Citation: | HE Jing-sha, XING Li, ZHANG Ting, LI Guo-rui. A Dynamic Intrusion Detection System for Cluster-based Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2010, 36(6): 845-849. |
[1] |
WOOD A D, STANKOVIC J A. Denial of service in sensor networks[J]. IEEE Computer Soc, 2002, 35 (10) : 54-62.
|
[2] |
KARLOF C, WAGNER D.Secure routing in wireless sensor networks:attacks and countermeasures[C]∥The 1stInternational Workshop on Sensor Network Protocols and Applications.Anchorage:IEEE, 2003:113-127.
|
[3] |
DOUMITS S, AGRAWAL D P.Self-organized criticality&stochastic learning based intrusion detection system for wirelesssensor network[C]∥2003 IEEE Military Communications Conference.Boston:Institute of Electrical and ElectronicsEngineers Inc, 2003:609-614.
|
[4] |
SU W T, CHANG K M, KUO Y H. eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J]. Computer Networks, 2007, 51 (4) : 1151-1168.
|
[5] |
AGAHA, DAS S K, BASU K, et al.Intrusion detection in sensor networks:a non-cooperative game approach[C]∥ThirdIEEE International Symposium on Network Computing and Applications.Los Alamitos:IEEE Computer Soc, 2004:343-346.
|
[6] |
NGAI E C H, LIU J C, LYU M R. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks[J]. Computer Communications, 2007, 30 (11/12) : 2353-2364.
|
[7] |
LIU F, CHENG X, CHEN D C.Insider attacker detection in wireless sensor networks[C]∥IEEE INFOCOM 2007.Piscataway:IEEE, 2007:1936-1944.
|
[8] |
MARONNA R A, MARTIN R D, YOHAI V J. Robust statistics: theory and methods[M]. New York: John Wiley & Sons, 2006: 175-227.
|