Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN
暂无分享,去创建一个
[1] Anitha S Sastry,et al. Security Threats in Wireless Sensor Networks in Each Layer , 2013 .
[2] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[3] N. Alsharabi,et al. Wireless sensor networks misdirection attacker challenges and solutions , 2008, 2008 International Conference on Information and Automation.
[4] Sneha Kamble,et al. Reliable routing data aggregation using efficient clustering in WSN , 2016, 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[5] Omar Said,et al. Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments , 2015, EURASIP J. Wirel. Commun. Netw..
[6] Hyeong Seon Yoo,et al. On the Security Issues in Wireless Body Area Networks , 2009, J. Digit. Content Technol. its Appl..
[7] Kamalrulnizam Abu Bakar,et al. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..
[8] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[9] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[10] R. K. Gnanamurthy,et al. Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..
[11] Jing Lei,et al. Full-duplex relay for enhancing physical layer security in Wireless Sensor Networks: Optimal power allocation for minimizing secrecy outage probability , 2017, 2017 IEEE 17th International Conference on Communication Technology (ICCT).
[12] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.
[13] D. P. Singh,et al. Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).
[14] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[15] Vinodh P. Vijayan,et al. Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol , 2014 .
[16] Suparna Biswas,et al. A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network , 2015 .
[17] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.