Enhancing Trust-Aware Routing by False Alarm Detection and Recovery
暂无分享,去创建一个
Gang Qu | Youngho Cho | G. Qu | Youngho Cho
[1] Falko Dressler,et al. On the lifetime of wireless sensor networks , 2009, TOSN.
[2] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[3] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[4] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[5] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[6] Hung-Min Sun,et al. An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[7] Gang Zhou,et al. Impact of radio irregularity on wireless sensor networks , 2004, MobiSys '04.
[8] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[9] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[10] Chris McDonald,et al. Trusted Greedy Perimeter Stateless Routing , 2007, 2007 15th IEEE International Conference on Networks.
[11] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[12] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[13] Gang Qu,et al. FADER: False alarm detection and recovery for trust-aware routing in wireless sensor networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[14] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[15] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[16] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.