Study and Simulation of Protocols of WSN Using NS2
暂无分享,去创建一个
[1] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[2] Mohammed Ouzzif,et al. SECURE ROUTING IN WSN , 2011 .
[3] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[4] C. Sreedhar,et al. POTENTIAL SECURITY ATTACKS ON WIRELESS NETWORKS AND THEIR COUNTERMEASURE , 2010 .
[5] Md. Rafiqul Islam,et al. A Study on the Security Issues in WSN , 2012 .
[6] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[7] W. J. Blackert,et al. Analyzing interaction between distributed denial of service attacks and mitigation technologies , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[8] Juan C. Dueñas,et al. A Proposal for System Architecture to Integrate Scarce-resources Wireless Sensor Networks into Ubiquitous Environments , 2006, ICUC.
[9] Satbir Jain,et al. Detection and prevention of wormhole attack in mobile adhoc networks , 2009 .
[10] Hamid Shahnasser,et al. A preprocessor Tcl script generator for NS-2 communication network simulation , 2011, 2011 International Conference on Communications and Information Technology (ICCIT).