View : 757 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.contributor.author김미희*
dc.date.accessioned2016-08-28T11:08:32Z-
dc.date.available2016-08-28T11:08:32Z-
dc.date.issued2006*
dc.identifier.isbn3540343814*
dc.identifier.isbn9783540343813*
dc.identifier.issn0302-9743*
dc.identifier.otherOAK-12878*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/228943-
dc.description.abstractTo achieve security in sensor networks, it is important to be able to defend against flooding attack recently considered as an extremely threatening attack. In this paper, we propose a flooding attack detection method as the first defense step, through approximate entropy estimation reflecting resource constraints of sensors. Each detector performs both basic estimation for its own region and overlapped estimation for its own and neighbor regions, against the mobility of attack node. Also, in order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically detectors according to network topology. This detector by entropy estimation is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method, being especially promising for accurate decision through overlapped detection even in frequent handoffs of mobile attack agents. © Springer-Verlag Berlin Heidelberg 2006.*
dc.description.sponsorshipIntel Corporation;IBM;SGI;Microsoft Research;University of Reading*
dc.languageEnglish*
dc.titleOverlapped detection via approximate entropy estimation against flooding attack in mobile sensor networks*
dc.typeConference Paper*
dc.relation.volume3992 LNCS - II*
dc.relation.indexSCOPUS*
dc.relation.startpage1024*
dc.relation.lastpage1032*
dc.relation.journaltitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)*
dc.identifier.doi10.1007/11758525_136*
dc.identifier.wosidWOS:000238389400136*
dc.identifier.scopusid2-s2.0-33746586089*
dc.author.googleKim M.*
dc.author.googleChae K.*
dc.contributor.scopusid채기준(7102584247)*
dc.date.modifydate20240322133135*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE