Sensor Networks Attacks Classifications and Mitigation
暂无分享,去创建一个
[1] S. Dobson,et al. A Secure Lightweight Architecture for Wireless Sensor Networks , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[2] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[3] Vimal Kumar,et al. An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .
[4] José Manuel Moya,et al. Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps , 2011, CISIS.
[5] Sener Uysal,et al. Forest Fire Detection in Wireless Sensor Network Using Fuzzy Logic , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[6] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[7] Victoria J. Hodge,et al. Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey , 2015, IEEE Transactions on Intelligent Transportation Systems.
[8] Hui Liu,et al. Intrusion Detection System Based on Evolving Rules for Wireless Sensor Networks , 2018, J. Sensors.
[9] Firdaus,et al. Wireless Sensor Networks for microclimate telemonitoring using ZigBee and WiFi , 2014, 2014 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology.
[10] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[11] Brice Augustin,et al. Wireless Sensor Networks for medical care services , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[12] Devesh C. Jinwala,et al. Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.
[13] Subhashis Banerjee,et al. WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE , 2014 .
[14] Yasir Arfat Malkani,et al. Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).
[15] Kalpana Sharma,et al. Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.
[16] Victor C. M. Leung,et al. FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs , 2013, IEEE Transactions on Wireless Communications.
[17] Manyam Thaile,et al. Node Compromise Detection based on NodeTrust in Wireless Sensor Networks , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).
[18] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[19] Gil Goncalves,et al. Environmental Monitoring Services and wireless sensor networks applied on Urban spaces , 2010, 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR).
[20] Gianfranco Manes,et al. A real-time traffic monitoring based on wireless sensor network technologies , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[21] Matt Welsh,et al. Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[22] John S. Baras,et al. SECURITY IN MOBILE AD HOC AND SENSOR NETWORKS , .
[23] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[24] Devesh C. Jinwala,et al. Prevention of Wormhole Attack in Wireless Sensor Network , 2011, ArXiv.
[25] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[26] G EdwinPremKumar,et al. A Comprehensive Review on Reduction of MaliciousNodes in Clustered Wireless Sensor Networks UsingDifferent Trust Management Schemes , 2014 .
[27] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[28] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[29] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[30] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[31] Jean-Philippe Babau,et al. An Ontology for Attacks in Wireless Sensor Networks , 2007 .
[32] A. P. Renold,et al. Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.
[33] B. Umakanth,et al. Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks , 2013 .
[34] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[35] Yasir Arfat Malkani,et al. A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).
[36] Carlos E. Palau,et al. Quake detection system using smartphone-based wireless sensor network for early warning , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[37] Muhammad Yasir Malik. An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations , 2013, ArXiv.
[38] Ashwani Kumar,et al. A Survey in Energy Drain Attacks and Their Countermeasures in Wireless Sensor Networks , 2014 .
[39] A. Hiren Kumar Deva Sarma,et al. Secure Routing Protocol for Mobile Wireless Sensor Network , 2011, 2011 IEEE Sensors Applications Symposium.
[40] I. Chatzigiannakis,et al. Adaptive probabilistic secure routing in mobile wireless sensor networks , 2008, 2008 16th International Conference on Software, Telecommunications and Computer Networks.
[41] Wojciech Tylman. Misuse-Based Intrusion Detection Using Bayesian Networks , 2008, DepCoS-RELCOMEX.
[42] Shivashankar,et al. A review on security and privacy issues in wireless sensor networks , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[43] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[44] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[45] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[46] Yongping Zhang,et al. SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[47] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[48] Markus Jakobsson,et al. Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[49] Hoon Jae Lee,et al. A secure authentication protocol among mobile phone and wireless sensor networks , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[50] J. Anand,et al. Preserving national animal using wireless sensor network based hotspot algorithm , 2013, 2013 International Conference on Green High Performance Computing (ICGHPC).