An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN
暂无分享,去创建一个
Daladier Jabba | Paul Sanmartin | Javier Gómez | Karen Ávila | D. Jabba | P. Sanmartín | Javier Gomez | K. Ávila
[1] SheQiang Peng,et al. Security Technology Analysis of IOT , 2012 .
[2] Yu Liu,et al. eBPlatform: An IoT-based system for NCD patients homecare in China , 2014, 2014 IEEE Global Communications Conference.
[3] Muhammad Khurram Khan,et al. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.
[4] Avijit Mathur,et al. Medical WSN: Defense for selective forwarding attack , 2015, 2015 9th International Conference on Sensing Technology (ICST).
[5] V. Loscri,et al. A two-levels hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH) , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[6] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[7] Ashish D. Patel,et al. A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).
[8] Chaitali Biswas Dutta,et al. Intrusion Detection System for Power-Aware OLSR , 2015, 2015 International Conference on Computational Intelligence and Networks.
[9] Anal Patel,et al. Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[10] Drago Zagar,et al. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks , 2016, J. Sensors.
[11] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[12] A. Umamakeswari,et al. InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[13] A. Govardhan,et al. Sybil attack detection technique using session key certificate in vehicular ad hoc networks , 2017, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET).
[14] Sandeep Kumar Gupta,et al. Performance analysis of detection technique for select forwarding attack on WSN , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).
[15] Antoine B. Bagula,et al. Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things , 2016, Sensors.
[16] Wei Shi,et al. A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network , 2015, KSII Trans. Internet Inf. Syst..
[17] Abdul Hanan Abdullah,et al. Enhanced trust aware routing against wormhole attacks in wireless sensor networks , 2015, 2015 International Conference on Smart Sensors and Application (ICSSA).
[18] Manash Jyoti Deka,et al. SEED: Secure and energy efficient data transmission in Wireless Sensor Networks , 2016, 2016 4th International Conference on Information and Communication Technology (ICoICT).
[19] G. Reni,et al. Active monitoring insole: A wearable device for monitoring foot load distribution in home-care context , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[20] Jian Su,et al. A Novel Multi-Hop Distance-Bounding Protocol Used in Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[21] Shifei Ding,et al. Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN , 2015, Int. J. Distributed Sens. Networks.
[22] Ahmed Bouridane,et al. RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[23] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[24] Upendra Singh,et al. New approach through detection and prevention of wormhole attack in MANET , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).
[25] S. Lavanya,et al. Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission , 2016, Wirel. Pers. Commun..
[26] Hui Wu,et al. Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[27] Sungho Choi,et al. Selection of Shear Horizontal Wave Transducers for Robotic Nondestructive Inspection in Harsh Environments , 2017, Sensors.
[28] Gresa Shala,et al. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks , 2018, Future Internet.
[29] S. C. Mukhopadhyay,et al. Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET , 2016, 2016 10th International Conference on Sensing Technology (ICST).
[30] Yue Liu,et al. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.
[31] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[32] Vikas Solanke,et al. Wireless sensor network security threats , 2013, ARTCom 2013.
[33] Ali A. Pouyan,et al. Sybil attack detection using a low cost short group signature in VANET , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[34] Jeevaa Katiravan,et al. A Two level Detection of Routing Layer Attacks in Hierarchical Wireless Sensor Networks using Learning based Energy Prediction , 2015, KSII Trans. Internet Inf. Syst..
[35] Ashok Kumar Das,et al. An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[36] Yaser Jararweh,et al. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[37] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[38] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[39] Sudipta Roy,et al. A New Hybrid Algorithm to Eliminate Wormhole Attack in Wireless Mesh Networks , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[40] Sangeeta Sharma,et al. Detection & Prevention of Sybil attack in Ad hoc network using hybrid MAP & MAC technique , 2016, 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC).
[41] Priya Pathak,et al. Movement based or neighbor based tehnique for preventing wormhole attack in MANET , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[42] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[43] Gongxuan Zhang,et al. A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.
[44] Karim Faez,et al. A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.
[45] Shashank Kapoor,et al. Interactive intellegent shopping cart using RFID and ZIGBEE modules , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[46] Elmer V. Bernstam,et al. Social support in an Internet weight loss community , 2010, Int. J. Medical Informatics.
[47] Mario Gerla,et al. INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[48] Sipra Das Bit,et al. LoENA: Low-overhead encryption based node authentication in WSN , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[49] Yezid Donoso,et al. Energy Optimization in Mobile Wireless Sensor Networks with Mobile Targets Achieving Efficient Coverage for Critical Applications , 2013, Int. J. Comput. Commun. Control.
[50] Jayashree Agarkhed,et al. QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).
[51] K. Nirmal Raja,et al. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack , 2017, Journal of Medical Systems.
[52] P. Mohan Kumar,et al. Security protocols in WSN: A survey , 2017, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).
