A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks
暂无分享,去创建一个
[1] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[2] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[3] Kamalrulnizam Abu Bakar,et al. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..
[4] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] José Luis Salazar,et al. Secure Trust Management with Source Routing Protocol for MANETs , 2015, Netw. Protoc. Algorithms.
[6] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[7] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[8] J. Martin Leo Manickam,et al. Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[9] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[10] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[11] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[12] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[13] Sunil Kumar Jangir,et al. Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks , 2016, ICTCS '16.
[14] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[15] Yuanming Wu,et al. Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN , 2014 .
[16] GuHsin Lai. Detection of wormhole attacks on IPv6 mobility-based wireless sensor network , 2016, EURASIP J. Wirel. Commun. Netw..
[17] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[18] Yu Zhang,et al. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.
[19] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[20] Krishna Kant,et al. Generalized Trust Model for Cooperative Routing in MANETs , 2017, Wirel. Pers. Commun..
[21] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[22] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[23] Thomas H. Clausen,et al. Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation (LOADng): Protocol, extension, and applicability , 2017, Comput. Networks.
[24] Balwinder Singh Dhaliwal,et al. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks , 2016 .
[25] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[26] Winston Khoon Guan Seah,et al. Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..
[27] R. M. Chandrasekaran,et al. RANDOM DUMMY PACKET DISTRIBUTION APPROACH FOR DETECTION OF ROUTING MISBEHAVIOR IN MOBILE AD HOC NETWORK , 2012 .
[28] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[29] Kamalrulnizam Abu Bakar,et al. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks , 2014, Frontiers of Computer Science.
[30] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[31] Sayan Kumar Ray,et al. A Lightweight Trust Design for IoT Routing , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[32] B. Latha,et al. HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.
[33] Gang Qu,et al. Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs , 2013, Int. J. Distributed Sens. Networks.
[34] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[35] Marjan Kuchaki Rafsanjani,et al. FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs , 2015 .
[36] Young-Bae Ko,et al. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.
[37] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[38] Kausa Aghera,et al. MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol , 2017 .
[39] Vijay Varadharajan,et al. Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.
[40] Khaled Daabaj,et al. Adaptive ACK: A novel intrusion detection system to mitigate intended packet dropping in MANETs , 2010 .
[41] Marwan Krunz,et al. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.
[42] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[43] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[44] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.