an acquisitional queue processing system for sensor networks,†ACM Trans. Database Syst., 30(1):122–173, 2005.
D. Robert and B. Gastel, “ How to write and publish a scientific paper,†Cambridge University Press, 2012.
Y. Kotidis, “Snapshot queries: Towards data-centric sensor networks,†In 21st International Conference on Data Engineering, 2005.
I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, “Wireless sensor networks for intrusion detection: packet traffic modeling,†10(1):22–24, January 2006.
J. Deng, R. Han, and S. Mishra, “ Defending against path-based dos attacks in wireless sensor networks,†In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 89–96, New York, NY, USA, 2005.ACM Press.
P. Dutta, M. Grimmer, A. Arora, S.Bibyk, and D. Culler, “ Design of a wireless sensor network platform for detecting rare, random, and ephemeral events,†In IPSN ’05: Proceedings of the 4th international symposium on Information processing in sensor networks, Piscataway, NJ, USA, 2005. IEEE Press.
O. Kachirski and R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks,†In HICSS ’03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 2003. IEEE Computer Society.
A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad-hoc networks,†2004
S. Patil, and G. de Veciana, “Managing resources and quality of service in heterogeneous wireless systems exploiting opportunism,†IEEE/ACM Transactions on Networking (TON) 15.5 (2007): 1046-1058.
V. Raghunathan, C. Schurgers, S. Park, and M. Srivastava, “Energy aware wireless microsensor networks,†IEEE Signal Processing Magazine, 19(2):40–50, March 2002.
V. Bhuse and A. Gupta, “Anomaly intrusion detection in wireless sensor networks,†J. High Speed Netw., 15(1):33–51, 2006.
J. Meyer, F. Mili, I. Elhajj, M. Rossman, and I. Bass, “Distributed query optimization in wireless sensor networks,†in Wireless and Optical Comm. Conf. (WOCC ’06), Hangzhou, China, Oct. 2006.
I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, “Wireless sensor networks for intrusion detection: packet traffic modeling,†vol. 10, no. 1,pp. 22–24, Jan. 2006.
G. Zhou, T. He, J. A. Stankovic, and T. Abdelzaher, “Rid: Radio interference detection in wireless sensor networks,†in INFOCOM ’05:24th Annual Joint Conference of IEEE Computer and Communications Societies, 2005.
J. Deng, H. Richard, and S. Mishra, “Insens:intrusion-tolerant routing in wireless sensor networks: Dependable wireless sensor networks,†in Proc. 23rd IEEE International Conference on Distributed Computing Systems, 2003.
C. Shannon, “A mathematical theory of communication,†Bell System Technical Journal, vol. 27, pp. 379–423,623–656, July, October 1948.
DOI: http://dx.doi.org/10.22385/jctecs.v5i0.71