Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information
暂无分享,去创建一个
K. V. Arya | Mukesh Tiwari | Rahul Choudhari | Kumar Sidharth Choudhary | Karm Veer Arya | Mukesh Tiwari | R. Choudhari | K. Choudhary
[1] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[2] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[3] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[7] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[8] Younghwan Yoo,et al. Impact of Node Density and Sensing Range on Intrusion Detection in Wireless Sensor Networks , 2006, Proceedings of 15th International Conference on Computer Communications and Networks.
[9] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[10] Quentin F. Stout,et al. TREE ALGORITHMS FOR UNBIASED COIN TOSSING WITH A BIASED COIN , 1984 .