Secure Minimum Time Data Collection (SMTDC) protocol for wireless sensor networks

[1]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[2]  Ying Chen,et al.  Multi-channel Data Collection for Throughput Maximization in Wireless Sensor Networks , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[3]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[4]  Klara Nahrstedt,et al.  Secure data collection in constrained tree-based Smart Grid environments , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[5]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[6]  Massimo Franceschetti,et al.  Lower bounds on data collection time in sensory networks , 2004, IEEE Journal on Selected Areas in Communications.

[7]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Wen-Zhan Song,et al.  Time-Optimum Packet Scheduling for Many-to-One Routing in Wireless Sensor Networks , 2006, MASS.

[9]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[10]  Tzung-Shi Chen,et al.  Adjustable convergecast tree protocol for wireless sensor networks , 2010, Comput. Commun..

[11]  Guohong Cao,et al.  Optimizing tree reconfiguration for mobile target tracking in sensor networks , 2004, IEEE INFOCOM 2004.

[12]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[14]  Richard Han,et al.  A node-centric load balancing algorithm for wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[15]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[16]  Michael Segal,et al.  Improved Lower Bounds for Data-Gathering Time in Sensor Networks , 2007, International Conference on Networking and Services (ICNS '07).

[17]  Klara Nahrstedt,et al.  SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[18]  Orhan Dagdeviren,et al.  Distributed Algorithms to Form Cluster Based Spanning Trees in Wireless Sensor Networks , 2008, ICCS.

[19]  Ju Wang,et al.  Scheduling for information gathering on sensor network , 2009, Wirel. Networks.

[20]  Jerome H. Saltzer,et al.  Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..

[21]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[22]  Kah Phooi Seng,et al.  Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..

[23]  Muddassar Farooq,et al.  Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions , 2011, Inf. Sci..

[24]  Bhaskar Krishnamachari,et al.  Fast Data Collection in Tree-Based Wireless Sensor Networks , 2012, IEEE Transactions on Mobile Computing.

[25]  A.P. Jayasumana,et al.  An enhanced top-down cluster and cluster tree formation algorithm for Wireless Sensor Networks , 2007, 2007 International Conference on Industrial and Information Systems.

[26]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[27]  Kok-Keong Loo,et al.  Denial of service attacks and challenges in broadband wireless networks , 2008 .

[28]  H. Schulzrinne,et al.  An IP traceback mechanism for reflective DoS attacks , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[29]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[30]  Hongke Zhang,et al.  Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks , 2011, IEEE Trans. Mob. Comput..

[31]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[32]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[33]  Bhaskar Krishnamachari,et al.  Routing without routes: the backpressure collection protocol , 2010, IPSN '10.