Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set
暂无分享,去创建一个
Lin Yao | Chi Lin | Kangbin Yim | Guowei Wu | Gang Hou | Kangbin Yim | Guowei Wu | Chi Lin | Gang Hou | Lin Yao
[1] Huirong Fu,et al. Replication attack on random key pre-distribution schemes for wireless sensor networks , 2005 .
[2] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[3] Jiguo Yu,et al. Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey , 2013, Comput. Commun..
[4] Radha Poovendran,et al. Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .
[5] C. Chellappan,et al. The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .
[6] Chao Jiang. A novel sybil attack detection scheme in wireless sensor networks , 2010, The 2nd International Conference on Information Science and Engineering.
[7] D. Manivannan,et al. Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification , 2009, Pervasive Mob. Comput..
[8] Yu-Kwong Kwok,et al. On Attack-Resilient Wireless Sensor Networks with Novel Recovery Strategies , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[9] Geetha Jayakumar,et al. Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model , 2008 .
[10] Tracy Camp,et al. Comparison of broadcasting techniques for mobile ad hoc networks , 2002, MobiHoc '02.
[11] Mohammad S. Obaidat,et al. A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set , 2013, Secur. Commun. Networks.
[12] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[13] Feng Xia,et al. Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set , 2013, Mobile Networks and Applications.
[14] Jie Wu,et al. An extended localized algorithm for connected dominating set formation in ad hoc wireless networks , 2004, IEEE Transactions on Parallel and Distributed Systems.
[15] Sajal K. Das,et al. Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[16] Peng-Jun Wan,et al. Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[17] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[18] Arthur L. Liestman,et al. Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks , 2002, MobiHoc '02.
[19] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[20] Faramarz Fekri,et al. Node compromise attacks and network connectivity , 2007, SPIE Defense + Commercial Sensing.
[21] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[22] Sajal K. Das,et al. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.
[23] Radha Poovendran,et al. Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[25] Chong-kwon Kim,et al. Multicast tree construction and flooding in wireless ad hoc networks , 2000, MSWIM '00.
[26] Chi Lin,et al. Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach , 2013, The Journal of Supercomputing.
[27] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).