Energy trust system for detecting sybil attack in clustered wireless sensor networks
暂无分享,去创建一个
[1] Chunling Cheng,et al. An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[2] K Abirami.,et al. Sybil attack in Wireless Sensor Network , 2013 .
[3] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[4] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[5] B. R. Badrinath,et al. The distinctive design characteristic of a wireless sensor network: the energy map , 2004, Computer Communications.
[6] Karen Hsu karenhsu. Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks , 2007 .
[7] S. Karthik,et al. Trust management techniques in Wireless Sensor Networks: An evaluation , 2011, 2011 International Conference on Communications and Signal Processing.
[8] Zhou Su,et al. Weighted trust evaluation-based malicious node detection for wireless sensor networks , 2009, Int. J. Inf. Comput. Secur..
[9] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[10] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[11] Catherine Rosenberg,et al. Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[12] Siwei Peng. An Id-based Multiple Authentication scheme against attacks in wireless sensor networks , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[13] 李辉,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[14] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[15] Geng Yang,et al. Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[16] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[17] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[18] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.