A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks
暂无分享,去创建一个
[1] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2] Mi Wen,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[3] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[4] Lisa Ann Osadciw,et al. Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence , 2008, SPIE Defense + Commercial Sensing.
[5] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Victor C. M. Leung,et al. Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..
[8] 李辉,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[11] Nor Badrul Anuar Bin Juma'at. Routing Protocol Design for Secure WSN: Review and Open Research Issues , 2014 .
[12] Reza Rafeh,et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..
[13] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[14] Stefano Chessa,et al. GPS free coordinate assignment and routing in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[15] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] Hairong Qi,et al. Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.
[18] Nor Badrul Anuar,et al. Routing protocol design for secure WSN: Review and open research issues , 2014, J. Netw. Comput. Appl..
[19] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[20] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[21] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[22] Victor C. M. Leung,et al. Applications and design issues for mobile agents in wireless sensor networks , 2007, IEEE Wireless Communications.
[23] Jing Xu,et al. A new mobile agent architecture for wireless sensor networks , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[24] Xue Wang,et al. Optimized Deployment Strategy of Mobile Agents in Wireless Sensor Networks , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[25] Wang Chang. Security in Wireless Network , 2006 .