A novel agent-based approach to detect sinkhole attacks in wireless sensor networks
暂无分享,去创建一个
[1] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[2] P. Dananjayan,et al. Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks , 2010 .
[3] H. Chris Tseng,et al. Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.
[4] Zhang Hongli. Survey on wireless sensor network security , 2011 .
[5] Ruttikorn Varakulsiripunth,et al. Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.
[6] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[7] Yang Xiang,et al. Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .
[8] Min Song,et al. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[9] Nam N. Pham,et al. A Comparison of Wireless Sensor Network Routing Protocols on an Experimental Testbed , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[10] Maria Calle,et al. MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation , 2012, Int. J. Distributed Sens. Networks.
[11] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[12] Elizabeth M. Belding-Royer,et al. AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[13] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[14] Nick Antonopoulos,et al. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..
[15] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[16] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[17] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[18] Hairong Qi,et al. Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.
[19] Victor C. M. Leung,et al. Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..
[20] G. Mahadevan,et al. A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[21] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.