Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols
暂无分享,去创建一个
[1] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[2] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[3] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[4] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[5] John S. Baras,et al. ATEMU: a fine-grained sensor network simulator , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[6] D. Manjunath. A Review of Current Operating Systems for Wireless Sensor Networks , 2007, Computers and Their Applications.
[7] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[8] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[9] IV NathanielJ.Davis,et al. Wireless sensor network energy-adaptive mac protocol , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[10] T. Narten. Internet routing , 1989, SIGCOMM 1989.
[11] Anish Arora,et al. Antireplay Protocols for Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[12] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[13] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[14] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[15] Adrian Perrig,et al. ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.
[16] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[17] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.
[18] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[19] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[20] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[21] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[22] Robbert van Renesse,et al. Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[23] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[24] Esteban Egea López,et al. OBIWAN: wireless sensor networks with OMNET++ , 2006 .
[25] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[26] Yang Xiao,et al. Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[27] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[28] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[29] L.C. Baird,et al. Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[30] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[31] Almohanad S. Fayez,et al. Cross-layer wireless sensor network radio power management , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[32] Boleslaw K. Szymanski,et al. SENSE: A SENSOR NETWORK SIMULATOR , 2004 .
[33] Peng Ning,et al. Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[34] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[35] Joseph G. Tront,et al. Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[36] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[37] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[38] Kalyan S. Perumalla,et al. ON EVALUATION NEEDS OF REAL-LIFE SENSOR NETWORK DEPLOYMENTS , 2006 .
[39] Mani B. Srivastava,et al. SensorSim: a simulation framework for sensor networks , 2000, MSWIM '00.
[40] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[41] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[42] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[43] Averill M. Law,et al. Simulation Modeling and Analysis , 1982 .
[44] John Anderson,et al. An analysis of a large scale habitat monitoring application , 2004, SenSys '04.
[45] Mohammad Ilyas,et al. Smart Dust , 2006 .
[46] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[47] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[49] David R. Raymond,et al. Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[50] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[51] Mani B. Srivastava,et al. A dynamic operating system for sensor nodes , 2005, MobiSys '05.
[52] David M. Nicol,et al. A scalable simulator for TinyOS applications , 2002, Proceedings of the Winter Simulation Conference.
[53] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[54] Jeff Rose,et al. MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..
[55] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[56] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[57] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[58] Biplab Sikdar,et al. A protocol for tracking mobile targets using sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[59] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[60] A. Czarlinska,et al. Distributed actuation attacks in wireless sensor networks: implications and countermeasures , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[61] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[62] Hao Chen,et al. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.
[63] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[64] J. Elson,et al. Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.
[65] Gul A. Agha,et al. SENS: a sensor, environment and network simulator , 2004, 37th Annual Simulation Symposium, 2004. Proceedings..
[66] Deborah Estrin,et al. EmStar: An Environment for Developing Wireless Embedded Systems Software , 2003 .
[67] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[68] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[69] Michael I. Brownfield,et al. Energy-efficient Wireless Sensor Network MAC Protocol , 2006 .
[70] Scott F. Midkiff,et al. Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[71] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[72] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[73] Thomas W. Carley. Sidh: A Wireless Sensor Network Simulator , 2005 .
[74] M. Lakshmanan,et al. AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS , 2009 .
[75] J. Heidemann,et al. A Flexible and Reliable Radio Communication Stack on Motes , 2002 .
[76] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.