Sinkhole Attacks in Wireless Sensor Networks: A Survey
暂无分享,去创建一个
[1] Carlos Martín-Vide,et al. Evolutionary Design of Intrusion Detection Programs , 2007, Int. J. Netw. Secur..
[2] Jayashree Agarkhed,et al. Agent-Based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks , 2017 .
[3] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[4] Mahdieh Ghazvini,et al. A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.
[5] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[6] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[7] Tejinderdeep Singh,et al. Review on Detection and Prevention of Sink Hole Attack In network , 2016 .
[8] Umamakeswari Arumugam,et al. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.
[9] Min Song,et al. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[10] Yu-Chee Tseng,et al. The Coverage Problem in a Wireless Sensor Network , 2005, Mob. Networks Appl..
[11] Amarvir Singh,et al. Probing and Removal of Denial of Service Attack in Wireless Sensor Networks , 2017 .
[12] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] M. A. Rassam,et al. A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.
[15] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[16] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[17] Karl N. Levitt,et al. A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[18] Luigi Coppolino,et al. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[19] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[20] L.E. Parker,et al. Intruder detection using a wireless sensor network with an intelligent mobile robot response , 2008, IEEE SoutheastCon 2008.
[21] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[22] Deepa Gupta,et al. Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol , 2016 .
[23] A. K. Daniel,et al. Recovery of holes problem in wireless sensor networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[24] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[25] Ahmed I. Saleh,et al. Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks , 2017, Comput. Networks.
[26] Naser Alajmi,et al. Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.
[27] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[28] Fatemeh Ghassemi,et al. An adaptive sinkhole aware algorithm in wireless sensor networks , 2017, Ad Hoc Networks.
[29] Choong Seon Hong,et al. A sinkhole attack detection mechanism for LQI based mesh routing in WSN , 2009, 2009 International Conference on Information Networking.
[30] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[31] Ajith Abraham,et al. IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).
[32] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[33] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[34] Prasenjit Choudhury,et al. An Attack Identification Scheme Using Hierarchical Data Clustering in MANET , 2011 .
[35] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[36] Sandeep Dalal,et al. Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures , 2016 .
[37] Manpreet Kaur,et al. Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).
[38] Smita Karmakar,et al. Holes Detection in Wireless Sensor Networks: A Survey , 2014 .
[39] Satyajayant Misra,et al. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[40] Habib Youssef,et al. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.
[41] Wenyu Ma,et al. Coverage hole detection algorithm without location information in wireless sensor networks , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[42] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[43] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[44] Rutuja Jadhav,et al. Security Issues and Solutions in Wireless Sensor Networks , 2017 .
[45] Aline Carneiro Viana,et al. Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.
[46] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[47] Udo W. Pooch,et al. Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.
[48] Reza Rafeh,et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..
[49] Miroslav Voznák,et al. Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks , 2015, Wireless Personal Communications.
[50] G. Mahadevan,et al. A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).