Energy-balancing method to detect denial of service attacks in wireless sensor networks
暂无分享,去创建一个
[1] Alireza Keshavarz-Haddad,et al. Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.
[2] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[3] Shio Kumar Singh,et al. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .
[4] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[5] Saurabh Singh,et al. Security For Wireless Sensor Network , 2011 .
[6] Luay A. Wahsheh,et al. Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[7] Sidi-Mohammed Senouci,et al. An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.
[8] Paolo Ballarini,et al. Modeling tools for detecting DoS attacks in WSNs , 2013, Secur. Commun. Networks.
[9] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[10] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[11] M. Guechari,et al. Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[12] Hacène Fouchal,et al. Classification of usual protocols over Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[13] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[14] Sarma B. K. Vrudhula,et al. An Analytical High-Level Battery Model for Use in Energy Management of Portable Electronic Systems , 2001, ICCAD.
[15] Hacène Fouchal,et al. Slot scheduling for wireless sensor networks , 2012, J. Comput. Methods Sci. Eng..
[16] Dirk Timmermann,et al. Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.
[17] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[18] Hacène Fouchal,et al. Distributed backtracking algorithm based on tree decomposition over wireless sensor networks , 2013, Concurr. Comput. Pract. Exp..
[19] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).