Preventing Black Hole Attack in Wireless Sensor Network Using HMM
暂无分享,去创建一个
Khalid Satori | Hassan Satori | Hassan Satori | Hanane Kalkha | K. Satori | H. Satori | Hanane Kalkha | Hassan Satori
[1] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[2] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[3] L. Hunt,et al. Energy Demand and Energy Efficiency in the OECD Countries: A Stochastic Demand Frontier Approach , 2011 .
[4] Chander Diwaker,et al. DETECTING BLACKHOLE ATTACK IN WSN BY CHECK AGENT USING MULTIPLE BASE STATIONS , 2013 .
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] Abderrahmane Baadache,et al. Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks , 2014, Comput. Networks.
[7] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[8] S. B. Dhonde,et al. A survey on security attacks in wireless sensor networks , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[9] Khalid Satori,et al. Performance Evaluation of AODV and LEACH Routing Protocol , 2016 .
[10] Andrew J. Viterbi,et al. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.
[11] J. Y. Yen. Finding the K Shortest Loopless Paths in a Network , 1971 .
[12] K. Mani Chandy,et al. Distributed computation on graphs: shortest path algorithms , 1982, CACM.
[13] K. Thilagam,et al. Modified AODV Protocol against Blackhole Attacks in MANET , 2010 .
[14] Khalid Satori,et al. A Dynamic Clustering Approach for Maximizing Scalability in Wireless Sensor Networ , 2017 .
[15] S. Eddy. Hidden Markov models. , 1996, Current opinion in structural biology.