A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Samir R. Das,et al. On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[7] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[8] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[9] Anand Raghunathan,et al. Battery discharge characteristics of wireless sensor nodes: an experimental analysis , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[10] Adrian Perrig,et al. Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.
[11] Jie Gao,et al. Boundary recognition in sensor networks by topological methods , 2006, MobiCom '06.
[12] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[13] Sándor P. Fekete,et al. Deterministic boundary recognition and topology extraction for large sensor networks , 2005, SODA '06.
[14] Christos G. Cassandras,et al. On maximum lifetime routing in Wireless Sensor Networks , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[15] Jürgen Valldorf,et al. Smart systems for electric, safe and networked mobility , 2011 .
[16] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[17] Yasir Saleem,et al. Network Simulator NS-2 , 2015 .