1 |
I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, "Wireless sensor networks for intrusion detection: Packet traffic modeling," IEEE Commun. Lett., vol. 10, pp. 22-24, Jan. 2006.
DOI
ScienceOn
|
2 |
IEC/PAS 62734, "Industrial Communication Networks-Fieldbus specifications-Wireless Systems for Industrial Automation: Process Control and Related Applications (based on ISA 100.11a)," Sept. 2011.
|
3 |
IEC 62591 Ed.1, "Industrial Communication Networks-Wireless Communication Network and Communication Profiles-," Apr. 2010.
|
4 |
IEEE 802.15.4, "Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Networks- Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," 2006.
|
5 |
P. Wang and H. Wang, Heng Wang, and Min Xiang. The Technology of Wireless Communication for Measuring and Controlling, Beijing: Publishing House of Electronics Industry, Mar. 2008.
|
6 |
M. Wei, X. Zhang, W. Ping, K. Kim, and Y. Kim, "Research and implementation of the security method based on WIA-PA standard," in Proc. ICECE, China, Nov. 2010. pp. 1580-1585.
|
7 |
Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. the 6th MobiCom, USA, Aug. 2000, pp. 275-283.
|
8 |
J. Tian, Z. Zhang, and W. Zhao, "The design and research of intrusion detection system based on misuse and anomaly," J. Electron. Inf. Technol., vol. 28, pp. 2163-2166, Nov. 2006.
|
9 |
L. Lijun and L. Zhuowei, "A anomaly-based intrusion detection system in mobile wireless networks," Comput. Eng. Appl., vol. 42, pp. 165-167, July 2006.
|
10 |
T. Piya and J. Andrew, "Energy efficiency of intrusion detection systems in wireless sensor network," in Proc. IEEE/WIC/ACM Int. Conf. Web Intelligence and Intelligent Agent Technol., Dec. 2006, pp. 227-230.
|
11 |
S. Bo, Intrusion Detection in Moblie Ad Hoc Networks, Doctoral thesis, Texas A&M University, May 2004.
|
12 |
M. Guizani, A. Rayes, and B. Khan, Network Modeling and Simulation: A Practical Perspective, John Wiley & Sons, Ltd, Chichester, UK. Feb. 2010, pp. 260-261.
|
13 |
A. Willig, K. Matheus, and A. Wolisz, "Wireless technology in industrial networks," Proc. IEEE, vol. 93, pp. 1130-1151, June 2005.
DOI
|
14 |
M. Wei, P. Wang, and Q. Wang, "Research and implementation of the security strategy for the wireless industry control network," Chinese J. Sci. Instrument, vol. 30, pp. 679-681, Apr. 2009.
|
15 |
A. Willig, "Recent and emerging topics in wireless industrial communications: A selection," IEEE Trans Ind. Informat., vol. 4, pp. 102-124, May 2008.
DOI
|
16 |
IEC 6 601 Ed1, "Industrial communication networks-fieldbus specification-WIA-PA communication network and communication profile," Oct. 2011.
|
17 |
X. Wang, Q. Liu, and G. B. Giannakis, "Analyzing and optimizing adaptive modulation-coding jointly with ARQ for QoS-guaranteed traffic," IEEE Trans. Veh. Technol., vol. 56, pp. 710-720, Mar. 2007.
DOI
|
18 |
T. Q. Yang, "A time series data mining based on ARMA and hopfield model for intrusion detection," in Proc. Neural Netw. and Brain, China, Oct. 2005, pp. 1045-1049.
|
19 |
Q. Liu, S. Zhou, and G. B. Giannakis, "Queuing with adaptive modulation and coding over wireless links: Cross-layer analysis and design," IEEE Trans. Wireless Commun., vol. 4, pp. 1142-1153, May 2005.
DOI
|
20 |
A. Lisa, The wireless network environment sensor: A technology independent sensor of faults in mobile wireless network links, Doctoral thesis, Rensselaer Polytechnic Institute Troy, New York, USA. Dec. 2002, pp. 21-29.
|
21 |
A. Deshpande, C. Guestrin, and S. Madden, "Model-driven data acquisition in sensor networks," in Proc. the 30th VLDB Conf., Canada, Sept. 2004.
|
22 |
Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection," in Proc. ISPN, USA, Apr. 2005, pp. 20-27.
|
23 |
S. J. Zhang and L. X. Qi, Time Series Analysis Simple Tutorial, Beijing: Tsinghua University Press, 2003, pp. 132-135.
|
24 |
D. Y. Uu, K. Yang, and J. Z. Chen, "Agents: Present status and trends," J. Software, vol. 11, pp. 315-321, Mar. 2000.
|
25 |
Y. E. Sagduyu and A. Ephremides, "The problem of medium access control in wireless sensor networks," IEEE Wireless Commun., vol. 11, pp. 44-53, June 2004.
|
26 |
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Research in Security and Privacy, USA, May 2003, pp. 197-213.
|
27 |
L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networksm," in Proc. IEEE INFOCOM, Spain, Apr. 2006, pp. 1-12.
|