An Exhaustive Survey on Physical Node Capture Attack in WSN
暂无分享,去创建一个
[1] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[3] Chi Lin,et al. Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach , 2013, The Journal of Supercomputing.
[4] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[5] T.D. Subash,et al. Double hash function scheme in wireless sensor networks , 2011, 2011 World Congress on Information and Communication Technologies.
[6] Feng Xia,et al. Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set , 2013, Mobile Networks and Applications.
[7] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] Mohammad S. Obaidat,et al. A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set , 2013, Secur. Commun. Networks.
[9] Radha Poovendran,et al. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.
[10] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[11] Klaus D. McDonald-Maier,et al. Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics , 2012, 2012 Third International Conference on Emerging Security Technologies.
[12] Sana Hoor Jokhio,et al. Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[13] L M Patnaik,et al. Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks , 2011 .
[14] Alekha Kumar Mishra,et al. Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[15] Mrudang Mehta,et al. Security in Wireless Sensor Network: A survey , 2011 .
[16] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[17] Rabi N. Mahapatra,et al. Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[18] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[19] Sajal K. Das,et al. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.
[20] Sanjay Silakari,et al. An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network , 2015 .
[21] Luciano Lavagno,et al. A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[22] Jun-won Ho. Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .