+

Chi et al., 2006 - Google Patents

Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks

Chi et al., 2006

Document ID
5523391827324280576
Author
Chi S
Cho T
Publication year
Publication venue
International Conference on Fuzzy Systems and Knowledge Discovery

External Links

Snippet

The wireless sensor network is rapidly emerging as an important tool for various applications. In this network, where a large subset of the network applications monitors and protects critical infrastructures, security is a particularly important issue. However, ensuring …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks

Similar Documents

Publication Publication Date Title
Wazid et al. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
Magotra et al. Detection of HELLO flood attack on LEACH protocol
Farjamnia et al. Review of the techniques against the wormhole attacks on wireless sensor networks
Lin et al. Energy efficiency routing with node compromised resistance in wireless sensor networks
Eswari et al. A novel rule based intrusion detection framework for wireless sensor networks
Rassam et al. A sinkhole attack detection scheme in mintroute wireless sensor networks
Jatti et al. Intrusion detection systems
Abhilash et al. Secure routing protocol for MANET: A survey
Saha et al. Two-level secure re-routing (TSR) in mobile ad hoc networks
Prasad Secure intrusion detection system routing protocol for mobile ad‐hoc network
Al-Nasser et al. A comprehensive survey on routing and security in mobile wireless sensor networks
Singh et al. An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes
Hassoubah et al. Intrusion detection of hello flood attack in wsns using location verification scheme
Chi et al. Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
Huh et al. Lightweight intrusion detection for wireless sensor networks
Latha et al. Secure routing through trusted nodes in wireless sensor networks a survey
Nordin et al. Cross-layer based intrusion detection system for wireless sensor networks: challenges, solutions, and future directions
Sadeghizadeh et al. A lightweight intrusion detection system based on specifications to improve security in wireless sensor networks
Zhou et al. Hiding contextual information for defending a global attacker
Katiravan A two level detection of routing layer attacks in hierarchical wireless sensor networks using learning based energy prediction
Tandon Sinkhole Attacks in Wireless Sen
Tyagi et al. Detecting malicious node in network using packet delivery ratio
Nakul A survey on malicious node detection in wireless sensor networks
Vishwakarma et al. An Efficient Attack Detection System for Mobile Ad-hoc Network
Karuppiah et al. False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载