RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Malicious Relay Detection Using Sentinels: A Stochastic Geometry Framework

        Utku Tefek,Anshoo Tandon,Teng Joon Lim 한국통신학회 2020 Journal of communications and networks Vol.22 No.4

        Next generation wireless networks are under high riskof security attacks due to increased connectivity and informationsharing among peer nodes. Some of the nodes could potentially bemalicious, intending to disrupt or tamper sensitive data transfer inthe network. In this paper, we present a detailed analysis of the sentinel based data integrity attack detection of malicious relays usinga stochastic geometry framework. We assume a practical channelmodel for each wireless link and apply a stochastic geometry approach to interference modeling. Two detection schemes depending on the level of connectivity between sentinel devices are proposed: isolated and co-operative detection. For both schemes, attack detection probability is derived as a function of important network parameters, and the minimum density of sentinels to achievea given detection probability is calculated. It will be shown that areasonable attack detection probability can be achieved even whenthe sentinel node density is much lower than the relay node density.

      • KCI등재

        Sentinel Based Malicious Relay Detection in Wireless IoT Networks

        Anshoo Tandon,Teng Joon Lim,Utku Tefek 한국통신학회 2019 Journal of communications and networks Vol.21 No.5

        Increased device connectivity and information sharingin wireless IoT networks increases the risk of cyber attack by maliciousnodes. In this paper, we present an effective and practicalscheme for detecting data integrity and selective forwarding attackslaunched by malicious relays in wireless IoT networks. Theproposed scheme exploits the broadcast nature of wireless transmissionand provides a sentinel based approach to intrusion detection. Our detection scheme assumes a general noise model for thenetwork where different wireless links may have different packeterror probability (PEP). Further, our detection scheme is effectiveeven in scenarios where different wireless links in the networkemploy distinct modulation and coding schemes at the physicallayer. This detection scheme has application in practical wirelessIoT networks, such as those based on the recently introduced IEEE802.11ah standard.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