Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks
暂无分享,去创建一个
[1] Roberto Di Pietro,et al. Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..
[2] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[3] Chun-Shien Lu,et al. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[4] Xiuzhen Cheng,et al. From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[6] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[7] Deepika Kukreja,et al. Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs , 2014, ISI.
[8] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.
[9] Ming Zhang,et al. Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[10] Chang Zhou,et al. An Two Dimension detection to node replication attacks in mobile sensor networks , 2016, 2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).
[11] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[12] Chen Xing-tian. Routing Selection for Wide-area Protection Based on Communication Reliability and Time-delay Requirement , 2011 .
[13] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[14] M.J. Ryan,et al. Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks , 2009, IEEE Journal of Oceanic Engineering.
[15] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[16] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .