Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks
暂无分享,去创建一个
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[3] Lang Tong,et al. Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[4] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[5] Mineo Takai,et al. Parssec: A Parallel Simulation Environment for Complex Systems , 1998, Computer.
[6] Ibrahim Abdul Rahim. A Fault-Tolerant Routing Algorithm for Wireless Sensor Networks , 2004 .
[7] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[8] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[9] Mario Gerla,et al. Routing and multicast in multihop, mobile wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.