Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
暂无分享,去创建一个
[1] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[2] Radha Poovendran,et al. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.
[3] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[4] Sajal K. Das,et al. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.
[5] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[6] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Faramarz Fekri,et al. Node compromise attacks and network connectivity , 2007, SPIE Defense + Commercial Sensing.
[8] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[9] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[10] Radha Poovendran,et al. Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .
[11] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[12] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[13] C. Chellappan,et al. The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .
[14] Mani Srivastava,et al. Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[15] Dong Seong Kim,et al. Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[16] Jaeki Song,et al. Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey , 2011, KSII Trans. Internet Inf. Syst..
[17] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[18] Patrick Tague,et al. Identifying, modeling, and mitigating attacks in wireless ad-hoc and sensor networks , 2009 .
[19] Sajal K. Das,et al. Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[20] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[21] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[22] Albert Levi,et al. Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach , 2011, Comput. J..
[23] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[24] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[25] Kang Yen,et al. Node Compromise Modeling and its Applications in Sensor Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[26] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[27] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[28] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[29] Sunho Lim,et al. Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[30] Radha Poovendran,et al. Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[31] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[32] Huirong Fu,et al. Replication attack on random key pre-distribution schemes for wireless sensor networks , 2005 .
[33] Raja Suresh. Defense Transformation and Net-Centric Systems 2008 , 2007 .
[34] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.
[35] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[36] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[37] Alekha Kumar Mishra,et al. Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[38] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.