A survey of wireless sensor network security in the context of Internet of Things
暂无分享,去创建一个
[1] Zahid Ullah,et al. Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.
[2] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[3] Karl N. Levitt,et al. A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[4] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[5] Ian F. Akyildiz,et al. Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.
[6] Jie Wu. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .
[7] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[8] Paul Fremantle,et al. A survey of secure middleware for the Internet of Things , 2017, PeerJ Prepr..
[9] George Kesidis,et al. Managing sybil identities in distributed networks , 2010 .
[10] Asadullah Shah,et al. Security Attacks and Solutions On Ubiquitous Computing Networks , 2013 .
[11] Samira Moussaoui,et al. Disaster Management Projects Using Wireless Sensor Networks: An Overview , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[12] Aristides Mpitziopoulos,et al. An effective defensive node against jamming attacks in sensor networks , 2009, Secur. Commun. Networks.
[13] Philip W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Engin Leloglu. A Review of Security Concerns in Internet of Things , 2017 .
[15] Mostafa Belkasmi,et al. Internet of Things Security: Layered classification of attacks and possible Countermeasures , 2016 .
[16] M. Castillo-Effer,et al. Wireless sensor networks for flash-flood alerting , 2004, Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, 2004..
[17] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[18] Matt Welsh,et al. Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[19] S. Eisenman,et al. Sensor Networks , 2002 .
[20] K. Inoue,et al. Design of search balls with wide field of view for searching inside of rubble , 2005, IEEE International Safety, Security and Rescue Rototics, Workshop, 2005..
[21] Minglu Zhang,et al. Design and implementation of an Emergency Search and Rescue System based on mobile robot and WSN , 2010, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010).
[22] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[23] Akshya Swain,et al. Wireless Sensor Network attacks: An overview and critical analysis , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).
[24] Xin Liu,et al. Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.
[25] Wirawan,et al. Design of low cost wireless sensor networks-based environmental monitoring system for developing country , 2008, 2008 14th Asia-Pacific Conference on Communications.
[26] Josef Pieprzyk,et al. Broadcast anti-jamming systems , 1999, IEEE International Conference on Networks. ICON '99 Proceedings (Cat. No.PR00243).
[27] Ammar Rayes,et al. The Internet of Things (IoT) , 2020, Energy and Analytics.
[28] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[29] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[30] A VaniB.,et al. Security Attacks and its Countermeasures in Wireless Sensor Networks , 2014 .
[31] Dorothea Hilhorst,et al. Mapping Vulnerability: Disasters, Development and People , 2004 .
[32] Devendra Prasad,et al. DISASTER MANAGEMENT IN WIRELESS SENSOR NETWORKS : A SURVEY REPORT , 2016 .
[33] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[34] Indira Priyadarshinee,et al. Flood Prediction and Prevention through Wireless Sensor Networking (WSN): A Survey , 2015 .
[35] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[36] Romano Fantacci,et al. A novel communication infrastructure for emergency management: the In.Sy.Eme. vision , 2010, Wirel. Commun. Mob. Comput..
[37] Kamarulzaman Ab. Aziz,et al. Managing disaster with wireless sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[38] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.