A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based on SI
暂无分享,去创建一个
[1] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[2] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[3] Salman Ahmad Khan,et al. Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.
[4] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[5] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[6] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[7] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[8] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[9] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[10] De Li,et al. Improving Anti-Detection/Interception Performance for Wireless Sensor Network Based on Time-Reversal Technology , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Ayman I. Kayssi,et al. Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[12] Amit Konar,et al. Swarm Intelligence Algorithms in Bioinformatics , 2008, Computational Intelligence in Bioinformatics.
[13] Ashish Srivastava,et al. Wireless sensor networks : A Survey of Intrusions and their Explored Remedies , 2010 .
[14] Lisa Ann Osadciw,et al. Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.