暂无分享,去创建一个
[1] Jonathan Loo,et al. Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks , 2008, J. Digit. Content Technol. its Appl..
[2] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[4] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[5] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[6] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[7] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[8] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[9] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[10] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[11] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[12] Shradha Shet,et al. International Journal of Innovative Research in Computer and Communication Engineering , 2014 .
[13] Juan Manuel Górriz,et al. RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation , 2014 .
[14] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[15] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[16] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[17] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[18] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[19] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[20] T. La Porta,et al. On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[21] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[22] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[23] B.Sumitra,et al. A Survey of Cloud Authentication Attacks andSolution Approaches , 2014 .
[24] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[25] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[26] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[27] Preeti Sharma. A Review of Selective Forwarding Attacks in Wireless Sensor Networks , 2012 .
[28] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[29] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[30] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[31] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[32] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[33] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.