D3: distributed approach for the detection of dumb nodes in wireless sensor networks
暂无分享,去创建一个
Mohammad S. Obaidat | Sudip Misra | Arijit Roy | Pushpendu Kar | M. Obaidat | S. Misra | Pushpendu Kar | Arijit Roy
[1] Derek Bissell. Statistical Methods for SPC and TQM , 1994 .
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[4] Giuseppe Anastasi,et al. Performance measurements of motes sensor networks , 2004, MSWiM '04.
[5] Giuseppe Anastasi,et al. Performance Measurements of Mote Sensor Networks , 2004 .
[6] S. Sitharama Iyengar,et al. Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks , 2004, IEEE Transactions on Computers.
[7] Shuangqing Wei,et al. Analysis of communication vulnerability through misbehavior in wireless and sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[8] Ming Dong,et al. On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.
[9] Qin Wang,et al. A Realistic Power Consumption Model for Wireless Sensor Network Devices , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[10] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] S. Gupta,et al. Wireless Sensor Networking for "Hot" Applications: Effects of Temperature on Signal Strength, Data Collection and Localization , 2008 .
[12] E. Leitgeb,et al. Comparing the Life Time of Terrestrial Wireless Sensor Networks by Employing Hybrid FSO/RF and Only RF Access Networks , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.
[13] Rung Ching Chen,et al. A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.
[14] Ramesh Govindan,et al. Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.
[15] James Brown,et al. The Impact of Temperature on Outdoor Industrial Sensornet Applications , 2010, IEEE Transactions on Industrial Informatics.
[16] Subhash Suri,et al. Catching elephants with mice: Sparse sampling for monitoring sensor networks , 2009, TOSN.
[17] Marimuthu Palaniswami,et al. Elliptical anomalies in wireless sensor networks , 2009, TOSN.
[18] Jie Xu,et al. Distributed service integration for disaster monitoring sensor systems , 2011, IET Commun..
[19] Rajesh K. Gupta,et al. Path Planning of Data Mules in Sensor Networks , 2011, TOSN.
[20] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[21] Kanghee Lee,et al. Noncooperative distributed MMSE relay schemes under jamming environment and node geometry in wireless relay networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[22] Sudip Misra,et al. Localized policy-based target tracking using wireless sensor networks , 2012, TOSN.
[23] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[24] Xu Huang,et al. Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.
[25] Hongwei Zhang,et al. NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation , 2012, Int. J. Commun. Syst..
[26] Zhikui Chen,et al. An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks , 2012, Int. J. Commun. Syst..
[27] Mort Naraghi-Pour,et al. Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes , 2013, IEEE Transactions on Information Forensics and Security.
[28] Pawel Kulakowski,et al. Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..
[29] John E. Mitchell,et al. AS-MAC , 2013, ACM Trans. Sens. Networks.
[30] Noureddine Boudriga,et al. Game theory for misbehaving detection in wireless sensor networks , 2013, The International Conference on Information Networking 2013 (ICOIN).
[31] Simon A. Dobson,et al. Failure detection in wireless sensor networks: A sequence-based dynamic approach , 2014, TOSN.
[32] Sudip Misra,et al. Connectivity Re-establishment in the Presence of Dumb Nodes in Sensor-Cloud Infrastructure: A Game Theoretic Approach , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[33] Sudip Misra,et al. Detection of dumb nodes in a stationary wireless sensor network , 2014, 2014 Annual IEEE India Conference (INDICON).
[34] Sudip Misra,et al. Social choice considerations in cloud-assisted WBAN architecture for post-disaster healthcare: Data aggregation and channelization , 2014, Inf. Sci..
[35] Hongbin Chen,et al. An indicator kriging method for distributed estimation in wireless sensor networks , 2014, Int. J. Commun. Syst..
[36] Mohammad S. Obaidat,et al. Existence of dumb nodes in stationary wireless sensor networks , 2014, J. Syst. Softw..
[37] Weihua Zhuang,et al. Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach , 2014, IEEE Transactions on Mobile Computing.
[38] Sudip Misra,et al. CURD: Controllable reactive jamming detection in underwater sensor networks , 2014, Pervasive Mob. Comput..
[39] Sudip Misra,et al. Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation , 2015, Int. J. Commun. Syst..