A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
暂无分享,去创建一个
[1] Shrikanth Narayanan,et al. Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.
[2] Sérgio Cavalcante,et al. An extended approach for Dempster-Shafer theory , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[3] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Balasubramaniam Natarajan,et al. Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[5] Andrea Conti,et al. An Overview on Wireless Sensor Networks Technology and Evolution , 2009, Sensors.
[6] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[7] Kamal Jain,et al. Signatures for Network Coding , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[8] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[9] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[10] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[11] Greg Fishel,et al. CALCULATING A DAILY NORMAL TEMPERATURE RANGE THAT REFLECTS DAILY TEMPERATURE VARIABILITY , 2005 .
[12] Rakowsky Uwe Kay,et al. Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .
[13] Subhash Challa,et al. An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .
[14] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[15] Xu Huang,et al. Timing control for protecting from internal attacks in wireless sensor networks , 2012, The International Conference on Information Network 2012.
[16] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.
[17] Dharmendra Sharma,et al. A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .
[18] Xu Huang,et al. A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.
[19] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[20] Reza Ebrahimpour,et al. Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..
[21] Yu Hen Hu,et al. Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..
[22] Robert H. Deng,et al. Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.
[23] Mohsen Guizani,et al. A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..
[24] Dharmendra Sharma,et al. A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .
[25] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.