메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술대회자료
저자정보
Chanatip Tumrongwittayapak (King Mongkut’s Institute of Technology Ladkrabang) Ruttikorn Varakulsiripunth (King Mongkut’s Institute of Technology Ladkrabang)
저널정보
제어로봇시스템학회 제어로봇시스템학회 국제학술대회 논문집 ICCAS-SICE 2009
발행연도
2009.8
수록면
1,966 - 1,971 (6page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Presently, the wireless sensor networks (WSNs) are widely used in many areas of communication systemsand its security system becomes very important. However, the security mechanism for WSNs has to be considered differently from traditional network. Firstly, there are severe constraints on WSNs devices such as minimal energy,computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover, cryptography based techniques alone are insufficient to secure WSNs. Hence,intrusion detection techniques must be designed and developed to detect the any kind of undesirable attacks. Further,these techniques should be lightweight because of resource-constrained nature of WSNs. Therefore, we present a new approach of robust and lightweight solution for detecting the Sinkhole attack based on Received Signal StrengthIndicator (RSSI) readings of messages. The proposed solution needs collaboration of some Extra Monitor (EM) nodesapart from the ordinary nodes. We use values of RSSI from four EM nodes to determine the position of all sensor nodeswhere the Base Station (BS) is located at origin position (0,0). We use this information as weight from the BS in order to detect Sinkhole attack. The simulation results show that the proposed mechanism is lightweight due to the monitornodes were not loaded with any ordinary nodes or BS. Moreover, the proposed mechanism does not cause the communication overhead.

목차

Abstract
1. INTRODUCTION
2. RELATED WORKS
3. ASSUMPTION AND NETWORK MODEL
4. RSSI BASED SINKHOLE ATTACKS DETECTION
5. PERFORMANCE EVALUATION
6. CONCLUSION AND FUTURE WORK
REFERENCES

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2014-569-000765772