Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN
暂无分享,去创建一个
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[3] Amr Tolba,et al. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.
[4] R. Karthipan,et al. Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms , 2017, Cluster Computing.
[5] Karim Faez,et al. A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.
[6] Mohammad Reza Meybodi,et al. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..
[7] Shyamala Ramachandran,et al. Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks , 2011 .
[8] Majid Haghparast,et al. A Novel Fault-Tolerant LEACH Clustering Protocol for Wireless Sensor Networks , 2014, J. Circuits Syst. Comput..
[9] Geng Yang,et al. Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[10] Satyajayant Misra,et al. On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[11] Mohammad Reza Meybodi,et al. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes , 2018 .
[12] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[13] Iraj Sadegh Amiri,et al. Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.
[14] Reza Rafeh,et al. Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messages , 2014 .
[15] Mi Wen,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Rolf Kraemer,et al. A Review on Self-Healing and Self-Organizing Techniques for Wireless Sensor Networks , 2019, J. Circuits Syst. Comput..
[18] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[19] Anastasios A. Economides,et al. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..
[20] Mo Wei,et al. AOA based trust evaluation scheme for Sybil attack detection in WSN , 2010 .
[21] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[22] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[23] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.