The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures
暂无分享,去创建一个
[1] Hung-Min Sun,et al. An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[2] Pan Yong,et al. A Polynomial-Based Countermeasure to Selective Forwarding Attacks in Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[3] Yenumula B. Reddy,et al. Game theory model for selective forward attacks in wireless sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.
[4] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[5] Dong Hoon Lee,et al. CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Xingming Sun,et al. Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Xiaojiang Du,et al. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[10] Yoon-Hwa Choi,et al. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.
[11] Xiangdong Liu,et al. A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[12] Tae Ho Cho,et al. Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks , 2007, UIC.
[13] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[14] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[15] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[16] Nidal Nasser,et al. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] Zhan Yong-zhao,et al. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[19] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[20] Ruttikorn Varakulsiripunth,et al. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[21] Eui-nam Huh,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[22] Li Yan. The Sequential Mesh Test for A Proportion , 2006 .
[23] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[24] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.