Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
暂无分享,去创建一个
Aduwati Sali | Fazirulhisyam Hashim | Fakhrul Zaman Rokhani | Noor Alsaedi | F. Hashim | A. Sali | F. Rokhani | Noor Alsaedi
[1] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[2] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Guangjie Han,et al. A Novel Method for Node Fault Detection Based on Clustering in Industrial Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[4] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[5] K Abirami.,et al. Sybil attack in Wireless Sensor Network , 2013 .
[6] Félix Gómez Mármol,et al. Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..
[7] Xiao Wang,et al. Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[8] Sudip Misra,et al. Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..
[9] Sung Won Kim,et al. A Secure Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.
[10] Zhou Su,et al. Weighted trust evaluation-based malicious node detection for wireless sensor networks , 2009, Int. J. Inf. Comput. Secur..
[11] Subir Kumar Sarkar,et al. A Light Weight Trust based Secure and Energy Efficient Clustering in Wireless Sensor Network: Honey Bee Mating Intelligence Approach☆ , 2013 .
[12] Karen Hsu karenhsu. Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks , 2007 .
[13] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[14] Sung Won Kim,et al. A Robust Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.
[15] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[16] Catherine Rosenberg,et al. Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[17] Huafeng Wu,et al. Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[18] Raouf Boutaba,et al. Reliable and energy efficient cooperative detection in wireless sensor networks , 2013, Comput. Commun..
[19] Shifeng Sun,et al. SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs , 2015, Comput. Commun..
[20] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[21] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[22] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[23] Yang Xiang,et al. A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.
[24] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[25] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[26] R. B. Patel,et al. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks , 2009, Comput. Commun..
[27] Guangjie Han,et al. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..
[28] Yiwei Thomas Hou,et al. SybilShield: An agent-aided social network-based Sybil defense among multiple communities , 2013, 2013 Proceedings IEEE INFOCOM.
[29] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[30] Madjid Merabti,et al. Security in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[31] Tanveer A. Zia,et al. Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks , 2010, 2010 International Conference on Availability, Reliability and Security.
[32] Hong Zhao,et al. Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[33] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[34] Nidal Nasser,et al. Secure Multipath Routing Protocol for Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[35] Lisa Ann Osadciw,et al. Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence , 2008, SPIE Defense + Commercial Sensing.
[36] Jan M. Rabaey,et al. Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).
[37] S. Karthik,et al. Trust management techniques in Wireless Sensor Networks: An evaluation , 2011, 2011 International Conference on Communications and Signal Processing.