Battery Attacks on Sensors
暂无分享,去创建一个
[1] Erol Gelenbe,et al. Power-aware ad hoc cognitive packet networks , 2004, Ad Hoc Networks.
[2] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[3] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[5] Jie Gao,et al. Boundary recognition in sensor networks by topological methods , 2006, MobiCom '06.
[6] Mahmut T. Kandemir,et al. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.
[7] Sándor P. Fekete,et al. Deterministic boundary recognition and topology extraction for large sensor networks , 2005, SODA '06.
[8] Karl N. Levitt,et al. A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[9] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[10] Hans-Joachim Hof,et al. Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[11] Levente Buttyán,et al. Security analysis of reliable transport layer protocols for wireless sensor networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[12] Erol Gelenbe. Energy-Aware Routing in the Cognitive Packet Network , 2011 .
[13] Miodrag Potkonjak,et al. Energy attacks and defense techniques for wireless systems , 2013, WiSec '13.
[14] Sebastian Mödersheim,et al. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs , 2013, NordSec.
[15] Azeddine Bilami,et al. A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks , 2013 .
[16] Vladimir V. Shakhov. Protecting Wireless Sensor Networks from Energy Exhausting Attacks , 2013, ICCSA.
[17] N. Geethanjali,et al. A Survey on Energy Depletion Attacks in Wireless Sensor Networks , 2014 .
[18] Ashwani Kumar,et al. A Survey in Energy Drain Attacks and Their Countermeasures in Wireless Sensor Networks , 2014 .
[19] M.Kanchana,et al. VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .
[20] Erol Gelenbe,et al. Impact of Signaling Storms on Energy Consumption and Latency of LTE User Equipment , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[21] Yen-Chieh Ouyang,et al. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[22] Bharat Pahadiya,et al. Detection and Removal of Vampire Attack in Wireless Sensor Network , 2015 .
[23] Erol Gelenbe,et al. Interconnected Wireless Sensors with Energy Harvesting , 2015, ASMTA.
[24] Erol Gelenbe,et al. Synchronising Energy Harvesting and Data Packets in a Wireless Sensor , 2015 .
[25] Yasin Murat Kadioglu. Energy Consumption Model for Data Processing and Transmission in Energy Harvesting Wireless Sensors , 2016, ISCIS.
[26] Yasin Murat Kadioglu. FINITE CAPACITY ENERGY PACKET NETWORKS , 2017, Probability in the Engineering and Informational Sciences.
[27] P. H. Bhathawala,et al. Wireless Sensor Networks: Security Attacks and Challenges , 2017 .
[28] Vandana Sharma,et al. Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets , 2017 .