False Data Injection Prevention in Wireless Sensor Networks using Node-level Trust Value Computation
暂无分享,去创建一个
[1] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[3] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[4] M.Rajesh kumar. Trust-Based Malicious Node Detection and Routing in Wireless Sensor Networks , 2017 .
[5] Jie Cui,et al. A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks , 2016, 2016 International Conference on Networking and Network Applications (NaNA).
[6] H. Cam,et al. Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[7] Prashant N. Chatur,et al. TCNPR: Trust Calculation based on Nodes Properties and Recommendations for Intrusion Detection in Wireless Sensor Network , 2017 .
[8] M. Rajesh,et al. Enhanced energy optimized cluster based on demand routing protocol for wireless sensor networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9] Chinya V. Ravishankar,et al. A fault localized scheme for false report filtering in sensor networks , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[10] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[11] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[12] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[13] Manish Sharma,et al. An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks , 2015 .
[14] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.