A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[2] Chun-Shien Lu,et al. Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network , 2020 .
[3] Jiannong Cao,et al. Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[4] Hyunsoo Yoon,et al. A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks , 2009, FGIT-FGCN.
[5] Xiaoming Deng,et al. A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks , 2011, Journal of Computer Science and Technology.
[6] Mohammad Reza Meybodi,et al. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..
[7] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[8] Sajal K. Das,et al. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.
[9] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.
[10] Shengli Liu,et al. Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks , 2012 .
[11] Chun-Shien Lu,et al. Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[12] Maryline Laurent-Maknavicius,et al. A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[13] Robert H. Deng,et al. Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.
[14] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[15] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[16] Chun-Shien Lu,et al. Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[17] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[18] Mojtaba Jamshidi,et al. A Three-level Propagation Method of Routing Packets Specialized for Underwater Wireless Sensor Networks , 2016 .
[19] Mohammad Reza Meybodi,et al. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes , 2018 .
[20] Roberto Di Pietro,et al. Wireless Sensor Replica Detection in Mobile Environments , 2012, ICDCN.
[21] P. N. Chatur,et al. Detailed Survey on Attacks in Wireless Sensor Network , 2017 .
[22] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[23] W.K.G. Seah,et al. Multipath Virtual Sink Architecture for Underwater Sensor Networks , 2006, OCEANS 2006 - Asia Pacific.
[24] Ming Zhang,et al. Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[25] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[26] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.