Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks
暂无分享,去创建一个
[1] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[2] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[3] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Radha Poovendran,et al. Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] D. T. Lee,et al. Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[6] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[7] Radha Poovendran,et al. Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.
[8] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[9] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[10] Tomoyuki Ohta,et al. Secure decentralized data transfer against node capture attacks for wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[11] Yacine Challal,et al. Node capture attack impact on key management schemes for heterogeneous wireless sensor networks , 2009, 2009 Global Information Infrastructure Symposium.
[12] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[13] J. Medhi,et al. Stochastic Processes , 1982 .
[14] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[15] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[16] Song Guo,et al. A robust pair-wise rekeying protocol in hierarchical wireless sensor networks , 2009, Co-Next Student Workshop '09.
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] Sumanth Yenduri,et al. First stage detection of compromised nodes in sensor networks , 2010, 2010 IEEE Sensors Applications Symposium (SAS).
[19] Roberto Di Pietro,et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.
[20] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[21] Samuel Karlin,et al. A First Course on Stochastic Processes , 1968 .
[22] Sajal K. Das,et al. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.