A Low Power WSNs Attack Detection and Isolation Mechanism for Critical Smart Grid Applications
暂无分享,去创建一个
[1] Lein Harn,et al. Efficient Group Key Transfer Protocol for WSNs , 2016, IEEE Sensors Journal.
[2] Yun Gu,et al. A novel method to detect bad data injection attack in smart grid , 2013, INFOCOM Workshops.
[3] Irfan Al-Anbagi,et al. A low power cybersecurity mechanism for WSNs in a smart grid environment , 2017, 2017 IEEE Electrical Power and Energy Conference (EPEC).
[4] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[5] Tony Q. S. Quek,et al. Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks , 2017, IEEE Sensors Journal.
[6] Eric Anderson,et al. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.
[7] Xuemin Shen,et al. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Vahid Madani,et al. Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks , 2011, Proceedings of the IEEE.
[10] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.
[11] Andrei Gurtov,et al. Access Control Protocol With Node Privacy in Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[12] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[13] Yen-Chieh Ouyang,et al. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks , 2010, Sensors.
[14] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[15] Nathan Ickes,et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.
[16] Sajal K. Das,et al. JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs , 2017, IEEE Transactions on Dependable and Secure Computing.
[17] Yen-Chieh Ouyang,et al. Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).
[18] Gerhard P. Hancke,et al. Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.
[19] Minyi Guo,et al. LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[20] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[21] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[22] Mianxiong Dong,et al. A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.
[23] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[24] Florian Skopik,et al. Attack Vectors to Metering Data in Smart Grids under Security Constraints , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.
[25] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[26] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[27] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[28] Gerald J. FitzPatrick,et al. NIST interoperability framework and action plans , 2010, IEEE PES General Meeting.
[29] Song Tan,et al. Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid , 2018, IEEE Transactions on Smart Grid.
[30] Omer Gurewitz,et al. RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks , 2008, SenSys '08.
[31] Xiang Li,et al. Rate alteration attacks in smart grid , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[32] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[33] David E. Culler,et al. A transmission control scheme for media access in sensor networks , 2001, MobiCom '01.
[34] Lei Chen,et al. Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[35] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[36] H. T. Mouftah,et al. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring , 2017, 2017 IEEE International Conference on Communications (ICC).
[37] Kenneth C. Budka,et al. Communication Networks for Smart Grids , 2014, Computer Communications and Networks.
[38] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[39] Yanfei Sun,et al. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.
[40] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[41] Irfan S. Al-Anbagi,et al. A Low Power Cyber-Attack Detection and Isolation Mechanism for Wireless Sensor Network , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[42] Hossam S. Hassanein,et al. A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.
[43] Yen-Chieh Ouyang,et al. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[44] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.
[45] Jing Wang,et al. Detection and Control against Replay Attacks in Smart Grid , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).
[46] Ning Zhang,et al. An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs , 2016, IEEE Access.
[47] Jiming Chen,et al. Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach , 2014, IEEE Transactions on Parallel and Distributed Systems.