Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks
暂无分享,去创建一个
[1] Mohammed A. Abuhelaleh,et al. Armor-LEACH - Energy Efficient, Secure Wireless Networks Communication , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[2] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[3] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[4] Soojin Lee,et al. A Specification Based Intrusion Detection Mechanism for the LEACH Protocol , 2012 .
[5] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[6] M. Shankar,et al. Performance Evaluation of LEACH Protocol in Wireless Network , 2012 .
[7] Li Qing,et al. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..
[8] Jasbir Kaur,et al. Improved LEACH Protocol for Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Azeddine Bilami,et al. Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[10] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[11] Amrinder Kaur,et al. Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network , 2013 .
[12] Fei Du,et al. An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[13] A. Roy. DRPGAC: DETECTING AND PREVENTING MALICIOUS ACTIVITIES IN WIRELESS SENSOR NETWORKS , 2014 .
[14] Xuefeng Zheng,et al. TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing , 2013, ArXiv.
[15] Xue Deng. An intrusion detection system for cluster based wireless sensor networks , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[16] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[17] A. Riad,et al. Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks , 2014 .
[18] Vijay Laxmi,et al. Wireless Sensor Networks: Attack Models and Detection , 2012 .
[19] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[20] Murat Dener,et al. Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[21] D. Udaya Suriya Rajkumar,et al. A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network , 2013, J. Comput. Sci..
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] M. A. Rassam,et al. A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.
[25] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[26] United Arab Emirates,et al. Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .
[27] Vijay Laxmi,et al. Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.
[28] Rohit Vaid,et al. V LEACH: AN ENERGY EFFICIENT COMMUNICATION PROTOCOL FOR WSN , 2013 .
[29] Tejinderdeep Singh,et al. Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool , 2013 .
[30] Krishan Kumar,et al. Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[31] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[32] Mohamed Mostafa Abdel-Azim,et al. New Trends in Secure Routing Protocols for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[33] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[34] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[35] Souheila Bouam,et al. Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..
[36] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[37] Wang Sheng,et al. Performance Comparison of LEACH and LEACH-C Protocols by NS2 , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[38] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[39] Mohammad Hossein Yaghmaee,et al. A Novel Algorithm for Detecting Sinkhole Attacks in WSNs , 2012 .
[40] Eman Shaaban,et al. Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.
[41] Sandeep Waraich,et al. A Comparative Study on LEACH Routing Protocol and Its Variants in Wireless Sensor Networks: A Survey , 2014 .
[42] Virendra Pal Singh,et al. Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .
[43] Sugandha Gupta,et al. Survey of Intrusion Detection Techniques in LEACH , 2014 .
[44] Rajashree V Biradar,et al. Multihop Routing In Self-Organizing Wireless Sensor Networks , 2011 .
[46] Yeong-Jee Chung,et al. Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[47] Alireza Keshavarz-Haddad,et al. Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.
[48] Sanjay Kumar Jena,et al. A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.
[49] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[50] Minghao Tang,et al. LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).