A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks
暂无分享,去创建一个
[1] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[2] Shahzad Yousaf,et al. A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach , 2019, Journal of Ambient Intelligence and Humanized Computing.
[3] Ravishankar K. Iyer,et al. Neutralization of errors and attacks in wireless ad hoc networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[4] B. Karthik,et al. Improving Network Life Time using Static Cluster Routing for Wireless Sensor Networks , 2013 .
[5] Nadeem Javaid,et al. A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).
[6] Elisa Bertino,et al. Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[7] G. Ramprabu,et al. Design and Analysis of Novel Modified Cross Layer Controller for WMSN , 2015 .
[8] Elisa Bertino,et al. Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[9] Sonia Fahmy,et al. A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.
[10] Tarek R. Sheltami,et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT , 2019, J. Ambient Intell. Humaniz. Comput..
[11] Pankaj. SECURITY ISSUES IN WIRELESS SENSOR NETWORKS – AN OVERVIEW , 2016 .
[12] Andreas Haeberlen,et al. Secure network provenance , 2011, SOSP.
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Elisa Bertino,et al. Provenance for Wireless Sensor Networks: A Survey , 2016, Data Science and Engineering.
[15] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[16] Sonia Fahmy,et al. An energy-efficient approach for provenance transmission in wireless sensor networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[17] Abdelkamel Tari,et al. A self-managing volatile key scheme for wireless sensor networks , 2019, J. Ambient Intell. Humaniz. Comput..
[18] Utz Roedig,et al. A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks , 2012, IEEE Communications Surveys & Tutorials.
[19] Sujesh P Lal,et al. Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique , 2018 .
[20] David K. Y. Yau,et al. ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[21] Elisa Bertino,et al. A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.