Wormhole Attack Detection in Wireless Senor Networks
暂无分享,去创建一个
[1] A. Pirzada,et al. Circumventing Sinkholes and Wormholes in Wireless Sensor Networks , 2005 .
[2] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[3] A. Habib,et al. Sensor network security issues at network layer , 2008, 2008 2nd International Conference on Advances in Space Technologies.
[4] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[5] Abdul Hanan Abdullah,et al. Enhanced trust aware routing against wormhole attacks in wireless sensor networks , 2015, 2015 International Conference on Smart Sensors and Application (ICSSA).
[6] Khaled Elleithy,et al. Prevention of Wormhole Attacks in Wireless Sensor Networks , 2014, 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation.
[7] Akshya Swain,et al. Wireless Sensor Network attacks: An overview and critical analysis , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).
[8] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[9] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Aung Htein Maw,et al. Wormhole Attack Detection in Wireless Sensor Networks , 2008 .
[11] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[12] Safiqul Islam,et al. Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .
[13] Mohammed Feham,et al. Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).
[14] Haitao Zhang,et al. A review of wireless sensor networks and its applications , 2012, 2012 IEEE International Conference on Automation and Logistics.
[15] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[16] Azzedine Boukerche,et al. Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.
[17] Mosmi Tiwari,et al. Study of Wormhole Attack in Wireless Sensor Networks , 2015 .
[18] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[19] Yunhao Liu,et al. WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[20] Lukman Sharif,et al. The Wormhole Routing Attack in Wireless Sensor Networks (WSN) , 2010, J. Inf. Process. Syst..
[21] Xiaojiang Du,et al. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[22] Anuj K. Gupta,et al. A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks , 2014 .
[23] El Kaissi,et al. DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi , 2005 .