Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
暂无分享,去创建一个
[1] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[2] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[3] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[4] V. R. Sarma Dhulipala,et al. Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices , 2016 .
[5] Sayyed Aziz,et al. PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS , 2014 .
[6] Xuemin Shen,et al. An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks , 2011, IEEE Transactions on Vehicular Technology.
[7] Rina Bhattacharya. A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .
[8] Hongmei Deng,et al. Trust-Aware In-Network Aggregation for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[9] Mohamed-Lamine Messai. Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.
[10] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[11] Yifeng Zhu,et al. Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks , 2012, J. Comput. Networks Commun..
[12] Mrityunjaya V. Latte,et al. Optimized mathematical model for cell receivers running in spatially problematic multi path channels for wireless systems in smart antennas , 2016, 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS).
[13] Loukas Lazos,et al. Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[14] V. Sumathy,et al. A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks , 2011 .
[15] P. H. Bhathawala,et al. Wireless Sensor Networks: Security Attacks and Challenges , 2017 .
[16] S. Baskar. Error recognition and correction enhanced decoding of hybrid codes for memory application , 2014, 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS).
[17] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[18] Lingxi Li,et al. Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets , 2012, J. Networks.
[19] Miloslav Hub,et al. Basic authentication procedure modelled by Petri nets , 2010 .
[20] John S. Baras,et al. An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.
[21] S. Baskar,et al. ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION , 2012 .
[22] Wuu Yang,et al. A robust user authentication scheme with self-certificates for wireless sensor networks , 2011, Secur. Commun. Networks.
[23] Raja Datta,et al. Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..