DoS Attacks on different Layers of WSN: A Review
暂无分享,去创建一个
[1] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[2] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[3] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[4] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[5] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[6] Philip LaRoche Campbell. A taxonomy of Denial of Service attacks. , 2003, S&P 2003.
[8] John A. Stankovic,et al. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.
[9] P. N. Barwal,et al. Wireless Sensor Networks : Security Issues , Challenges and Solutions , 2006 .
[10] D. Llewellyn-Jones,et al. Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks , 2006, 2006 First International Conference on Communications and Networking in China.
[11] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[12] Ahmad Alkhatib,et al. Wireless Sensor Network Architecture , 2012 .
[13] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[15] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[16] Seyed Ali Ghorashi,et al. Fuzzy C-Means Clustering-Based Jamming Detection Algorithm at Base Station , 2013 .
[17] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[18] K. Kifayat,et al. Group-Based Secure Communication for Large-Scale Wireless Sensor Networks , 2009 .
[19] S. Shankar Sastry,et al. A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.