Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[3] Sotiris E. Nikoletseas,et al. A new random walk for efficient data collection in sensor networks , 2011, MobiWac '11.
[4] Albert Y. Zomaya,et al. A framework for real time communication in sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[5] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[6] Mohamad Naufal bin Mohamad Saad,et al. Detecting replicated nodes in Wireless Sensor Networks using random walks and network division , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[7] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Yang Xiang,et al. Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.
[11] Wazir Zada Khan,et al. Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[12] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[13] Mohamad Naufal bin Mohamad Saad,et al. Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks , 2013, Int. J. Grid Util. Comput..
[14] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[15] Jiannong Cao,et al. Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[16] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[18] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[19] Bhaskar Krishnamachari,et al. The power of choice in random walks: An empirical study , 2008, Comput. Networks.