Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
暂无分享,去创建一个
[1] G. Mahadevan,et al. A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[2] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[3] Jaime Lloret,et al. Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[6] Reza Rafeh,et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..
[7] Faramarz Fekri,et al. Key pre-distribution in wireless sensor networks using multivariate polynomials , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[8] P. Dananjayan,et al. Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks , 2010 .
[9] Chuang Lin,et al. Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks , 2006, 2006 First International Symposium on Pervasive Computing and Applications.
[10] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[11] Kenneth M. Hopkinson,et al. Distributed Fault-Tolerant Quality of Wireless Networks , 2011, IEEE Transactions on Mobile Computing.
[12] Yacine Challal,et al. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[13] Moustafa Youssef,et al. Secure Localization in Wireless Sensor Networks: A Survey , 2010, ArXiv.
[14] A. V. Sutagundar,et al. Location aware event driven multipath routing in Wireless Sensor Networks: Agent based approach , 2013 .
[15] Nick Antonopoulos,et al. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..
[16] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[17] Shahriar Mohammadi,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.
[18] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[19] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[20] Xiuzhen Cheng,et al. Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[22] Lin Chen,et al. On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..
[23] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[24] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[25] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[26] Ruttikorn Varakulsiripunth,et al. Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.
[27] Sajal K. Das,et al. EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.