Detecting Forwarding Misbehavior In Clustered IoT Networks
暂无分享,去创建一个
Biplab Sikdar | Nalam Venkata Abhishek | Teng Joon Lim | Anshoo Tandon | B. Sikdar | Anshoo Tandon | N. Abhishek
[1] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[2] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[3] Sunho Lim,et al. Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[4] Bo Hu,et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.
[5] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[6] K. Ashok Babu,et al. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2017 .
[7] Amitava Ghosh,et al. Extending LTE coverage for machine type communications , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[8] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[9] Biplab Sikdar,et al. An Intrusion Detection System for Detecting Compromised Gateways in Clustered IoT Networks , 2018, 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[10] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[11] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[12] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[13] Cong Pu,et al. A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.
[14] Ameer Ahmed Abbasi,et al. A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..
[15] Ruttikorn Varakulsiripunth,et al. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[16] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[17] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[18] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[19] Mahdi Zamani,et al. Machine Learning Techniques for Intrusion Detection , 2013, ArXiv.
[20] Leila Ben Saad,et al. An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).