Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[2] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[3] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[4] Vee Liem Chee,et al. Security Analysis of TORA Routing Protocol , 2007, ICCSA.
[5] Anastasia Stulova,et al. A Protocol for Pervasive Distributed Computing Reliability , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[6] Kevin R. Fall,et al. The NS Manual (Formerly NS Notes and Documentation , 2002 .
[7] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[8] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Ibrahim S. I. Abuhaiba,et al. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks , 2012 .
[11] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..