Attacks and Countermeasures in Sensor Networks: A Survey
暂无分享,去创建一个
Jiang Li | Xiuzhen Cheng | Kai Xing | Shyaam Sundhar Rajamadam Srinivasan | Major Jose “Manny” Rivera | Xiuzhen Cheng | Jiang Li | Kai Xing | S. Srinivasan
[1] Aifeng Ren,et al. Directional virtual carrier sensing for directional antennas in mobile ad hoc networks , 2002, MobiHoc '02.
[2] Deborah Estrin,et al. Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[4] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[5] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[6] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[7] TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS , 2004 .
[8] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[9] Saurabh Ganeriwal,et al. On Cheating in CSMA/CA Ad Hoc Networks , 2004 .
[10] Hannes Hartenstein,et al. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.
[11] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[12] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[13] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[14] Cristina Nita-Rotaru,et al. Synchronization Attacks Against 802 . 11 , 2004 .
[15] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[16] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[17] Fang Liu,et al. A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[18] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[19] Xiuzhen Cheng,et al. Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[20] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[21] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[22] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[23] Jessica Staddon,et al. Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.
[24] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[25] Yong Pei,et al. On the capacity improvement of ad hoc wireless networks using directional antennas , 2003, MobiHoc '03.
[26] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[27] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[28] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[29] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[30] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[31] Matthew K. Franklin,et al. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.
[32] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[33] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[34] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[35] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[36] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[37] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[38] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[39] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[40] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[41] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[42] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[43] M. Weber,et al. Sensors for Detection of Misbehaving Nodes in MANETs , 2004, PIK Prax. Informationsverarbeitung Kommun..
[44] Ram Ramanathan,et al. On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc '01.
[45] Nitin H. Vaidya,et al. Using directional antennas for medium access control in ad hoc networks , 2002, MobiCom '02.
[46] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[47] Deborah Estrin,et al. Energy conservation by adaptive clustering for ad-hoc networks , 2002 .
[48] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[49] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[50] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[51] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[52] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[53] Guang Gong,et al. Models of Authentications in Ad Hoc Networks and Their Related Network Properties , 2004 .
[54] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[55] Deborah Estrin,et al. An Empirical Study of Epidemic Algorithms in Large Scale Multihop Wireless Networks , 2002 .
[56] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[57] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[58] Jim Binkley,et al. Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.
[59] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[60] Deborah Estrin,et al. Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks , 2000 .
[61] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.