Wireless sensor networks : A Survey of Intrusions and their Explored Remedies
暂无分享,去创建一个
Ashish Srivastava | Prateek Srivastava | Shivangi Raman | Amar Prakash | Kishore Babu Pulla | Shveta Singh
[1] Elfed Lewis,et al. Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.
[2] Zhong Chen,et al. FBSR: feedback-based secure routing protocol for wireless sensor networks , 2008, Int. J. Pervasive Comput. Commun..
[3] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Scott F. Midkiff,et al. Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[6] Jianbo Yao. A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Judith Kelner,et al. Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[8] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[9] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[10] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[11] Kalpana Sharma,et al. Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.
[12] Mohsen Sharifi,et al. A Survey on Wireless Sensor Networks Security , 2007 .
[13] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[14] Abhishek Pandey,et al. A Survey on Wireless Sensor Networks Security , 2010 .
[15] Siddharth Ramesh,et al. A Protocol Architecture for Wireless Sensor Networks , 2022 .
[16] Behçet Sarikaya,et al. EAP-Sens: a security architecture for wireless sensor networks , 2008, WICON.
[17] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[18] Dennis Pfisterer,et al. Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.
[19] M. Brownfield,et al. Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols , 2006, 2006 IEEE Information Assurance Workshop.
[20] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[21] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[22] Subir Kumar Sarkar,et al. Issues in Wireless Sensor Networks , 2008 .
[23] Kannan Srinivasan,et al. State based key hop protocol: a lightweight security protocol for wireless networks , 2004, PE-WASUN '04.
[24] Roberto Di Pietro,et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.
[25] Akbar Abbasi. Better Security for Wireless Sensor Networks , 2009, 2009 International Conference on Future Networks.
[26] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[27] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.