[53] Uma Rathore Bhatt,et al. DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .
[54] Abdelhamid Mellouk,et al. Secure Routing in Cluster-Based Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[55] Ramesh Karri,et al. Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.
[56] Parma Nand,et al. Secure message broadcasting in VANET over Wormhole attack by using cryptographic technique , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[57] Brijendra Kumar Joshi,et al. A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[58] Meng Joo Er,et al. Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[59] Daladier Jabba Molinares,et al. Internet de las cosas y la salud centrada en el hogar , 2016 .
[60] G. Padmavathi,et al. Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .
[61] Daladier Jabba,et al. Sigma Routing Metric for RPL Protocol , 2018, Sensors.
[62] K J Calfas,et al. Design and implementation of a randomized controlled social and mobile weight loss trial for young adults (project SMART). , 2014, Contemporary clinical trials.
[63] Andreas Pitsillides,et al. WSN operability during persistent attack execution , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[64] Ranjeet Kaur,et al. Isolation of Sybil attack in VANET using neighboring information , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[65] Sunho Lim,et al. Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[66] D. Vakula,et al. Low cost smart parking system for smart cities , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).
[67] Kumbesan Sandrasegaran,et al. A location-based smart shopping system with IoT technology , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[68] Thienne Johnson,et al. Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[69] Katina Michael,et al. Connected: To Everyone and Everything [Guest Editorial: Special Section on Sensors] , 2013, IEEE Technol. Soc. Mag..
[70] Chungui Liu,et al. Community Medical Network (CMN): Architecture and implementation , 2011, 2011 Global Mobile Congress.
[71] Khaled M. Elleithy,et al. Selective forwarding detection (SFD) in wireless sensor networks , 2015, 2015 Long Island Systems, Applications and Technology.
[72] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.
[73] Leila Ben Saad,et al. An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[74] Shikha Sharma,et al. A defensive timestamp approach to detect and mitigate the Sybil attack in vanet , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
[75] Jaime Lloret Mauri,et al. QoS Based Cooperative Communications and Security Mechanisms for Ad Hoc Sensor Networks , 2017, J. Sensors.
[76] R. K. Gnanamurthy,et al. Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..
[77] Mehmet A. Orgun,et al. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks , 2016, Sensors.
[78] P. Deepa Shenoy,et al. CMNTS: Catching malicious nodes with trust support in wireless sensor networks , 2016, 2016 IEEE Region 10 Symposium (TENSYMP).
[79] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[80] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[81] Kashif Saleem,et al. Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink , 2015, 2015 12th International Conference on Information Technology - New Generations.
[82] Pengfei Li,et al. A sybil attack detection scheme for privacy-preserving mobile social networks , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).
[83] Fan Wu,et al. Challenges of wireless sensor networks for Internet of thing applications , 2016, Int. J. Distributed Sens. Networks.
[84] Mehmet A. Orgun,et al. Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..
[85] Ashok Kumar Das,et al. A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[86] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[87] Li Yi,et al. The Research of Security Threat and Corresponding Defense Strategy for WSN , 2015, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation.
[88] Mohammad S. Obaidat,et al. Wormhole prevention using COTA mechanism in position based environment over MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).
[89] Zoe L. Jiang,et al. Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[90] Hai Zhou,et al. A Security Mechanism for Cluster-Based WSN against Selective Forwarding , 2016, Sensors.
[91] Mahalakshmi Gunasekaran,et al. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.
[92] Yu Jiang,et al. Sensor attack detection using history based pairwise inconsistency , 2018, Future Gener. Comput. Syst..
[93] Fazirulhisyam Hashim,et al. Energy trust system for detecting sybil attack in clustered wireless sensor networks , 2015, 2015 IEEE 12th Malaysia International Conference on Communications (MICC).
[94] Babangida Abubakar,et al. Customary homes to smart homes using Internet of Things (IoT) and mobile application , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[95] F. Beltrame. Worldwide emergency telemedicine services: the R&D EU projects perspective , 1997, Information Technology Applications in Biomedicine. ITAB '97. Proceedings of the IEEE Engineering in Medicine and Biology Society Region 8 International Conference.
[96] Avijit Mathur,et al. Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[97] David M. Eyers,et al. Helping secure robots in WSN environments by monitoring WSN software updates for intrusions , 2015, 2015 6th International Conference on Automation, Robotics and Applications (ICARA).
[98] Umamakeswari Arumugam,et al. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.
[99] Joan Costa-i-Font,et al. Social networking for medical information: A digital divide or a trust inquiry? , 2013 .
[100] Venkatesh Kannan,et al. A Resource Perspective to Wireless Sensor Network Security , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[101] Puja Padiya,et al. Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[102] Chaodit Aswakul,et al. SybilComm: Sybil community detection using persuading function in IoT system , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).
