An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network
暂无分享,去创建一个
[1] Rodrigo Roman,et al. On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.
[2] Yiwei Thomas Hou,et al. Optimal base station placement in wireless sensor networks , 2009, TOSN.
[3] R. Vijayan,et al. Trust Based Certificate Authority for Detection of Malicious Nodes in MANET , 2011 .
[4] Charles K. Ayo,et al. Impact of Mobile and Wireless Technology on Healthcare Delivery services , 2007 .
[5] Fangmin Sun,et al. A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.
[6] Nacira Ghoualmi Zine,et al. A New Approach for Adaptive Intrusion Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[7] Sanjay Jha,et al. Addressing Mobility in Wireless Sensor Media Access Protocol , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[8] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[9] Sarmistha Neogy,et al. Mobile Agent Security Based on Trust Model in MANET , 2011, ACC.
[10] Azeddine Bilami,et al. Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[11] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[12] John S. Baras,et al. Performance improvements in distributed estimation and fusion induced by a trusted core , 2009, 2009 12th International Conference on Information Fusion.
[13] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[14] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[15] Rung Ching Chen,et al. Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[16] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[17] Tarek R. Sheltami,et al. A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs , 2014, J. Ambient Intell. Humaniz. Comput..
[18] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[19] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[20] Julio Muñoz,et al. A flooding routing algorithm for a wireless sensor network for seismic events , 2015, 2015 International Conference on Computing Systems and Telematics (ICCSAT).
[21] Chunyan Miao,et al. A survey and projection on medium access control protocols for wireless sensor networks , 2012, CSUR.
[22] Sha Xuejun,et al. An Energy-Efficient Message Passing Approach in MAC Design for Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.
[23] Meharouech Sourour,et al. Adaptive IDS Alerts Correlation according to the traffic type and the attacks properties , 2009, 2009 IEEE International Advance Computing Conference.
[24] N. Rajkumar,et al. Enhanced acknowledgement based intrusion detection for MANETs , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[25] Dhaval Dave,et al. An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[26] H. T. Mouftah,et al. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[27] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[28] K. C. Shet,et al. A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET , 2012, 2012 International Conference on Computing Sciences.
[29] S. Madhavi,et al. An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[30] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[31] Jianhua Li,et al. Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[32] Sung Won Kim,et al. A Robust Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.
[33] Sarmistha Neogy,et al. Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).