Weighted trust evaluation-based malicious node detection for wireless sensor networks
暂无分享,去创建一个
[1] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[2] Erman Ayday,et al. Location-Aware Security Services for Wireless Sensor Networks Using Network Coding , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] Sergio D. Servetto,et al. From "Sensor Networks" to "Sensor Networks" , 2006 .
[5] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[6] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[7] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[8] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[9] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[10] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[11] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Ivan Stojmenovic,et al. Sensor Networks , 2005 .
[14] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[15] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[16] Marcos Augusto M. Vieira,et al. Survey on wireless sensor network devices , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[17] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] Viktor K. Prasanna,et al. Energy-latency tradeoffs for data gathering in wireless sensor networks , 2004, IEEE INFOCOM 2004.
[19] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[20] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[21] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[22] Daniel Curiac,et al. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).
[23] Dipankar Raychaudhuri,et al. Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .
[24] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[25] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[26] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.