Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT
暂无分享,去创建一个
[1] R. Saravanan,et al. A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] A. Rameez Mohammed,et al. Defense mechanism against selective forwarding attack in wireless sensor networks , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[4] Saikat Saha,et al. Issues in Transmitting Physical Health Information in m-Healthcare , 2013 .
[5] Wen Gao,et al. Watermark detection schemes with high security , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[6] Xingming Sun,et al. Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[7] Peter Xiaoping Liu,et al. Data gathering communication in wireless sensor networks using ant colony optimization , 2004, 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[8] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .
[9] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[10] Adam Dunkels,et al. The ContikiMAC Radio Duty Cycling Protocol , 2011 .
[11] Feng Wang,et al. Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches , 2011, IEEE Communications Surveys & Tutorials.
[12] Chao Xu,et al. Detecting selective forwarding attacks in WSNs using watermark , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).
[13] Nikita V. Mahajan,et al. Securing Multipath Routing Protocol Using Authentication Approach for Wireless Sensor Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[14] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[15] Avijit Mathur,et al. Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).
[16] Kay Römer,et al. The Use of Body Sensor Networks in Clinical Settings and Medical Research , 2013 .
[17] Hugo V. Bitencourt,et al. Simulation Domains for Networked Embedded Systems , 2012 .
[18] Jangeun Jun,et al. MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..
[19] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[20] Steffen Lochmann,et al. Prototype of a secure wireless patient monitoring system for the medical community , 2011 .
[21] Dauda Ayanda. Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach , 2014 .
[22] Zhan Yong-zhao,et al. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[23] Eui-nam Huh,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[24] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[25] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[26] Vincent F. Taylor,et al. Mitigating black hole attacks in wireless sensor networks using node-resident expert systems , 2014, 2014 Wireless Telecommunications Symposium.
[27] Fredrik Österlind,et al. A Sensor Network Simulator for the Contiki OS , 2006 .
[28] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[29] Chenyang Lu,et al. Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.
[30] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[31] Daojing He,et al. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[32] Neelam Khemariya,et al. An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs , 2013 .
[33] Xiaorui Wang,et al. Geographic and energy-aware routing in Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[34] Habib Youssef,et al. Secure Data Transmission Protocol for Medical Wireless Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[35] Tobias Reusing,et al. Comparison of Operating Systems TinyOS and Contiki , 2012 .