Attacks on Wireless Sensor Network: A Survey
暂无分享,去创建一个
[1] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[2] Luis E. Palafox,et al. Security in Wireless Sensor Networks , 2008 .
[3] Jayaprakash Kar,et al. A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks , 2014 .
[4] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[5] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[6] Kotagiri Ramamohanarao,et al. Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.
[7] M.M. Alam,et al. An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting , 2004, E-Tech 2004.
[8] Luis E. Palafox,et al. Chapter XXXIV Security in Wireless Sensor Networks , 2008 .
[9] T. K. Bandopadhyaya,et al. Journal of Theoretical and Applied Information Technology , 2022 .
[10] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[11] Ashish Gupta,et al. ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES , 2014 .
[12] Naser Alajmi,et al. Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.
[13] Jatinder Singh,et al. A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN , 2010, ArXiv.
[14] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[15] Jatinder Singh,et al. A cross-layer based intrusion detection technique for wireless networks , 2012, Int. Arab J. Inf. Technol..
[16] N. Sarma,et al. SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY , 2010 .
[17] A VaniB.,et al. Security Attacks and its Countermeasures in Wireless Sensor Networks , 2014 .
[18] Jean Bacon,et al. A survey of Wireless Sensor Network technologies: research trends and middleware’s role , 2005 .
[19] Youxian Sun,et al. Wireless sensor networks solutions for real time monitoring of nuclear power plant , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[20] Mohamed-Lamine Messai. Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.
[21] Debashis De,et al. Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.
[22] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Hosam Soleman,et al. SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS , 2014 .
[24] Krishnendu Chakrabarty,et al. Sensor deployment and target localization based on virtual forces , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[25] Abdul Hanan Abdullah,et al. Security Issues and Attacks in Wireless Sensor Network , 2014 .