Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks
暂无分享,去创建一个
Ghasem Farjamnia | Yusif Gasimov | Cavanshir Kazimov | Y. Gasimov | Ghasem Farjamnia | Cavanshir Kazimov
[1] Brijendra Kumar Joshi,et al. A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[2] Yskandar Hamam,et al. Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network , 2012, ANT/MobiWIS.
[3] Honglong Chen,et al. Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.
[4] K. Thangadurai,et al. Security in Wireless Sensor Networks (WSNs) and Their Applications , 2017 .
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] Manu Sood,et al. Survey on sybil attack defense mechanisms in wireless ad hoc networks , 2018, J. Netw. Comput. Appl..
[7] Anastasios A. Economides,et al. Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks , 2014, SecureComm.
[8] Honglong Chen,et al. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs , 2009, WASA.
[9] Yurong Xu,et al. Detecting Wormhole Attacks in Wireless Sensor Networks , 2007, Critical Infrastructure Protection.
[10] R. K. Gnanamurthy,et al. Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..
[11] Rajashekhar C. Biradar,et al. Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach , 2013 .
[12] Mohammed Feham,et al. Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).
[13] Yixian Yang,et al. A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .
[14] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[15] Salavat Marian,et al. Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme , 2015, 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics.
[16] Mariano García Otero,et al. Detection of wormhole attacks in wireless sensor networks using range-free localization , 2012, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[17] Aihua Xia,et al. Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..
[18] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[19] Devesh C. Jinwala,et al. Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.
[20] P. Venkata Krishna,et al. Mitigating denial of service attacks in hierarchical wireless sensor networks , 2011, Netw. Secur..
[21] Issa M. Khalil,et al. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.
[22] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[23] Y. Suresh Babu,et al. Wireless Network Topological Routing in Wireless Sensor Networks , 2016 .
[24] Divya Sai Keerthi Tiruvakadu,et al. Confirmation of wormhole attack in MANETs using honeypot , 2018 .
[25] Tassos Dimitriou,et al. Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.
[26] Xiong Li,et al. An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[27] Jie Cui,et al. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks , 2017, Peer-to-Peer Networking and Applications.
[28] Vijay Laxmi,et al. Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.
[29] Seung-Woo Seo,et al. WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.
[30] Shu-Yu Kuo,et al. A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[31] Yogesh Sharma,et al. Countermeasures for selective forwarding and wormhole attack in WSN , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[32] Yi Mu,et al. Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks , 2018, J. Inf. Secur. Appl..
[33] Manita Rajput,et al. Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol , 2016 .
[34] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[35] Akshai Aggarwal,et al. Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks , 2018 .
[36] Swarna Mahesh Naidu,et al. Handling Wormhole Attacks in WSNs Using Location Based Approach , 2017 .
[37] Bouabdellah Kechar,et al. A time Petri net model for wormhole attack detection in wireless sensor networks , 2013, 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT).
[38] Zhen Yu,et al. DAR: A dynamic anchor regrouping scheme for securing localization service against wormhole attacks in Wireless Sensor Networks , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).
[39] Guang-zhao Cui,et al. WAPN: a distributed wormhole attack detection approach for wireless sensor networks , 2009 .
[40] Reihaneh Safavi-Naini,et al. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.
[41] Makhlouf Aliouat,et al. Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks , 2011, DICTAP.
[42] Haofei Wang,et al. Distributed Detection Approach for Wormhole Attack in Wireless Sensor Networks , 2012 .
[43] Swati Bhagat,et al. A detection and prevention of wormhole attack in homogeneous Wireless sensor Network , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[44] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[45] Teddy Mantoro,et al. Mitigation of Wormhole Attack in Wireless Sensor Networks , 2012 .
[46] Snehal P. Dongare,et al. Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks , 2016 .
[47] Sanjay Kumar Madria,et al. SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.
[48] Changzhen Hu,et al. Defenses Against Wormhole Attacks in Wireless Sensor Networks , 2017, NSS.
[49] Dong Wang,et al. Security DV-hop localisation algorithm against wormhole attack in wireless sensor network , 2017, IET Wirel. Sens. Syst..
[50] Tarunpreet Bhatia,et al. Wormhole and Sybil attack in WSN: A review , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[51] Mukesh Kumar,et al. Detection of Wormhole Attack in Wireless Sensor Networks , 2016 .
[52] Ashish Patil,et al. Comparative Analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network , 2015 .
[53] Haiqing Jiang,et al. Tolerant Majority-Colluding Attacks for Secure Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[54] Shunfu Jin,et al. Non-saturated throughput analysis of IEEE 802.11-based cognitive radio networks , 2012 .
[55] Abdul Hanan Abdullah,et al. Enhanced trust aware routing against wormhole attacks in wireless sensor networks , 2015, 2015 International Conference on Smart Sensors and Application (ICSSA).