A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack
暂无分享,去创建一个
[1] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[2] Brian D. O. Anderson,et al. Rigidity, computation, and randomization in network localization , 2004, IEEE INFOCOM 2004.
[3] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[4] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] R. Sathish,et al. Dynamic Detection of Clone Attack in Wireless Sensor Networks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[7] Hung-Yuan Chen,et al. A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[8] Maryline Laurent-Maknavicius,et al. A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[9] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[10] Yusheng Ji,et al. An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[11] Huang Jie,et al. A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.
[12] Ma Bin. QRdecomposition and genetic algorithm based optimized layout of sensors for hydraulic structures , 2012 .
[13] Shengli Liu,et al. Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks , 2012 .
[14] Marine Minier,et al. Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Xiangyi Chen,et al. Detecting and Defending against Replication Attacks in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[17] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[18] M. V. Ramakrishna,et al. Practical performance of Bloom filters and parallel free-text searching , 1989, CACM.
[19] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[20] A. Savvides,et al. Network localization in partially localizable networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Zhao Jing. Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network , 2012 .