References
- P. Brutch and C. Ko, 'Challenges in intrusion detection for wireless ad-hoc networks,' Proc. of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), pp.368-373, 2003
- A. A. Strikos, 'A full approach for intrusion detection in wireless sensor networks,' School of Information and Communication Technology, KTH, March, 2007
- S. Doumit and D.P. Agrawal, 'Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network,' MILCOM 2003-IEEE Military Communications Conference, Vol.22, No.1, pp.609-614, 2003 https://doi.org/10.1109/MILCOM.2003.1290173
- C. Su, K. Chang, Y. Kuo, and M. Horng, 'The new intrusion prevention and detection approaches for clustering-based sensor networks,' 2005 IEEE Wireless Communications and Networking Conference (WCNC 2005), March, 2005 https://doi.org/10.1109/WCNC.2005.1424814
- S. Zhu, S. Setia, and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' Proc. of the 10th ACM conference on Computer and communications security, 2003
- A. Agah, S. Das, K. Basu, and M. Asadi, 'Intrusion detection in sensor networks: A non-cooperative game approach,' 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp.343-346, August, 2004 https://doi.org/10.1109/NCA.2004.1347798
- A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, 'Decentralized intrusion detection in wireless sensor networks,' Proc. of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, 2005
- P. Kannadiga and M. Zulkernine, 'DIDMA: a distributed intrusion detection system using mobile agents,' First ACIS International Workshop on Self Assembling Wireless Networks (SNPD/SAWN 2005), pp.238-245, May, 2005
- Ketel, M., 'Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks,' 40th Southeastern Symposium on System Theory (SSST 2008), pp.74-78, March, 2008
- P. Techateerawat and A. Jennings, 'Adaptive Intrusion Detection in Wireless Sensor Networks,' International Conference on Intelligent Pervasive Computing, 2007
- Youtao Zhang, Jun Yang, Weijia Li. 'Towards Energy-Efficient Code Dissemination in Wireless. Sensor Networks,' International Conference on Information Processing in Sensor Networks (IPSN 2008), April, 2008
- Jing Deng, Richard Han, Shivakant Mishra, 'Secure code distribution in dynamically programmable wireless sensor networks,' Proc. of the fifth international conference on Information processing in sensor networks 2006, pp.292-300, 2006
- Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, 'Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks,' Proc. of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.445-456, April, 2008
- Wenyuan Xu, Ke Ma, Trappe, W., Yanyong Zhang, 'Jamming sensor networks: attack and defense strategies,' Network, IEEE, Vol.20, No.3, pp.41-47, 2006 https://doi.org/10.1109/MNET.2006.1637931
- D. Raymond et al., 'Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols,' Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, pp.297-304, 2006
- David R. Raymond, Scott F. Midkiff, 'Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses,' IEEE Pervasive Computing, Vol.7, No.1, pp.74-81, 2008 https://doi.org/10.1109/MPRV.2008.6
- J. Newsome, E. Shi, D. Song, and A. Perrig, 'The sybil attack in sensor networks: analysis & defenses,' Proc. of the third international symposium on Information processing in sensor networks, ACM Press, pp.259-268. 2004 https://doi.org/10.1145/984622.984660
- J. Deng, R. Han, and S. Mishra. 'Countermeasuers against traffic analysis in wireless sensor networks,' Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004
- B. Parno, A. Perrig, and V. Gligor, 'Distributed detection of node replication attacks in sensor networks,' Proc. of IEEE Symposium on Security and Privacy, May, 2005 https://doi.org/10.1109/SP.2005.8
- H. Chan and A. Perrig, 'Security and privacy in sensor networks,' IEEE Computer Magazine, pp.103-105, 2003
- O. Younis and S. Fahmy, 'HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks,' IEEE Trans. Mobile Computing, Vol.3, No.4, pp.366-379, Oct.-Dec., 2004 https://doi.org/10.1109/TMC.2004.41
- O. Younis and S. Fahmy, 'Distributed Clustering in Ad-Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach,' Proc. IEEE INFOCOM, Mar., 2004 https://doi.org/10.1109/INFCOM.2004.1354534
- 최경진, 윤명준, 심인보, 이재용, '무선 센서 네트워크에서의 에너지 효율적인 클러스터 헤드 선출 알고리즘', 한국통신학회논문지, Vol.32, No.6, 2007