A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
暂无分享,去创建一个
[1] Michael P. Howarth,et al. Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..
[2] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[3] Shekhar Verma,et al. Secure data aggregation in wireless sensor networks using homomorphic encryption , 2015 .
[4] Nei Kato,et al. Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.
[5] Sajal K. Das,et al. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.
[6] Eitan Altman,et al. Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[8] Muddassar Farooq,et al. Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions , 2011, Inf. Sci..
[9] Issa M. Khalil,et al. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.
[10] V. A. Kumar,et al. Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[11] Bharat K. Bhargava,et al. E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[12] Rituparna Chaki,et al. AMC Model for Denial of Sleep Attack Detection , 2012, ArXiv.
[13] Sungyoung Lee,et al. A novel intrusion detection framework for wireless sensor networks , 2013, Personal and Ubiquitous Computing.
[14] Ryan Shea,et al. Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis , 2013, IEEE Systems Journal.
[15] H. Sarojadevi,et al. Efficient Cluster Head Selection method with uniform clusters size to prolong the network lifetime of Wireless Sensor Network , 2015 .
[16] Aman Gupta,et al. Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[17] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .
[18] Alexander M. Wyglinski,et al. A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[19] Somesh Jha,et al. Security and Privacy in Communication Networks , 2017, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[20] Michalis Faloutsos,et al. Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[21] Kang G. Shin,et al. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[22] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[23] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[24] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[25] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[26] Guangjie Han,et al. A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks , 2011, GreeNets.
[27] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[28] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[29] Rituparna Chaki,et al. Lightweight Hierarchical Model for HWSNET , 2011, ArXiv.