Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
暂无分享,去创建一个
[1] Zhang Yu-sen,et al. Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack , 2011 .
[2] D. Llewellyn-Jones,et al. Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks , 2009, 2009 Second International Conference on Developments in eSystems Engineering.
[3] Liang Chang,et al. Context-Aware Service Ranking in Wireless Sensor Networks , 2012, Journal of Network and Systems Management.
[4] Cem Ersoy,et al. Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths , 2012, Comput. Commun..
[5] George Kesidis,et al. Managing sybil identities in distributed networks , 2010 .
[6] R. S. Bhuvaneswaran,et al. DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .
[7] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[8] S. Sharmila,et al. Node ID based detection of Sybil attack in mobile wireless sensor network , 2013 .
[9] Roberto Di Pietro,et al. Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[10] Norafida Ithnin,et al. Secure Hierarchal Routing Protocols in Wireless Sensor Networks; Security Survey Analysis , 2012 .
[11] Manu Sood,et al. SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK , 2012 .
[12] L. Zhou,et al. Lightweight and effective detection scheme for node clone attack in wireless sensor networks , 2011, IET Wirel. Sens. Syst..
[13] D. Anand,et al. SECURITY THREATS & ISSUES IN WIRELESS SENSOR NETWORKS , 2022 .
[14] Raja Sharmi Raja Husin,et al. Optimization of Circular Side Door Beam for Crashworthiness Analysis , 2012 .
[15] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[16] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[17] Sugata Sanyal,et al. A Review of Techniques to Mitigate Sybil Attacks , 2012, ArXiv.
[18] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[19] Yogendra Kumar,et al. Security in Wireless Sensor Network: A Survey , 2013 .
[20] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[21] Rajamani Vayanaperumal,et al. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.
[22] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[23] Yusheng Ji,et al. An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.