Security against Black Hole Attack in Wireless Sensor Network - A Review
暂无分享,去创建一个
Binod Kumar Mishra | Prashant Lakkadwala | Mohan C. Nikam | M. C. Nikam | B. K. Mishra | P. Lakkadwala
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Emil Jovanov,et al. Performance Comparison between TEA and Rijndael Encryption Algorithm for Wireless Sensor Networks , 2002, CAINE.
[3] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[4] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[5] Satyajayant Misra,et al. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[6] G Kiran Kumar,et al. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2014 .
[7] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[8] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[9] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008 .
[10] Lui Sha,et al. Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.
[11] Albert G. Greenberg,et al. Detection and Localization of Network Black Holes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Shuang Liu,et al. Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.
[13] Muhammad Sher,et al. Challenges for Security in Wireless Sensor Networks (WSNs) , 2011 .
[14] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[15] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[16] Wenjing Lou,et al. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.
[17] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[18] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[19] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[20] Jitender S. Deogun,et al. Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks , 2009, Wirel. Networks.
[21] Satyajayant Misra,et al. Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.
[22] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[23] Jongwon Yoon,et al. Multiple-Objective Metric for Placing Multiple Base Stations in Wireless Sensor Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.
[24] ChrisKarlof NaveenSastry,et al. TinySec: TinyOS Link LayerSecurityProposal - version 1.0 , 2002 .
[25] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[26] H. Chris Tseng,et al. Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.
[27] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[28] Dong Hoon Lee,et al. Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[29] Chenyang Lu,et al. Priority Scheduling in TinyOS : A Case Study , 2002 .
[30] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[31] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[32] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[33] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[34] Colin Cooper,et al. Searching for Black-Hole Faults in a Network Using Multiple Agents , 2006, OPODIS.
[35] Gang Qu,et al. Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[36] Nicola Santoro,et al. Improved Bounds for Optimal Black Hole Search with a Network Map , 2004, SIROCCO.
[37] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[38] Dhiren R. Patel,et al. Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks , 2008, ICISS.
[39] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.
[40] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[41] Hyotaek Lim,et al. Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption , 2007, IACR Cryptol. ePrint Arch..