Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
暂无分享,去创建一个
[1] Jean Frédéric Myoupo,et al. Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure , 2013, Int. J. Netw. Secur..
[2] Aziz Mohaisen,et al. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks , 2009, Int. J. Netw. Secur..
[3] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[4] Yen-Ping Chu,et al. An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[7] Liang-Min Wang,et al. Node-failure Tolerance of Topology in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[8] Jyoteesh Malhotra,et al. Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .
[9] Mohammed Feham,et al. Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks , 2014, Int. J. Netw. Secur..
[10] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Ashok K. Turuk,et al. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[12] Niki Pissinou,et al. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..
[13] Jianxin Wang,et al. Robust two-factor authentication and key agreement preserving user privacy , 2014 .
[14] Ashok Kumar Das. An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[15] R. B. Patel,et al. A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks , 2013, Int. J. Netw. Secur..
[16] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[17] Jun-won Ho. Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .
[18] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[19] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[20] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[21] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[22] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[23] Jianxin Wang,et al. A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks , 2014, Int. J. Netw. Secur..
[24] Chun-Ta Li,et al. Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..
[25] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[26] Falko Dressler. Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[27] Yang Xiang,et al. Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.
[28] B. Sathish Babu,et al. Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..
[29] Afrand Agah,et al. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..
[30] Hamdy S. Soliman,et al. Application of synchronous dynamic encryption system (SDES) in wireless sensor networks , 2005, PE-WASUN '05.
[31] Soumya Sara Koshy,et al. Zone Based Node Replica Detection in Wireless Sensor Network Using Trust , 2013 .
[32] Dulal Kar,et al. MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks , 2013, Int. J. Netw. Secur..
[33] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[34] Ashok Kumar Das. Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks , 2012, Int. J. Netw. Secur..
[35] Chun-Ta Li,et al. A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..
[36] Guang Gong,et al. Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[37] Ming Zhang,et al. Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[38] Jayaprakash Kar,et al. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network , 2014, Int. J. Netw. Secur..