[103] Mahmoud Naghshineh,et al. Conserving transmission power in wireless ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[104] Zhibo Pang,et al. Intelligent packaging and intelligent medicine box for medication management towards the Internet-of-Things , 2014, 16th International Conference on Advanced Communication Technology.
[105] Setiadi Yazid,et al. Mitigation strategy of sinkhole attack in Wireless Sensor Network , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).
[106] Zhao Ju,et al. Analysis on Internet of Things (IOT) Based on the "Subway Supermarket" E-commerce Mode of TESCO , 2011, 2011 International Conference on Information Management, Innovation Management and Industrial Engineering.
[107] Muhammad Yousaf,et al. Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.
[108] Aduwati Sali,et al. Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..
[109] Choong Seon Hong,et al. Human Behavior Analysis by Means of Multimodal Context Mining , 2016, Sensors.
[110] Roopesh Jenu,et al. IoT middleware for smart city: (An integrated and centrally managed IoT middleware for smart city) , 2017, 2017 IEEE Region 10 Symposium (TENSYMP).
[111] Leena Ragha,et al. AODV based secure routing algorithm against Sinkhole attack in wirelesses Sensor Networks , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[112] Daladier Jabba,et al. Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare , 2017, Sensors.
[113] Swati Bhagat,et al. A detection and prevention of wormhole attack in homogeneous Wireless sensor Network , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[114] Lei Wang,et al. Defense Technology of Wormhole Attacks Based on Node Connectivity , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).
[115] J. Jithish,et al. Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[116] D. Hailey,et al. Systematic review of evidence for the benefits of telemedicine , 2002, Journal of telemedicine and telecare.
[117] Manpreet Kaur,et al. Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).
[118] Samaneh Rashidibajgan. A trust structure for detection of sybil attacks in opportunistic networks , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[119] Sushil Kumar Saroj,et al. Sybil attack prevention and detection in vehicular ad hoc network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[120] Yuan Zhang,et al. Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN , 2016 .
[121] Zhibo Pang,et al. Technologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being , 2013 .
[122] Wei Dong,et al. Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.
[123] Muhammad Bilal,et al. An Authentication Protocol for Future Sensor Networks , 2017, Sensors.
[124] Aníbal Ollero,et al. Small UAS-Based Wind Feature Identification System Part 1: Integration and Validation , 2017, Sensors.
[125] S. Renuga Devi,et al. A low cost IoT based crowd management system for public transport , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).
[126] Avijit Mathur,et al. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.
[127] Avijit Mathur,et al. Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).
[128] Anastasios A. Economides,et al. EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).
[129] Dong-Sun Kim,et al. Moving Object Detection on a Vehicle Mounted Back-Up Camera , 2015, Sensors.
[130] Wang Chao,et al. The Security Routing Research for WSN in the Application of Intelligent Transport System , 2006, 2006 International Conference on Mechatronics and Automation.
[131] Gisela Lanza,et al. Development and Application of Eddy Current Sensor Arrays for Process Integrated Inspection of Carbon Fibre Preforms , 2017, Sensors.
[132] Daladier Jabba,et al. Objective Function BF-ETX for RPL Routing Protocol , 2018, IEEE Latin America Transactions.
[133] I. Aas,et al. Telemedicine and Changes in the Distribution of Tasks between Levels of Care , 2002, Journal of telemedicine and telecare.
[134] Manish M. Patel,et al. Security attacks in wireless sensor networks: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[135] Shu-Yu Kuo,et al. A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[136] Devesh Kumar,et al. A mechanism of preventing sybil attack in MANET using bacterial foraging optimization , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).
[137] Vanita Mane,et al. Enhanced Vote Trust Algorithm for Sybil Detection , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).
[138] Chaitali Biswas Dutta,et al. Specification based IDS for camouflaging wormhole attack in OLSR , 2015, 2015 23rd Mediterranean Conference on Control and Automation (MED).
[139] Paolo Bonato,et al. Guest editorial: special section on smart wearable devices for human health and protection , 2010, IEEE Trans. Inf. Technol. Biomed..
[140] Anita Kanavalli,et al. STREE: A Secured Tree based Routing with Energy Efficiency in Wireless Sensor Network , 2015, 2015 International Conference on Computing and Communications Technologies (ICCCT).
[141] Xue Liu,et al. Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[142] Thinagaran Perumal,et al. IoT based activity recognition among smart home residents , 2017, 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE).
[143] Meysam Alavi,et al. A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks , 2016, 2016 Eighth International Conference on Information and Knowledge Technology (IKT).
[144] Hao Jiang,et al. A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).
[145] Muhammad Suryanegara,et al. On developing the model of Smart Logistic Transport in Indonesia , 2016, 2016 IEEE International Conference on Management of Innovation and Technology (ICMIT).
[146] Reena Nair,et al. Region authority based collaborative scheme to detect Sybil attacks in VANET , 2015, 2015 International Conference on Control Communication & Computing India (ICCC).