과제정보
연구 과제 주관 기관 : National Research Foundation of Korea (NRF)
참고문헌
- A. Willig, K. Matheus, and A. Wolisz, "Wireless technology in industrial networks," Proc. IEEE, vol. 93, pp. 1130-1151, June 2005. https://doi.org/10.1109/JPROC.2005.849717
- M. Wei, P. Wang, and Q. Wang, "Research and implementation of the security strategy for the wireless industry control network," Chinese J. Sci. Instrument, vol. 30, pp. 679-681, Apr. 2009.
- A. Willig, "Recent and emerging topics in wireless industrial communications: A selection," IEEE Trans Ind. Informat., vol. 4, pp. 102-124, May 2008. https://doi.org/10.1109/TII.2008.923194
- IEC 6 601 Ed1, "Industrial communication networks-fieldbus specification-WIA-PA communication network and communication profile," Oct. 2011.
- I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, "Wireless sensor networks for intrusion detection: Packet traffic modeling," IEEE Commun. Lett., vol. 10, pp. 22-24, Jan. 2006. https://doi.org/10.1109/LCOMM.2006.1576557
- IEC/PAS 62734, "Industrial Communication Networks-Fieldbus specifications-Wireless Systems for Industrial Automation: Process Control and Related Applications (based on ISA 100.11a)," Sept. 2011.
-
IEC 62591 Ed.1, "Industrial Communication Networks-Wireless Communication Network and Communication Profiles-
$WirelessHART^{TM}$ ," Apr. 2010. - IEEE 802.15.4, "Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Networks- Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," 2006.
- P. Wang and H. Wang, Heng Wang, and Min Xiang. The Technology of Wireless Communication for Measuring and Controlling, Beijing: Publishing House of Electronics Industry, Mar. 2008.
- M. Wei, X. Zhang, W. Ping, K. Kim, and Y. Kim, "Research and implementation of the security method based on WIA-PA standard," in Proc. ICECE, China, Nov. 2010. pp. 1580-1585.
- Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. the 6th MobiCom, USA, Aug. 2000, pp. 275-283.
- J. Tian, Z. Zhang, and W. Zhao, "The design and research of intrusion detection system based on misuse and anomaly," J. Electron. Inf. Technol., vol. 28, pp. 2163-2166, Nov. 2006.
- L. Lijun and L. Zhuowei, "A anomaly-based intrusion detection system in mobile wireless networks," Comput. Eng. Appl., vol. 42, pp. 165-167, July 2006.
- T. Piya and J. Andrew, "Energy efficiency of intrusion detection systems in wireless sensor network," in Proc. IEEE/WIC/ACM Int. Conf. Web Intelligence and Intelligent Agent Technol., Dec. 2006, pp. 227-230.
- S. Bo, Intrusion Detection in Moblie Ad Hoc Networks, Doctoral thesis, Texas A&M University, May 2004.
- M. Guizani, A. Rayes, and B. Khan, Network Modeling and Simulation: A Practical Perspective, John Wiley & Sons, Ltd, Chichester, UK. Feb. 2010, pp. 260-261.
- X. Wang, Q. Liu, and G. B. Giannakis, "Analyzing and optimizing adaptive modulation-coding jointly with ARQ for QoS-guaranteed traffic," IEEE Trans. Veh. Technol., vol. 56, pp. 710-720, Mar. 2007. https://doi.org/10.1109/TVT.2007.891465
- T. Q. Yang, "A time series data mining based on ARMA and hopfield model for intrusion detection," in Proc. Neural Netw. and Brain, China, Oct. 2005, pp. 1045-1049.
- Q. Liu, S. Zhou, and G. B. Giannakis, "Queuing with adaptive modulation and coding over wireless links: Cross-layer analysis and design," IEEE Trans. Wireless Commun., vol. 4, pp. 1142-1153, May 2005. https://doi.org/10.1109/TWC.2005.847005
- A. Lisa, The wireless network environment sensor: A technology independent sensor of faults in mobile wireless network links, Doctoral thesis, Rensselaer Polytechnic Institute Troy, New York, USA. Dec. 2002, pp. 21-29.
- A. Deshpande, C. Guestrin, and S. Madden, "Model-driven data acquisition in sensor networks," in Proc. the 30th VLDB Conf., Canada, Sept. 2004.
- Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection," in Proc. ISPN, USA, Apr. 2005, pp. 20-27.
- S. J. Zhang and L. X. Qi, Time Series Analysis Simple Tutorial, Beijing: Tsinghua University Press, 2003, pp. 132-135.
- D. Y. Uu, K. Yang, and J. Z. Chen, "Agents: Present status and trends," J. Software, vol. 11, pp. 315-321, Mar. 2000.
- Y. E. Sagduyu and A. Ephremides, "The problem of medium access control in wireless sensor networks," IEEE Wireless Commun., vol. 11, pp. 44-53, June 2004.
- H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Research in Security and Privacy, USA, May 2003, pp. 197-213.
- L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networksm," in Proc. IEEE INFOCOM, Spain, Apr. 2006, pp. 1-12.