A non cryptographic method of sink hole attack detection in wireless sensor networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[2] Arkady B. Zaslavsky. Mobile agents: can they assist with context awareness? , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[3] S. Sitharama Iyengar,et al. Multiresolution data integration using mobile agents in distributed sensor networks , 2001, IEEE Trans. Syst. Man Cybern. Part C.
[4] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Hairong Qi,et al. Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.
[7] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[8] Yu-Chee Tseng,et al. Location Tracking in a Wireless Sensor Network by Mobile Agents and Its Data Fusion Strategies , 2003, Comput. J..
[9] S. Sitharama Iyengar,et al. On computing mobile agent routes for data fusion in distributed sensor networks , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] Leonidas J. Guibas,et al. Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.
[11] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[12] Alan S. Willsky,et al. Mobile agents in adaptive hierarchical Bayesian networks for global awareness , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).