A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks
暂无分享,去创建一个
Khalid Mahmood | Jahangir Khan | Ansar Munir Shah | Muhammad Saeed | Babar Nawaz | Mehmood ul Hassan
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] T. Saaty. Fundamentals of Decision Making and Priority Theory With the Analytic Hierarchy Process , 2000 .
[3] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[4] A. K. Vatsa,et al. Detection and Control of DDOS Attacks over Reputation and Score Based MANET , 2011 .
[5] Sajal K. Das,et al. Prevention of DoS Attack in Sensor Networks using Repeated Game Theory , 2006, ICWN.
[6] Sukhwinder Singh,et al. A survey on fault tolerance techniques in Wireless Sensor Networks , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[7] R.P. Yadav,et al. Clusterhead selection in clustering algorithms for wireless sensor networks: A survey , 2008, 2008 International Conference on Computing, Communication and Networking.
[8] Rui Wang,et al. An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[9] K. Somasundaram,et al. A comparative study of clusterhead selection algorithms in wireless sensor networks , 2011, ArXiv.
[10] Mahfooz Alam,et al. A New Approach of Dynamic Load Balancing Scheduling Algorithm for Homogeneous Multiprocessor System , 2016, Int. J. Appl. Evol. Comput..
[11] Maria Apostolaki,et al. A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[12] Manjusha Pandey,et al. Distributed Denial of Service Attacks: A Review , 2014 .
[13] D. Dechene,et al. A Survey of Clustering Algorithms for Wireless Sensor Networks , 2006 .
[14] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[15] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[16] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.