Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
暂无分享,去创建一个
Francesco Buccafurri | Gianluca Lax | Antonino Nocera | Luigi Coppolino | Salvatore D'Antonio | Luigi Romano | Alessia Garofalo
[1] Luigi Coppolino,et al. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[2] Luigi Coppolino,et al. Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[3] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[4] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Michael Rovatsos,et al. Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..
[6] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[7] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[8] Min Wei,et al. Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks , 2014, The International Conference on Information Networking 2014 (ICOIN2014).
[9] Jie Wu,et al. Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.
[10] Andrea Bondavalli,et al. A hidden Markov model based intrusion detection system for wireless sensor networks , 2012, Int. J. Crit. Comput. Based Syst..
[11] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[12] Uthman A. Baroudi,et al. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..
[13] Luigi Coppolino,et al. A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures , 2012, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering.
[14] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[15] Andrea Bondavalli,et al. Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[16] Mohamed Eltoweissy,et al. μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[17] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[18] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.