Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
暂无分享,去创建一个
[1] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[2] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[3] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[4] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[5] I. Sumaiya Thaseen,et al. A hybrid anomaly detection model using G-LDA , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[6] Aline Carneiro Viana,et al. Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.
[7] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[8] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[9] Marimuthu Palaniswami,et al. Hyperspherical cluster based distributed anomaly detection in wireless sensor networks , 2014, J. Parallel Distributed Comput..
[10] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[11] Min Song,et al. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[12] Mohsen Guizani,et al. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.
[13] Roberto Grossi,et al. On computing the diameter of real-world undirected graphs , 2013, Theor. Comput. Sci..
[14] Ashok Kumar Das. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks , 2009, 2009 First International Communication Systems and Networks and Workshops.
[15] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[16] Ashok Kumar Das. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.
[17] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[18] Ilkyeun Ra,et al. Performance study of ad hoc routing protocols with gossip-based approach , 2009, SpringSim '09.
[19] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[20] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[21] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[22] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[23] Yunhao Liu,et al. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications , 2015, IEEE/ACM Transactions on Networking.
[24] Cigdem Sengul,et al. A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis , 2012, Comput. Commun..
[25] Jitender S. Deogun,et al. Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks , 2009, Wirel. Networks.
[26] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[27] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[28] G. A. Vijayalakshmi Pai,et al. Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks , 2014, Appl. Soft Comput..
[29] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[30] Dharma P. Agrawal,et al. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[31] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[32] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[33] Liu Qiang,et al. Detection and defence of Sinkhole attack in Wireless Sensor Network , 2012 .
[34] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[35] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[36] Noël Crespi,et al. Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks , 2015, Comput. Networks.
[37] Kotagiri Ramamohanarao,et al. Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.
[38] M.F.A. Rasid,et al. Low Energy Consumption MAC Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[39] Vijay Laxmi,et al. Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.
[40] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[41] Ashok Kumar Das,et al. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks , 2015, Secur. Commun. Networks.
[42] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[43] Ashok Kumar Das. An efficient random key distribution scheme for large-scale distributed sensor networks , 2011, Secur. Commun. Networks.
[44] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[45] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[46] Avita Katal,et al. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network , 2013, 2013 International Conference on Communication and Signal Processing.
[47] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[48] Mukesh Singhal,et al. Security in wireless sensor networks: Research Articles , 2008 .
[49] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[50] Yasir Saleem,et al. Network Simulator NS-2 , 2015 .
[51] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[52] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[53] Reza Rafeh,et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..
[54] Shu-Chin Wang,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..
[55] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[56] Lidong Zhai,et al. Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks , 2014, ITQM.
[57] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.