A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[2] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[4] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[5] Ruttikorn Varakulsiripunth,et al. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[6] Dong Yang,et al. TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[7] Usman Tariq,et al. Sinkhole Vulnerabilities in Wireless Sensor Networks , 2014 .
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[10] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[11] Habib M. Ammari. Investigating the Energy Sink-Hole Problem in Connected $k$ -Covered Wireless Sensor Networks , 2014, IEEE Transactions on Computers.
[12] Min Song,et al. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[13] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[14] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[15] Amir Masoud Rahmani,et al. HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks , 2014, J. Netw. Comput. Appl..
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[18] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[19] Cigdem Sengul,et al. A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis , 2012, Comput. Commun..