-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
10.1016/S1389-1286(01)00302-4
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393-422
-
(2002)
Comput Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
4243082091
-
Security in wireless sensor networks
-
10.1145/990680.990707
-
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53-57
-
(2004)
Commun ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
10.1016/S1570-8705(03)00008-8
-
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2):293-315
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
34248339107
-
Modeling adaptive node capture attacks in multi-hop wireless networks
-
10.1016/j.adhoc.2007.01.002
-
Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801-814
-
(2007)
Ad Hoc Netw
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
6
-
-
36048934000
-
Node compromise attacks and network connectivity
-
Chan K, Fekri F (2007) Node compromise attacks and network connectivity. Proc SPIE 6578:1-12
-
(2007)
Proc SPIE
, vol.6578
, pp. 1-12
-
-
Chan, K.1
Fekri, F.2
-
9
-
-
84887990248
-
A survey of black hole attacks in wireless mobile ad hoc networks
-
Fan-Hsun T, Li-Der C, Han-Chieh C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. J Converg. http://www.hcis-journal.com/ content/pdf/2192-1962-1-4.pdf
-
(2011)
J Converg
-
-
Fan-Hsun, T.1
Li-Der, C.2
Han-Chieh, C.3
-
11
-
-
84947273682
-
The sybil attack
-
10.1007/3-540-45748-8-24
-
Douceur J (2002) The sybil attack. In: Peer-to-peer systems, pp 251-260
-
(2002)
Peer-to-peer Systems
, pp. 251-260
-
-
Douceur, J.1
-
14
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
10.1109/MNET.2006.1637931
-
Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41-47
-
(2006)
IEEE Netw
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
15
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
10.1109/MPRV.2008.6
-
Raymond D, Midkiff S (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74-81
-
(2008)
IEEE Pervasive Comput
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.1
Midkiff, S.2
-
17
-
-
39049172951
-
Replication attack on random key pre-distribution schemes for wireless sensor networks
-
10.1016/j.comcom.2007.10.026
-
Fu H, Kawamura S, Zhang M, Zhang L (2008) Replication attack on random key pre-distribution schemes for wireless sensor networks. Comput Commun 31(4):842-857
-
(2008)
Comput Commun
, vol.31
, Issue.4
, pp. 842-857
-
-
Fu, H.1
Kawamura, S.2
Zhang, M.3
Zhang, L.4
-
18
-
-
84874676371
-
The replication attack in wireless sensor networks: Analysis and defenses
-
Manjula V, Chellappan C (2011) The replication attack in wireless sensor networks: analysis and defenses. Adv Netw Commun, 169-178
-
(2011)
Adv Netw Commun
, pp. 169-178
-
-
Manjula, V.1
Chellappan, C.2
-
23
-
-
79956200557
-
Unified modeling language based analysis of security attacks in wireless sensor networks: A survey
-
10.3837/tiis.2011.04.010
-
Hong S, Lim S, Song J (2011) Unified modeling language based analysis of security attacks in wireless sensor networks: a survey. KSII Trans Internet Inf Syst 5(5):805-821
-
(2011)
KSII Trans Internet Inf Syst
, vol.5
, Issue.5
, pp. 805-821
-
-
Hong, S.1
Lim, S.2
Song, J.3
-
28
-
-
67651048997
-
Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory
-
10.1145/1525856.1525861
-
De P, Liu Y, Das S (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw 5(3):1-33
-
(2009)
ACM Trans Sens Netw
, vol.5
, Issue.3
, pp. 1-33
-
-
De, P.1
Liu, Y.2
Das, S.3
-
30
-
-
79953816985
-
Increasing resiliency in multiphase wireless sensor networks: Generation wise key predistribution approach
-
10.1093/comjnl/bxq043
-
Ergun M, Levi A, Savas E (2011) Increasing resiliency in multiphase wireless sensor networks: generation wise key predistribution approach. Comput J 54(4):602-616
-
(2011)
Comput J
, vol.54
, Issue.4
, pp. 602-616
-
-
Ergun, M.1
Levi, A.2
Savas, E.3
-
35
-
-
67649198136
-
Evaluating the vulnerability of network traffic using joint security and routing analysis
-
10.1109/TDSC.2008.60
-
Tague P, Slater D, Rogers J, Poovendran R (2008) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Dependable Secure Comput 6(2):111-123
-
(2008)
IEEE Trans Dependable Secure Comput
, vol.6
, Issue.2
, pp. 111-123
-
-
Tague, P.1
Slater, D.2
Rogers, J.3
Poovendran, R.4
|