Security Attacks in Wireless Sensor Networks: A Survey
暂无分享,去创建一个
Vishal Jain | Gagandeep Singh Narula | Anupam Baliyan | Prachi Dewal | V. Jain | Anupam Baliyan | Prachi Dewal
[1] Mohsen Sharifi,et al. A Survey on Wireless Sensor Networks Security , 2007 .
[2] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[3] Neeli R. Prasad,et al. Security Framework for Wireless Sensor Networks , 2006, Wirel. Pers. Commun..
[4] Remus Brad,et al. Attacks And Counterattacks On Wireless Sensor Networks , 2014, ArXiv.
[5] Shi-Jinn Horng,et al. Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network , 2014, Wirel. Networks.
[6] Claudio Soriente,et al. Participatory privacy: Enabling privacy in participatory sensing , 2012, IEEE Network.
[7] Md. Abdul Hamid,et al. A group-based security scheme for wireless sensor networks , 2012, Ann. des Télécommunications.
[8] William H. Sanders,et al. A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures , 2014, IEEE Transactions on Smart Grid.
[9] Mohsen Guizani,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[10] Gregorio Díaz,et al. Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP , 2007 .
[11] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Milos Manic,et al. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks , 2014, IEEE Transactions on Industrial Informatics.
[13] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[14] Salil S. Kanhere,et al. IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[15] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[16] Rajashekhar C. Biradar,et al. Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents , 2014, Wirel. Pers. Commun..
[17] George S. Oreku,et al. Improved Feistel-based ciphers for wireless sensor network security , 2008 .
[18] Christopher Leckie,et al. Privacy-preserving data aggregation in Participatory Sensing Networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[19] Milos Manic,et al. Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness , 2014, IEEE Transactions on Industrial Informatics.
[20] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.