Unique identity and localization based replica node detection in hierarchical wireless sensor networks
暂无分享,去创建一个
[1] Guang Gong,et al. Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[2] Mahmood Ahmadi,et al. Bloom filter applications in network security: A state-of-the-art survey , 2013, Comput. Networks.
[3] Ming Zhang,et al. Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[4] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] M Sushma,et al. INTRUSION DETECTION AND PREVENTION OF NODE REPLICATION ATTACKS IN WIRELESS BODY AREA SENSOR NETWORK , 2012 .
[6] Sajal K. Das,et al. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.
[7] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[8] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[9] Lei Guo,et al. A k-coverage algorithm in three dimensional wireless sensor networks , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).
[10] K. Suganthi,et al. Randomized fault-tolerant virtual backbone tree to improve the lifetime of wireless sensor networks , 2015, Comput. Electr. Eng..
[11] Brian D. O. Anderson,et al. Wireless sensor network localization techniques , 2007, Comput. Networks.
[12] V. Biradar. RESEARCH ON KEY PRE-DISTRIBUTION SCHEME OF WIRELESS SENSOR NETWORKS , 2013 .
[13] Dong Hoon Lee,et al. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks , 2013, IEEE Systems Journal.
[14] Ahmed El Oualkadi,et al. On the performance of adaptive coding schemes for energy efficient and reliable clustered wireless sensor networks , 2017, Ad Hoc Networks.
[15] Akbar Rahman,et al. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[16] Aduwati Sali,et al. Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..
[17] Bingxian Lu,et al. An Overlapping Clustering Approach for Routing in Wireless Sensor Networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[18] Ashwini W. Nagpurkar,et al. An overview of WSN and RFID network integration , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[19] Decentralized peer-to-peer data dissemination in Wireless Sensor Networks , 2017 .
[20] Ricardo Simon Carbajo,et al. Decentralised Peer-to-Peer data dissemination in Wireless Sensor Networks , 2017, Pervasive Mob. Comput..
[21] S.K. Tripathi,et al. A scheme for the assignment of unique addresses to support self-organization in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[22] David Thomas,et al. The Art in Computer Programming , 2001 .
[23] Mathieu Cunche,et al. I know your MAC address: targeted tracking of individual using Wi-Fi , 2014, Journal of Computer Virology and Hacking Techniques.