Intrusion Detection and Security System for Blackhole Attack
暂无分享,去创建一个
[1] Bharat Bhushan,et al. Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).
[2] G. Sahoo,et al. Man-in-the-middle attack in wireless and computer networking — A review , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).
[3] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[4] Moazzam Khan. Security in IEEE 802.15.4 cluster based networks , 2006 .
[5] G. Sahoo,et al. A comprehensive survey of secure and energy efficient routing protocols and data collection approaches in wireless sensor networks , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[6] Sumita Mishra,et al. Improving Reliability of Jamming Attack Detection in Ad hoc Networks , 2011, Int. J. Commun. Networks Inf. Secur..
[7] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[8] Avita Katal,et al. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network , 2013, 2013 International Conference on Communication and Signal Processing.
[9] Samet Kalyoncu. Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks , 2013 .
[10] Binod Kumar Mishra,et al. Security against Black Hole Attack in Wireless Sensor Network - A Review , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[11] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[12] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..