Improving Adhoc wireless sensor networks security using distributed automaton
暂无分享,去创建一个
[1] Yan Zhang,et al. The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.
[2] Annu Joshi. Denial of service in wireless sensor network attacks and defenses , 2018 .
[3] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[4] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[5] Marco Conti,et al. Mobile ad hoc networking: milestones, challenges, and new research directions , 2014, IEEE Communications Magazine.
[6] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[7] Noman Islam,et al. A review of wireless sensors and networks' applications in agriculture , 2014, Comput. Stand. Interfaces.
[8] Shiyong Zhang,et al. Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[9] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[10] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[11] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[12] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[13] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[14] José A. Gutiérrez,et al. On the Use of IEEE Std. 802.15.4 to Enable Wireless Sensor Networks in Building Automation , 2004, Int. J. Wirel. Inf. Networks.
[15] Xinrong Li,et al. Wireless Sensor Network System Design Using Raspberry Pi and Arduino for Environmental Monitoring Applications , 2014, FNC/MobiSPC.
[16] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[17] Winston Khoon Guan Seah,et al. Reliability in wireless sensor networks: A survey and challenges ahead , 2015, Comput. Networks.
[18] Max Mühlhäuser,et al. Collaborative Intrusion Detection in Smart Energy Grids , 2013 .
[19] Gerhard P. Hancke,et al. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[22] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Lin Wu,et al. A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks , 2013, Int. J. Distributed Sens. Networks.
[24] Virgil D. Gligor,et al. On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme , 2014, 2014 IEEE International Symposium on Information Theory.
[25] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.