An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs
暂无分享,去创建一个
[1] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[2] Dimitrios Makrakis,et al. Distributed Compromised Nodes Detection Scheme at First Stage for SurvSec Security Architecture , 2012 .
[3] Yizhong Ma,et al. The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.
[4] Ying Yang. Time Synchronization in Wireless Sensor Networks:A Survey , 2012 .
[5] Xiaodong Lin,et al. CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[6] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[7] Kang G. Shin,et al. Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.
[8] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[9] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[10] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[11] Sumanth Yenduri,et al. Distributed first stage detection for node capture , 2010, 2010 IEEE Globecom Workshops.
[12] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[13] Levente Buttyán,et al. Private cluster head election in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[14] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[15] Haiguang Chen,et al. Task-based Trust Management for Wireless Sensor Networks , 2009 .
[16] William H. Sanders,et al. Cluster-based failure detection service for large-scale ad hoc wireless network applications , 2004, International Conference on Dependable Systems and Networks, 2004.
[17] Marimuthu Palaniswami,et al. Elliptical anomalies in wireless sensor networks , 2009, TOSN.
[18] Xing Zhang,et al. EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[19] Hossein Pedram,et al. A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents , 2009, 2009 International Conference on Computational Intelligence and Security.
[20] P. Venkata Krishna,et al. Energy efficient learning solution for intrusion detection in Wireless Sensor Networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[21] Kang G. Shin,et al. Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks , 2006, SecureComm.
[22] Sencun Zhu,et al. Sensor node compromise detection: the location perspective , 2007, IWCMC.
[23] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[24] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.
[25] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[26] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[27] Jonathan Timmis,et al. Bio-inspired Error Detection for Complex Systems , 2011, 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing.
[28] Yongdae Kim,et al. Remote Software-Based Attestation for Wireless Sensors , 2005, ESAS.
[29] Philip Levis,et al. Understanding the causes of packet delivery success and failure in dense wireless sensor networks , 2006, SenSys '06.
[30] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[31] Zhenghong Xiao,et al. An Anomaly Detection Scheme Based on Machine Learning for WSN , 2009, 2009 First International Conference on Information Science and Engineering.
[32] Vasos Vassiliou,et al. An Intrusion Detection System for Wireless Sensor Networks , 2017, 2017 24th International Conference on Telecommunications (ICT).
[33] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[34] Hyunsoo Yoon,et al. Trust Management for Resilient Wireless Sensor Networks , 2005, ICISC.
[35] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[36] Sencun Zhu,et al. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).