Classification of Attacks on Wireless Sensor Networks: A Survey
暂无分享,去创建一个
[1] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[2] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[3] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[4] Chadi Assi,et al. On the resiliency of mobile ad hoc networks to MAC layer misbehavior , 2005, PE-WASUN '05.
[5] Muhammad Noman Riaz. Clustering Algorithms of Wireless Sensor Networks : A Surevy , 2018 .
[6] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[7] Leandros Tassiulas,et al. Overcoming misbehavior in mobile ad hoc networks: an overview , 2005, CROS.
[8] Mukta Sharma. Attacks and Countermeasures , 2018 .
[9] Chadi Assi,et al. DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks , 2007, Comput. Commun..
[10] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[11] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[12] Michael Walfish,et al. DDoS defense by offense , 2006, SIGCOMM 2006.
[13] Shiyong Zhang,et al. A New Routing Attack in Mobile Ad Hoc Networks , 2005 .
[14] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[15] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] S. Rajkumar. A Survey on Security Attacks in Wireless Sensor Network , 2012 .
[19] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[22] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[23] William Stallings,et al. Cryptography and network security , 1998 .
[24] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[25] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[26] Shio Kumar Singh,et al. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .
[27] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[28] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[29] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[30] Yih-Chun Hu,et al. Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[31] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[32] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[33] Rajendra V. Boppana,et al. Evaluation of a statistical technique to mitigate malicious control packets in ad hoc networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[34] Dr Pradip M. Jawandhiya. A Survey of Mobile Ad Hoc Network Attacks , 2019 .
[35] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[36] C. Gupta,et al. SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .