Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 채기준 | * |
dc.contributor.author | 김미희 | * |
dc.date.accessioned | 2016-08-28T11:08:32Z | - |
dc.date.available | 2016-08-28T11:08:32Z | - |
dc.date.issued | 2006 | * |
dc.identifier.isbn | 3540343814 | * |
dc.identifier.isbn | 9783540343813 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-12878 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/228943 | - |
dc.description.abstract | To achieve security in sensor networks, it is important to be able to defend against flooding attack recently considered as an extremely threatening attack. In this paper, we propose a flooding attack detection method as the first defense step, through approximate entropy estimation reflecting resource constraints of sensors. Each detector performs both basic estimation for its own region and overlapped estimation for its own and neighbor regions, against the mobility of attack node. Also, in order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically detectors according to network topology. This detector by entropy estimation is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method, being especially promising for accurate decision through overlapped detection even in frequent handoffs of mobile attack agents. © Springer-Verlag Berlin Heidelberg 2006. | * |
dc.description.sponsorship | Intel Corporation;IBM;SGI;Microsoft Research;University of Reading | * |
dc.language | English | * |
dc.title | Overlapped detection via approximate entropy estimation against flooding attack in mobile sensor networks | * |
dc.type | Conference Paper | * |
dc.relation.volume | 3992 LNCS - II | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 1024 | * |
dc.relation.lastpage | 1032 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.doi | 10.1007/11758525_136 | * |
dc.identifier.wosid | WOS:000238389400136 | * |
dc.identifier.scopusid | 2-s2.0-33746586089 | * |
dc.author.google | Kim M. | * |
dc.author.google | Chae K. | * |
dc.contributor.scopusid | 채기준(7102584247) | * |
dc.date.modifydate | 20240322133135 | * |