Entry Zhang:2008:FIC from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Zhang:2008:FIC,
author = "Qing Zhang and Ting Yu and Peng Ning",
title = "A Framework for Identifying Compromised Nodes in
Wireless Sensor Networks",
journal = j-TISSEC,
volume = "11",
number = "3",
pages = "12:1--12:??",
month = mar,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1341731.1341733",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:50 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Sensor networks are often subject to physical attacks.
Once a node's cryptographic key is compromised, an
attacker may completely impersonate it and introduce
arbitrary false information into the network. Basic
cryptographic mechanisms are often not effective in
this situation. Most techniques to address this problem
focus on detecting and tolerating false information
introduced by compromised nodes. They cannot pinpoint
exactly where the false information is introduced and
who is responsible for it. \par
In this article, we propose an application-independent
framework for accurately identifying compromised sensor
nodes. The framework provides an appropriate
abstraction of application-specific detection
mechanisms and models the unique properties of sensor
networks. Based on the framework, we develop alert
reasoning algorithms to identify compromised nodes. The
algorithm assumes that compromised nodes may collude at
will. We show that our algorithm is optimal in the
sense that it identifies the largest number of
compromised nodes without introducing false positives.
We evaluate the effectiveness of the designed algorithm
through comprehensive experiments.",
acknowledgement = ack-nhfb,
articleno = "12",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "intrusion detection; sensor networks",
}
Related entries
- abstraction,
9(2)181,
15(2)8,
15(4)18,
18(1)4,
18(2)8,
18(3)10
- accurately,
2(3)295,
10(4)1,
12(2)13,
12(3)17,
18(2)7,
18(4)12
- address,
2(1)65,
2(4)390,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
12(2)11,
13(3)22,
13(3)26,
13(4)31,
13(4)38,
13(4)40,
14(1)3,
15(1)2,
15(2)6,
15(2)8,
16(3)11,
16(4)14,
17(1)1,
17(1)2,
17(1)4,
17(2)8,
17(3)11
- alert,
2(4)354,
7(2)274,
10(1)4,
11(4)20,
12(3)16
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)15,
15(4)17,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(1)4,
18(4)14
- application-specific,
2(2)177
- appropriate,
11(1)2,
11(3)16,
12(1)3,
12(2)9,
12(4)21,
14(1)2,
15(2)6
- arbitrary,
10(4)1,
10(4)2,
13(4)38,
14(1)6,
14(1)13,
15(1)2,
17(3)10
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- assume,
11(3)15,
11(4)20,
15(3)12,
17(1)2
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)230,
2(3)295,
2(3)332,
3(3)161,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)15,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(1)4,
18(3)10,
18(3)11,
18(4)14
- basic,
2(4)354,
9(4)461,
10(1)4,
10(2)8,
11(2)3,
12(2)8,
13(3)27,
14(3)26,
14(4)31,
15(3)12,
17(4)13,
18(2)5
- cannot,
1(1)66,
2(2)177,
10(2)7,
11(3)13,
12(1)5,
12(2)9,
12(3)14,
13(3)20,
13(4)39,
14(3)27,
15(2)6,
15(2)9,
15(4)17,
16(1)3,
16(4)16
- completely,
2(1)105,
2(3)269,
7(2)319,
14(4)28
- comprehensive,
10(1)2,
10(4)2,
13(3)24,
15(4)17,
15(4)18,
17(3)12,
18(1)4
- compromised,
2(3)332,
10(4)6,
11(3)15,
11(4)18,
12(2)13,
13(4)30,
13(4)38,
15(1)5
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- designed,
2(4)416,
10(3)10,
10(3)11,
10(3)12,
11(1)2,
12(4)21,
12(4)22,
13(3)25,
13(4)38,
16(2)5,
16(2)8,
16(3)9,
16(3)10,
16(4)14,
17(4)13,
18(1)3
- detecting,
4(1)1,
11(2)2,
11(4)19,
14(1)2,
14(2)21,
15(3)11,
16(2)5
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- develop,
2(2)138,
10(2)8,
10(3)9,
12(1)4,
12(1)6,
12(3)14,
13(3)22,
13(3)27,
14(1)9,
14(4)32,
15(1)3,
15(2)9,
15(2)10,
16(2)7,
16(3)10,
17(1)2
- effective,
2(3)269,
9(2)113,
9(4)391,
10(1)4,
