Improving security in WMNs with reputation systems and self-organizing maps
暂无分享,去创建一个
Pedro Malagón | José Manuel Moya | Juan-Mariano de Goyeneche | David Fraga | Álvaro Araujo | Javier Blesa | Elena Romero | Octavio Nieto-Taladriz | Daniel Villanueva | Zorana Bankovic | Juan Carlos Vallejo
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[3] Dorin Comaniciu,et al. Nonparametric information fusion for motion estimation , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[5] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[6] Indranil Saha,et al. Location Verification Based Defense Against Sybil Attack in Sensor Networks , 2006, ICDCN.
[7] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[8] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[10] Alberto Muñoz,et al. Self-organizing maps for outlier detection , 1998, Neurocomputing.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] Ashraf Saad,et al. Hybrid intelligent systems for network security , 2006, ACM-SE 44.
[13] Helge J. Ritter,et al. Neural recognition of human pointing gestures in real images , 1996, Neural Processing Letters.
[14] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[17] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[18] Roberto Di Pietro,et al. ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks , 2007, Ad Hoc Networks.
[19] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[20] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[21] M. Aupetit,et al. Function Approximation with Continuous Self-Organizing Maps using . . , 2000 .
[22] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[23] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[24] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[25] Samir R Das,et al. Ad hoc on-demand multipath distance vector routing , 2002, MOCO.
[26] Wensheng Zhang,et al. Securing distributed data storage and retrieval in sensor networks , 2007, Pervasive Mob. Comput..
[27] José Manuel Moya,et al. Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks , 2009, Sensors.
[28] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).