暂无分享,去创建一个
[1] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[2] Shahriar Mohammadi,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Margo I. Seltzer,et al. Distributed, secure load balancing with skew, heterogeneity and churn , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Martina Zitterbart,et al. Security in Sensor Networks , 2010, it Inf. Technol..
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Deepali Virmani,et al. Reliability Analysis to overcome Black Hole Attack in Wireless Sensor Network , 2014, ArXiv.
[11] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[12] Virendra Pal Singh,et al. Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .
[13] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[14] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[15] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[16] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[17] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[18] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[19] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[20] Jie Wu,et al. A Survey of Sybil Attacks in Networks , 2013 .
[21] Patrick Lincoln,et al. TCP SYN Flooding Defense , 1999 .
[22] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[23] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[24] Yang Xiang,et al. The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures , 2012 .
[25] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[26] Saudi Arabia,et al. Denial of Service Attacks in Wireless Ad hoc Networks , 2010 .
[27] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[28] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[29] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.