11(4)22,
12(2)10,
12(2)13,
12(4)22,
15(3)12,
15(4)16,
17(1)3,
17(4)13,
18(1)1,
18(4)12
- effectiveness,
10(4)4,
10(4)6,
11(4)22,
12(2)12,
15(3)11,
15(3)12,
17(3)9
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- exactly,
2(3)269,
10(4)1
- experiment,
10(4)1,
10(4)4,
11(2)5,
11(4)22,
12(2)13,
13(3)28,
15(4)15,
16(2)6,
16(3)10,
16(3)11,
16(4)14,
17(3)12,
17(4)15,
18(3)11
- false,
11(4)17,
11(4)18,
12(2)10,
14(1)13,
18(4)14
- focus,
10(4)2,
11(2)6,
11(4)19,
12(1)3,
12(2)12,
14(3)23,
15(4)16,
16(3)10,
18(4)13
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- identify,
11(2)2,
11(3)15,
11(3)16,
11(4)18,
11(4)20,
12(1)4,
12(4)20,
12(4)22,
13(4)35,
14(1)13,
15(4)18,
16(2)7,
17(4)13,
18(4)13
- identifying,
10(4)2,
11(2)2,
13(4)30,
15(2)6,
15(2)7,
15(3)14,
17(3)12
- impersonate,
14(4)28
- introduce,
1(1)66,
1(1)93,
2(3)230,
2(4)390,
9(2)162,
10(1)2,
10(1)3,
10(4)2,
11(2)5,
11(4)17,
12(1)1,
12(1)3,
12(1)5,
12(2)13,
12(3)14,
12(3)15,
12(4)20,
13(3)24,
13(3)27,
13(4)32,
14(1)3,
14(1)12,
15(1)2,
16(2)7,
16(3)9,
16(3)12,
16(4)17,
17(2)7,
17(3)9
- introduced,
2(1)3,
9(2)181,
12(3)16,
13(4)37,
14(1)13,
17(4)14,
17(4)16
- introducing,
16(2)5,
17(3)9
- intrusion,
2(2)159,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
6(2)173,
6(4)443,
7(2)274,
7(4)591,
10(1)4,
11(4)19,
11(4)20,
13(4)30,
18(2)7
- it,
1(1)26,
10(3)10,
13(1)10,
14(1)12,
16(2)5
- largest,
10(4)1,
17(1)1
- may,
2(2)138,
2(2)177,
9(4)391,
10(3)12,
10(4)2,
11(2)2,
11(2)5,
11(4)18,
11(4)21,
12(1)5,
12(2)8,
12(3)15,
12(3)16,
13(1)10,
13(3)22,
13(3)25,
13(4)35,
13(4)38,
13(4)40,
15(2)10,
16(1)4,
17(1)2,
17(1)4,
18(1)1,
18(2)5
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
10(4)6,
11(2)5,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- most,
2(3)332,
9(4)391,
11(2)2,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- Ning, Peng,
4(4)407,
7(2)274,
7(4)591,
8(1)41,
11(4)22,
14(1)13,
15(2)9
- node,
10(1)3,
10(4)1,
10(4)6,
11(2)3,
11(3)13,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(1)7,
14(3)27,
17(4)13
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- number,
7(2)319,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(1)2,
11(2)5,
11(3)14,
11(3)15,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
15(4)15,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- often,
2(1)65,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(1)2,
11(4)20,
16(2)5,
17(1)2,
17(1)4
- once,
12(1)6
- optimal,
2(3)230,
11(3)15,
11(4)20,
12(1)6,
13(3)22,
13(3)27
- physical,
10(1)2,
10(4)3,
11(2)2,
11(3)14,
11(4)22,
14(2)16,
15(2)7,
17(4)13,
17(4)16
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
10(4)3,
11(2)2,
11(3)15,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)15,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(3)11,
17(4)15,
18(1)3
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- reasoning,
2(3)332,
6(1)71,
7(4)591,
12(1)4,
12(1)5,
13(3)20,
14(1)8,
14(2)16
- responsible,
12(2)9
- sense,
11(3)13,
12(1)1,
14(3)23
- sensor,
8(1)41,
8(2)228,
11(2)1,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
13(3)25,
17(2)5
- situation,
2(3)230,
10(4)4,
12(4)20,
15(2)10,
17(1)2
- specific, application-,
2(2)177
- subject,
1(1)26,
9(2)162,
9(4)421,
11(1)3,
11(1)4,
13(3)26,
14(1)7,
15(3)12,
17(1)2,
17(4)14,
18(2)5
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- unique,
10(4)3,
12(3)16,
15(3)12,
16(4)14,
17(4)16,
18(2)7,
18(3)11
- where,
2(3)230,
9(4)461,
10(4)4,
10(4)5,
10(4)6,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- who,
1(1)26,
1(1)66,
10(4)3,
11(4)19,
11(4)23,
12(1)2,
12(2)9,
13(4)39,
13(4)40,
15(3)14,
16(2)8,
17(1)4,
18(4)13
- will,
1(1)93,
2(2)159,
2(3)269,
10(4)1,
11(4)20,
12(1)3,
12(2)10,
12(2)11
- wireless,
7(2)319,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(2)2,
11(3)13,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5
- Yu, Ting,
6(1)1