完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLai, Gu Hsin
dc.contributor.authorChen, Chia-Mei
dc.date.accessioned2009-08-23T04:44:00Z
dc.date.accessioned2020-05-25T06:51:20Z-
dc.date.available2009-08-23T04:44:00Z
dc.date.available2020-05-25T06:51:20Z-
dc.date.issued2008-11-11T09:00:44Z
dc.date.submitted2008-01-01
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/11007-
dc.description.abstractA wireless sensor network consists of tiny sensing nodes which are deployed in a remote or hostile region, such as battlefield or volcano, to gather information. Each sensor has sensing and wireless communication capabilities, which enable it to gather information from environment and send the information to the remote base station. The applications of wireless sensor networks are used widely today in battlefield monitor, circumstance monitor, or traffic analysis. Security in sensor networks is vital, because sensor networks often apply to a mission-critical task. Therefore, keeping the network available for its intended use is very important.DoS (Denial of Service) attack is that attackers try to diminish or eliminate a network’s capacity to perform its expected function. Attackers may simply send vast redundant data to exhaust the resource of a sensor node or drop data to disturb the result of a query. Due to the limited capability of a sensor, it is very difficult to prevent a sensor from DoS attack. Furthermore, mechanisms of DoS detection used in the wired or wireless environments may not be suitable for sensor networks. This paper proposed a cluster-based intrusion detection system. A secure monitor called gNode is proposed to observe and to report DoS attack activities. Each cluster contains a number of gNodes and normal sensor nodes. gNodes send back the warning ticket to its cluster head or sink, if an abnormal event happens. Once a cluster head or sink receives a certain rate of warning tickets if the compromised node is common sensor node, its cluster head would ignore all messages sent from the compromised sensor node, if the compromised node is cluster head, sink would send a recluster command to the cluster which its cluster head is compromised. The proposed approach could detect DoS attacks more precisely and reduce the damage from a DoS attack based on clustering. This study expects to establish an energy-efficiency and effective intrusion detection system to detect DoS attacks in wireless sensor networks.
dc.format.extent15p.
dc.relation.isversionofVol18
dc.relation.isversionofNo4
dc.subjectsensor networks
dc.subjectDenial of Service
dc.subjectclustering
dc.subjectintrusion detection
dc.titleDetecting Denial of Service Attacks in Sensor Networks
分類:Journal of Computers第18卷

文件中的檔案:
檔案 描述 大小格式 
JOC_18_4_3.pdf297.17 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。