Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method
暂无分享,去创建一个
Tucha Kedir | P. Karthika | Seid Hassen Yesuf | B. Barani Sundaram | Manish Kumar Mishra | Shobhit Mani Tiwari
[1] Manu Sood,et al. SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK , 2012 .
[2] Liang Chang,et al. Context-Aware Service Ranking in Wireless Sensor Networks , 2012, Journal of Network and Systems Management.
[3] Zhang Yu-sen,et al. Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack , 2011 .
[4] M Adithya,et al. Security Analysis and Preserving Block-Level Data DE-duplication in Cloud Storage Services , 2020 .
[5] Cem Ersoy,et al. Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths , 2012, Comput. Commun..
[6] P. Karthika,et al. IoT using machine learning security enhancement in video steganography allocation for Raspberry Pi , 2020, Journal of Ambient Intelligence and Humanized Computing.
[7] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[8] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[9] P. Karthika,et al. Digital Video Copy Detection Using Steganography Frame Based Fusion Techniques , 2018 .