A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[2] Huanguo Zhang,et al. A New Hierarchical Trusted Model for Wireless Sensor Networks , 2006, 2006 International Conference on Computational Intelligence and Security.
[3] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[4] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Witold A. Krzymien,et al. Analytical query response time evaluation for a two-level clustering hierarchy based wireless sensor network routing protocol , 2010, IEEE Communications Letters.
[6] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[7] Der-Jiunn Deng,et al. Cluster-based secure communication mechanism in wireless ad hoc networks , 2010, IET Inf. Secur..
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[10] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[11] Hongyi Wu,et al. Clustering and cluster-based routing protocol for delay-tolerant mobile networks , 2010, IEEE Transactions on Wireless Communications.
[12] Jianhua Ma,et al. Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks , 2010, J. Commun..
[13] Farouk Kamoun,et al. CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..
[14] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[15] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[16] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[17] Ted Taekyoung Kwon,et al. Secure and Efficient Broadcast Authentication in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.
[18] Uthman A. Baroudi,et al. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..
[19] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[20] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[21] Julien Penders,et al. Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.