SCOTRES: Secure Routing for IoT and CPS
暂无分享,去创建一个
Ioannis Papaefstathiou | Charalampos Manifavas | George Hatzivasilis | C. Manifavas | George Hatzivasilis | I. Papaefstathiou
[1] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] André Carlos Ponce de Leon Ferreira de Carvalho,et al. Fine-Tuning of UAV Control Rules for Spraying Pesticides on Crop Fields: An Approach for Dynamic Environments , 2016, Int. J. Artif. Intell. Tools.
[3] Ioannis Papaefstathiou,et al. ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).
[4] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .
[5] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[6] Nazar Abbas Saqib,et al. Detection of jamming attacks in 802.11b wireless networks , 2013, EURASIP Journal on Wireless Communications and Networking.
[7] Sugata Sanyal,et al. A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks , 2010, ArXiv.
[8] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[9] Manju Khari,et al. Survey of Trust Schemes on Ad-Hoc Network , 2012 .
[10] Deepika Kukreja,et al. Analytical models for trust based routing protocols in wireless ad hoc networks , 2012, SOEN.
[11] Ioannis Papaefstathiou,et al. An Open-Source Extendable, Highly-Accurate and Security Aware CPS Simulator , 2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[12] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[13] Houbing Song,et al. Cyber-physical systems for water sustainability: challenges and opportunities , 2015, IEEE Communications Magazine.
[14] Anastasios A. Economides,et al. Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks , 2014, SecureComm.
[15] Sajal K. Das,et al. Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[16] Simon Pietro Romano,et al. A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[17] Anastasios A. Economides,et al. Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[18] Ioannis Papaefstathiou,et al. Lightweight authenticated encryption for embedded on-chip systems , 2016, Inf. Secur. J. A Glob. Perspect..
[19] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[20] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[21] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[22] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[23] Reputation-based Systems: a security analysis , 2007 .
[24] Stéphane Devismes,et al. SR3: secure resilient reputation-based routing , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[25] Xinyu Yang,et al. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[26] Charalampos Manifavas,et al. Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems , 2012, 2012 16th Panhellenic Conference on Informatics.
[27] Levent Ertaul,et al. Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.
[28] Ioannis G. Askoxylakis,et al. SecRoute: End-to-end secure communications for wireless ad-hoc networks , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[29] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[30] Antonio Capone,et al. Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks , 2013, IEEE/ACM Transactions on Networking.
[31] Xinwen Fu,et al. A cloud computing based system for cyber security management , 2015, Int. J. Parallel Emergent Distributed Syst..
[32] Anastasios A. Economides,et al. Environmental Monitoring Based on the Wireless Sensor Networking Technology: A Survey of Real-World Applications , 2014, Int. J. Agric. Environ. Inf. Syst..
[33] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.