Enhancing Resiliency Against Routing Layer Attacks in Wireless Sensor Networks: Gradient-based Routing in Focus
暂无分享,去创建一个
Fabrice Valois | Marine Minier | Ochirkhand Erdene-Ochir | Apostolos Kountouris | F. Valois | A. Kountouris | M. Minier | Ochirkhand Erdene-Ochir
[1] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[2] Xueping Li,et al. A Quantitative Survivability Evaluation Model for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[3] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.
[4] Fabrice Valois,et al. Toward Resilient Routing in Wireless Sensor Networks: Gradient-Based Routing in Focus , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[5] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Elyes Ben Hamida,et al. Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations , 2008, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation.
[7] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[10] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[11] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[12] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[13] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[15] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[16] Vincent W. S. Wong,et al. An Energy-Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2006, VTC Fall.
[17] Sang Hyuk Son,et al. IGF: A State-Free Robust Communication Protocol for Wireless Sensor Networks , 2003 .
[18] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[19] Lixia Zhang,et al. Report from the IAB workshop on Unwanted Traffic March 9-10, 2006 , 2007, RFC.
[20] Nancy R. Mead,et al. Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..
[21] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[22] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[23] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[24] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[25] Mani Srivastava,et al. Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[26] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[27] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.