Using network traffic to infer compromised neighbors in wireless sensor nodes
暂无分享,去创建一个
Garth V. Crosby | Lanier Watkins | Juan Ramos | J. M. Chandramouli | Lakshmi Srinivasan | Prahlad Suresh | Prashanth Kannan
[1] M. B. Ghaznavi-Ghoushchi,et al. An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks , 2012, ArXiv.
[2] Miao Xie,et al. Anomaly Detection in Wireless Sensor Networks , 2013 .
[3] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[4] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[5] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[6] Daniel Curiac,et al. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).
[7] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[8] Yaqiong Liu,et al. An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.
[9] Garth V. Crosby,et al. Using network traffic to infer power levels in wireless sensor nodes , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[10] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.