A Review : Security Threats and Defensive Strategis in WSN
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Manish M. Patel,et al. Two phase wormhole detection approach for dynamic wireless sensor networks , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[3] Vikas Solanke,et al. Wireless sensor network security threats , 2013, ARTCom 2013.
[4] Yoon Hwa Choi,et al. A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks , 2012 .
[5] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[6] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[7] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[8] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[9] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[10] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[11] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[12] B. Paramasivan,et al. Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview , 2011 .
[13] Raisa I. Mulla,et al. Review of Attacks on Wireless Sensor Network and their Classification and Security , 2016 .
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Shio Kumar Singh,et al. A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[18] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[19] Shashikala,et al. A survey on secured routing protocols for wireless sensor network , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).