A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms
暂无分享,去创建一个
[1] Christoph Meinel,et al. Countering Three Denial-of-Sleep Attacks on ContikiMAC , 2017, EWSN.
[2] Shahram Behzad,et al. An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..
[3] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[4] Vikas Juneja,et al. Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques , 2018 .
[5] Shahram Behzad,et al. Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .
[6] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[7] Reza Fotohi,et al. An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.
[8] Reza Fotohi,et al. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.
[9] Reza Fotohi,et al. An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .
[10] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[11] Lindsay N. Childs. RSA Cryptography and Prime Numbers , 2019 .
[12] Jayashree Agarkhed,et al. Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks , 2018 .
[13] Muhammad Mahtab Alam,et al. Validation of Wired and Wireless Interconnected Body Sensor Networks , 2019, Sensors.
[14] Xin-She Yang,et al. Firefly Algorithms for Multimodal Optimization , 2009, SAGA.
[15] Laura Gheorghe,et al. Storm Control Mechanism in Wireless Sensor Networks , 2010, 9th RoEduNet IEEE International Conference.
[16] V. Sumathy,et al. Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks , 2013 .
[17] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[18] Yen-Chieh Ouyang,et al. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[19] Gürsel Serpen,et al. Adaptive and intelligent wireless sensor networks through neural networks: an illustration for infrastructure adaptation through Hopfield network , 2016, Applied Intelligence.
[20] Mahalakshmi Gunasekaran,et al. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.
[21] G. Mahalakshmi,et al. DENIAL OF SLEEP ATTACK DETECTION USING MOBILE AGENT IN WIRELESS SENSOR NETWORKS , 2018 .
[22] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[23] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[24] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[25] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .
[26] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[27] Gerhard P. Hancke,et al. Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.
[28] Christoph Meinel,et al. Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) , 2019, Comput. Networks.
[29] Rituparna Chaki,et al. AMC Model for Denial of Sleep Attack Detection , 2012, ArXiv.
[30] Shahram Jamali,et al. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .
[31] Annapurna Singh,et al. A Novel SVM Based IDS for Distributed Denial of Sleep Strike in Wireless Sensor Networks , 2019, Wirel. Pers. Commun..
[32] G. Padmavathi,et al. Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .
[33] Rituparna Chaki,et al. Lightweight Hierarchical Model for HWSNET , 2011, ArXiv.
[34] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[35] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .