A framework for securing mobile wireless sensor networks against physical attacks
暂无分享,去创建一个
[1] Raheem A. Beyah,et al. Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks , 2012, 2012 Proceedings IEEE INFOCOM.
[2] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.
[3] G. Padmavathi,et al. Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks , 2016, J. Comput. Networks Commun..
[4] Yasir Arfat Malkani,et al. LOCALIZATION, ROUTING AND DATA GATHERING IN WIRELESS SENSOR NETWORKS (WSNS) , 2015 .
[5] Chun-Shien Lu,et al. Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[6] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[7] Xiong Yan,et al. A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks , 2012 .
[8] Yusnani Mohd Yussoff,et al. A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks , 2012 .
[9] Javad Rezazadeh,et al. Mobile Wireless Sensor Networks Overview , 2012 .
[10] Yasir Arfat Malkani,et al. Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).
[11] Alvin S. Lim,et al. Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..
[12] Xiaoming Deng,et al. MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[13] Velmani Ramasamy. Mobile Wireless Sensor Networks: An Overview , 2017 .
[14] Chun-Shien Lu,et al. Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[15] Rina Bhattacharya. A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .
[16] Qi Li,et al. A security framework for wireless sensor networks , 2010 .
[17] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[18] Mohamed-Lamine Messai. Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.
[19] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[20] S. Shankar Sastry,et al. Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .
[21] Kalpana Sharma,et al. Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.
[22] Milan Erdelj,et al. Mobile wireless sensor network architecture: Applications to mobile sensor deployment , 2013 .
[23] S. Kaliraj,et al. Efficient and Effective Detection of Node Replication Attacks in Mobile Sensor Networks , 2013 .