Basit öğe kaydını göster

dc.contributor.authorCoşkun, Vedaten_US
dc.contributor.authorÇayırcı, Erdalen_US
dc.contributor.authorLevi, Alberten_US
dc.contributor.authorSancak, Serdaren_US
dc.date.accessioned2015-01-15T23:00:34Z
dc.date.available2015-01-15T23:00:34Z
dc.date.issued2006-08
dc.identifier.citationCoşkun, V., Çayırcı, E., Levi, A. & Sancak, S. (2006). Quarantine region scheme to mitigate spam attacks in wireless-sensor networks. IEEE Transactions on Mobile Computing, 5(8), 1074-1086. doi:10.1109/TMC.2006.121en_US
dc.identifier.issn1536-1233
dc.identifier.issn1558-0660
dc.identifier.urihttps://hdl.handle.net/11729/214
dc.identifier.urihttp://dx.doi.org/10.1109/TMC.2006.121
dc.description.abstractThe Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/TMC.2006.121
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectNetwork-level security and protectionen_US
dc.subjectWireless sensor networksen_US
dc.subjectAuthenticationen_US
dc.subjectQuarantine regionen_US
dc.subjectSpam attacksen_US
dc.subjectBatteriesen_US
dc.subjectBiosensorsen_US
dc.subjectComputer crimeen_US
dc.subjectCostsen_US
dc.subjectIntelligent networksen_US
dc.subjectMagnetic sensorsen_US
dc.subjectMessage authenticationen_US
dc.subjectRelaysen_US
dc.subjectUnsolicited electronic mailen_US
dc.subjectSpam messagesen_US
dc.subjectCryptographic operationsen_US
dc.subjectIntermittent authentication checksen_US
dc.subjectNetwork-wide message authenticationen_US
dc.subjectGuarantine region schemeen_US
dc.subjectCryptographyen_US
dc.subjectTelecommunication securityen_US
dc.subjectComputer networksen_US
dc.subjectCost effectivenessen_US
dc.subjectProblem solvingen_US
dc.subjectSecurity of dataen_US
dc.subjectSensorsen_US
dc.subjectWireless telecommunication systemsen_US
dc.titleQuarantine region scheme to mitigate spam attacks in wireless sensor networksen_US
dc.typearticleen_US
dc.description.versionPublisher's Versionen_US
dc.relation.journalIEEE transactions on mobile computingen_US
dc.contributor.departmentIşık Üniversitesi, Fen Edebiyat Fakültesi, Enformasyon Teknolojileri Bölümüen_US
dc.contributor.departmentIşık University, Faculty of Arts and Sciences, Department of Information Technologiesen_US
dc.contributor.authorID0000-0003-3052-9821
dc.identifier.volume5
dc.identifier.issue8
dc.identifier.startpage1074
dc.identifier.endpage1086
dc.peerreviewedYesen_US
dc.publicationstatusPublisheden_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.contributor.institutionauthorCoşkun, Vedaten_US
dc.relation.indexWOSen_US
dc.relation.indexScopusen_US
dc.relation.indexScience Citation Index Expanded (SCI-EXPANDED)en_US
dc.description.qualityQ1
dc.description.wosidWOS:000238296700010


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster