Imposter detection for replication attacks in mobile sensor networks
暂无分享,去创建一个
Mehmet Hakan Karaata | Ali Hamdan | Tassos Dimitriou | Ebrahim A. Alrashed | T. Dimitriou | M. Karaata | Ali Hamdan
[1] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[2] Chun-Shien Lu,et al. Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[3] Jian Ma,et al. Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[4] Mehmet Hakan Karaata,et al. Imposter Detection in Mobile Wireless Sensor Networks , 2014 .
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[7] Nidal Nasser,et al. Cluster-based routing protocol for mobile sensor networks , 2006, QShine '06.
[8] Miao Yu,et al. Mobility Resistant Clustering in Multi-Hop Wireless Networks , 2006, J. Networks.
[9] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[10] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[11] Tassos Dimitriou,et al. Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.
[12] Robert H. Deng,et al. Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.
[13] Bechir Hamdaoui,et al. Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.
[14] A. Tsourdos,et al. Contaminant Cloud Boundary Monitoring Using Network of UAV Sensors , 2008, IEEE Sensors Journal.
[15] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[16] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[17] Mazliza Othman,et al. Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[18] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.
[19] Tassos Dimitriou,et al. Spy-Sense: spyware tool for executing stealthy exploits against sensor networks , 2013, HotWiSec '13.
[20] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] Chun-Shien Lu,et al. Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[22] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[23] Sajid Hussain,et al. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks , 2009, Defense + Commercial Sensing.