Analysis and detection of Byzantine attack in wireless sensor network
暂无分享,去创建一个
[1] Christoforos Panayiotou,et al. A Survey on Routing Techniques Supporting Mobility in Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[2] N. Marriwala,et al. An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.
[3] Parminder Singh,et al. An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode , 2013 .
[4] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[5] Roopali Garg,et al. Enhanced lightweight sybil attack detection technique , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[6] Zhiyun Lin,et al. A geographically opportunistic routing protocol used in mobile wireless sensor networks , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.
[7] John Lane,et al. Prime: Byzantine Replication under Attack , 2011, IEEE Transactions on Dependable and Secure Computing.
[8] G. S. Mamatha,et al. Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .
[9] Ben Y. Zhao,et al. QUORUM—Quality of Service in Wireless Mesh Networks , 2007, Mob. Networks Appl..
[10] Somanath Tripathy,et al. WRSR: wormhole-resistant secure routing for wireless mesh networks , 2013, EURASIP J. Wirel. Commun. Netw..
[11] Devesh C. Jinwala,et al. MOSAODV: Solution to Secure AODV against Blackhole Attack , 2009 .
[12] Fei-Yue Wang,et al. Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[13] Parminder Singh. Comparative study between unicast and Multicast Routing Protocols in different data rates using vanet , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[14] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[15] Yan Zhang,et al. The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.
[16] Xuhui Chen,et al. Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.
[17] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[18] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[19] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.