Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations
暂无分享,去创建一个
[1] Lu Ma,et al. Mobile Agent System , 2006 .
[2] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Dejan S. Milojicic,et al. Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.
[6] Satyajayant Misra,et al. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[7] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[8] Jiannong Cao,et al. Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[9] Hairong Qi,et al. Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.
[10] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[11] Lang Tong,et al. Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[12] Satyajayant Misra,et al. Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.
[13] Hewlett Packard. Mobile agent applications , 1999 .
[14] Jongwon Yoon,et al. Multiple-Objective Metric for Placing Multiple Base Stations in Wireless Sensor Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.
[15] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[16] A. Homaifar,et al. Distributed sensor networks based on mobile agents paradigm , 2005, Proceedings of the Thirty-Seventh Southeastern Symposium on System Theory, 2005. SSST '05..
[17] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008 .
[18] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.
[20] Thomas Magedanz,et al. The Mobile Agent Technology , 1997, SOFSEM.
[21] Z. Konjovic,et al. Agent based system for network availability and vulnerability monitoring , 2011, 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics.
[22] Ichiro Satoh. Mobile Agent Technology , 2001 .
[23] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[24] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[25] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[26] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[27] Wenjing Lou,et al. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.