Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
暂无分享,去创建一个
[1] Nicolae Tapus,et al. Authentication and Anti-replay Security Protocol for Wireless Sensor Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.
[2] Dhiren R. Patel,et al. Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks , 2012, ArXiv.
[3] Ricardo Dahab,et al. SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[4] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[5] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[6] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[7] Samira Kalantary,et al. A survey on architectures, protocols, applications, and management in wireless sensor networks , 2014 .
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Young-Koo Lee,et al. Energy efficient hybrid intrusion detection system for wireless sensor networks , 2010, 2010 International Conference on Electronics and Information Engineering.
[10] Saleha Mubarak AlMheiri,et al. Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).
[11] Chang Nian Zhang,et al. A Security Protocol for Wireless Sensor Networks , 2008, WSAN.
[12] Seema Verma,et al. A Comparative Study of Key Management Protocols for WSN , 2014 .
[13] David R. Raymond,et al. Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[14] Yi Zhao,et al. A Robust and Effienct Neighborhood-Based Security Protocol for Wireless Sensor Networks , 2010, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[15] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[16] Wayne Goodridge,et al. Security in Wireless Sensor Networks , 2012 .
[17] I. Mahgoub,et al. A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[18] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[19] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[20] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[21] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[22] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[23] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[24] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[25] Azeddine Bilami,et al. FOR WIRELESS SENSOR NETWORK , 2012 .
[26] Jim Alves-Foss,et al. On Preventing Replay Attacks on Security Protocols , 2002 .
[27] Shehzad Ashraf Ch,et al. Ensuring reliability and freshness for Data Aggregation inWireless Sensor Networks , 2011 .
[28] Dhiren R. Patel,et al. FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.
[29] Ulrike Meyer,et al. SecSyWiSe: A secure time synchronization scheme in wireless sensor networks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[30] Souheila Bouam,et al. Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..