An adaptive stabilizing imposter detection scheme for distributed mobile wireless sensor networks
暂无分享,去创建一个
[1] Miao Yu,et al. Mobility Resistant Clustering in Multi-Hop Wireless Networks , 2006, J. Networks.
[2] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[3] Mehdi Dehghan,et al. A self-stabilizing clustering algorithm with fault-containment feature for wireless sensor networks , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[4] Hans P. Muhlfeld,et al. Cosmic ray soft error rates of 16-Mb DRAM memory chips , 1998, IEEE J. Solid State Circuits.
[5] Edsger W. Dijkstra,et al. Self-stabilizing systems in spite of distributed control , 1974, CACM.
[6] Robert H. Deng,et al. Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.
[7] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[8] Sajid Hussain,et al. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks , 2009, Defense + Commercial Sensing.
[9] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[10] Ajoy Kumar Datta,et al. Optimal snap-stabilizing PIF algorithms in un-oriented trees , 2005, J. High Speed Networks.
[11] Bechir Hamdaoui,et al. Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.
[12] Mehmet Hakan Karaata,et al. Imposter detection for replication attacks in mobile sensor networks , 2016, Comput. Networks.
[13] Mazliza Othman,et al. Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[14] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[15] Ji Zhang,et al. A self-stabilizing protocol for minimal weighted dominating sets in arbitrary networks , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[16] Jacques M. Bahi,et al. Stabilization and Lifetime Optimization in Distributed Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[17] Wayne Goddard,et al. Daemon Conversions in Distributed Self-stabilizing Algorithms , 2013, WALCOM.
[18] Nidal Nasser,et al. Cluster-based routing protocol for mobile sensor networks , 2006, QShine '06.
[19] Fabrizio Grandoni,et al. Optimal resilient sorting and searching in the presence of memory faults , 2006 .
[20] Mehmet Hakan Karaata,et al. Imposter Detection in Mobile Wireless Sensor Networks , 2014 .
[21] M. Potkonjak,et al. Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.
[22] Andrew Berns,et al. Building self-stabilizing overlay networks with the transitive closure framework , 2011, Theor. Comput. Sci..
[23] S. Abirami,et al. In Mobile Sensor Networks Localized Algorithms for Detection of Node Replication Attacks , 2014 .
[24] Jaap-Henk Hoepman,et al. Secure and self-stabilizing clock synchronization in sensor networks , 2007, Theor. Comput. Sci..
[25] Fabrizio Lombardi,et al. Testing and diagnosis of VLSI and ULSI , 1988 .
[26] Hirotsugu Kakugawa,et al. A Dynamic Reconfiguration Tolerant Self-stabilizing Token Circulation Algorithm in Ad-Hoc Networks , 2004, OPODIS.
[27] Boaz Patt-Shamir,et al. Self-stabilization by local checking and correction , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[28] Chun-Shien Lu,et al. Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[29] Ajoy Kumar Datta,et al. A Self-Stabilizing O(n)-Round k-Clustering Algorithm , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[30] Chih-Yuan Chen,et al. Correctness of Self-Stabilizing Algorithms Under the Dolev Model When Adapted to Composite Atomicity Models , 2012, Int. J. Artif. Life Res..
[31] Joel Antonio Trejo-S'nchez,et al. A Self-stabilizing Algorithm for the Maximal 2-packing in a Cactus Graph , 2012, IPDPS 2012.