Evaluating the Feasibility of Traffic-Based Intrusion Detection in an 802.15.4 Sensor Cluster
暂无分享,去创建一个
[1] Jelena V. Misic,et al. MAC layer security of 802.15.4-compliant networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Qilian Liang,et al. Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[4] Shairmina Shafi,et al. The impact of MAC parameters on the performance of 802.15.4 PAN , 2005, Ad hoc networks.
[5] Jelena V. Misic,et al. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic , 2006, IEEE Transactions on Parallel and Distributed Systems.
[6] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[7] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[8] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] S. Delurgio. Forecasting Principles and Applications , 1998 .
[11] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.