29
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor NetworksFootnote

&
Pages 83-109 | Published online: 31 May 2008

References

  • Agah , A. , Das , S. and Basu , K. 2004 . “ Intrusion detection in sensor networks: A non-copporative game approach ” . In IEEE NCA
  • Bose , P. , Morin , P. , Stojmenovic , I. and Urrutia , J. 1999 . “ Routing with guaranteed delivery in ad hoc wireless networks ” . In DIALM
  • Brose , G. , Vogel , A. and Duddy , K. 2002 . Java programming with CORBA , third , Wieey .
  • Deng , J. , Han , R. and Mishra , S. 2004 . “ Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks ” . In IEEE DSN
  • Di Pietro , R. , Etalle , S. , Havinga , P. , Law , Y. W. and Mancini , L. V. 2003 . “ LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks ” . In WiSPr
  • Di Pietro , R. , Mancini , L. V. and Mei , A. 2004 . “ Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment ” . In WMAN
  • Ding , M. , Chen , D. , Xing , K. and Cheng , X. 2005 . “ Localized faulttolerant event boundary detection in sensor networks ” . In INFOCOM
  • Doumit , S. and Agrawal , D. 2003 . “ Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks ” . In MILCOM
  • Du , W. , Fang , L. and Ning , P. 2005 . “ Lad: Localization anomaly detection for wireless sensor networks ” . In IPDPS
  • Eckmann , S.-T. , Vigna , G. and Kemmer , R.-A. 2002 . Statl: An attack language for state-based intrusion detection . Journal of Computer Security , 10 : 71 – 104 .
  • Fang , Q. , Gao , J. and Guibas , L. 2004 . “ Locating and bypassing, routing holes in sensor networks ” . In INFOCOM
  • Heinzelman , W. , Chandrakasan , A. and Balakrishnan , H. 2000 . “ Energy-Efficient Communication Protocols for Wireless Microsensor Networks ” . In HICSS
  • Hopcroft , J. E. and Ullman , J. D. 1979 . Introduction to automata theory, languages, and computation , Addison-Wesley .
  • Inverardi , P. and Mostarda , L. 2005 . “ A distributed intrusion detection approach for secure software architecture ” . In EWSA
  • Inverardi , P. , Mostarda , L. and Navarra , A. 2006 . “ Distributed idss for enhancing security in mobile wireless sensor networks ” . In PCAC
  • Inverardi , P. , Mostarda , L. , Tivoli , M. and Autili , M. 2005 . “ Automatic synthesis of distributed adaptors for component-based system ” . In ASE
  • Karlof , C. and Wagner , D. 2003 . “ Secure Routing in Sensor Networks: Attacks and Countermeasures ” . In SNPA
  • Karp , B. and Kung , H. 2000 . “ Greedy perimeter stateless routing (GPSR) for wireless networks ” . In MobiCom
  • Ko , C. , Ruschitza , M. and Levitt , K. 1997 . “ Execution monitoring of security-critical programs in distribute system: A specification-based approach ” . In IEEE
  • Liao , W.-H. , Sheu , J.-P. and Tseng , Y.-C. 2001 . GRID: A fully location-aware routing protocol for mobile ad hoc networks . Telecommunication Systems , 18 ( 1–3 )
  • Malpani , N. , Welch , J. and Vaidya , N. 2000 . Leader election algorithms for mobile ad hoc networks . DIALM ,
  • Maniezzo , D. , Yao , K. and Mazzini , G. 2002 . “ Energetic trade-off between computing and communication resource in multimedia surveillance sensor network ” . In MWCN
  • McCann , J. A. , Navarra , A. and Papadopoulos , A. A. 2005 . “ Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks ” . In IPCCC
  • Mittal , V. and Vigne , G. 2002 . “ Sensor-based intrusion detection for intra-domain distance-vector routing ” . In ACM CSS
  • L. Mostarda. Distributed Intrusion Detection Systems for Secure Software Architectures. In Ph.D. dissertation http://www.di.univaq.it/mostarda/sito/default.php 2006
  • Orset , J.-M. , Alcalde , B. and Cavalli , A. 2005 . “ An EFSM-based intrusion detection system for ad hoc networks ” . In ATVA
  • Perrig , A. , Stankovic , J. and Wagner , D. 2004 . Security in wireless sensor networks . Commun. ACM , 47 ( 6 ) : 53 – 57 .
  • Vora , A. and Nesterenko , M. 2004 . “ Secure Location Verification Using Radio Broadcast ” . In OPODIS
  • Zhang , Y. , Lee , W. and Huang , Y.-A. 2003 . Intrusion detection techniques for mobile wireless networks . Wireliless Networks , : 545 – 556 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.