A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks
暂无分享,去创建一个
[1] Sana Hoor Jokhio,et al. Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[2] Sisi Liu,et al. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2010, IEEE Trans. Mob. Comput..
[3] Piya Techateerawat,et al. Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[4] Ahmed Helmy,et al. The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks , 2003, Ad Hoc Networks.
[5] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[6] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[7] Rodrigo Roman,et al. On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.
[8] Peter Friess,et al. Internet of Things Applications - From Research and Innovation to Market Deployment , 2014 .
[9] Dehai Zhang,et al. TARCS: A Topology Change Aware-Based Routing Protocol Choosing Scheme of FANETs , 2019 .
[10] Chen Zhigang,et al. A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks , 2010, 2010 International Forum on Information Technology and Applications.
[11] Wei Wei,et al. The interactive core of a random wireless sensor network model , 2012, 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring.
[12] Kun Fang,et al. Ant colony optimization based polymorphism-aware routing algorithm for ad hoc UAV network , 2016, Multimedia Tools and Applications.
[13] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[14] Muhammad Ahsan Latif,et al. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.
[15] Yi Liang,et al. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.
[16] Alaauldin Ibrahim,et al. Integrated comparison of energy efficient routing protocols in wireless sensor network: A survey , 2011, 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA).
[17] Ehssan Sakhaee,et al. Aeronautical ad hoc networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[18] Lidong Wang,et al. Big Data Analytics for Network Intrusion Detection: A Survey , 2017 .
[19] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[20] Kah Phooi Seng,et al. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..
[21] Azzedine Boukerche,et al. A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks , 2008, Comput. Networks.
[22] Pietro Manzoni,et al. ANEJOS: a Java based simulator for ad hoc networks , 2001, Future Gener. Comput. Syst..
[23] Mohammad Saiful Islam Mamun,et al. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.
[24] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[25] Fadi Al-Turjman,et al. A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems , 2019, Sensors.
[26] Fadi Al-Turjman,et al. A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks , 2017, IEEE Communications Surveys & Tutorials.
[27] Fadi Al-Turjman,et al. Smart parking in IoT-enabled cities: A survey , 2019, Sustainable Cities and Society.
[28] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[29] Wei Xiang,et al. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.
[30] Damla Turgut,et al. Lightweight routing with dynamic interests in wireless sensor and actor networks , 2013, Ad Hoc Networks.
[31] Neeraj Kumar,et al. Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..
[32] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[33] Jie Li,et al. A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.
[34] Fadi Al-Turjman,et al. Intelligence and security in big 5G-oriented IoNT: An overview , 2020, Future Gener. Comput. Syst..
[35] Mojtaba Alizadeh,et al. The application of internet of things in healthcare: a systematic literature review and classification , 2018, Universal Access in the Information Society.
[36] Nei Kato,et al. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.
[37] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[38] Marisol García-Valls,et al. Accelerating smart eHealth services execution at the fog computing infrastructure , 2020, Future Gener. Comput. Syst..
[39] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[40] K. Q. Yan,et al. A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .
[41] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[42] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[43] Yuxin Mao. A semantic-based intrusion detection framework for wireless sensor network , 2010, INC2010: 6th International Conference on Networked Computing.
[44] Othman Ibrahim,et al. Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.
[45] YuHua Yuan,et al. An Optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) Routing Protocol , 2005, 2005 Asia-Pacific Conference on Communications.
[46] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[47] Ahmed Yassin Al-Dubai,et al. New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks , 2015, J. Comput. Syst. Sci..
[48] Geng Yang,et al. A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[49] Zeljko Zilic,et al. Mobility and Direction Aware Ad-hoc on Demand Distance Vector Routing Protocol , 2016, FNC/MobiSPC.
[50] Yi Zheng,et al. A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks , 2014 .
[51] Mohamed Mostafa Abdel-Azim,et al. A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[52] Dimitrios D. Vergados,et al. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[53] Victor I. Chang,et al. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..
[54] Fadi Al-Turjman,et al. An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..
[55] Elaine B. Barker,et al. Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.
[56] Chia-Fen Hsieh,et al. Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology , 2010 .
[57] Abderrezak Rachedi,et al. muDog: Smart Monitoring Mechanism for Wireless Sensor Networks Based on IEEE 802.15.4 MAC , 2011, 2011 IEEE International Conference on Communications (ICC).
[58] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[59] Xiaodong Wang,et al. DIDS: A dynamic model of intrusion detection system in wireless sensor networks , 2008, 2008 International Conference on Information and Automation.