-
1
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
May
-
I. Butun, S. Morgera, and R. Sankar, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun. Surveys Tuts, vol. 16, no. 1, pp. 266-282, May 2014.
-
(2014)
IEEE Commun. Surveys Tuts
, vol.16
, Issue.1
, pp. 266-282
-
-
Butun, I.1
Morgera, S.2
Sankar, R.3
-
2
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec
-
Y. Zou, X. Wang, and W. Shen, Physical-layer security with multiuser scheduling in cognitive radio networks, IEEE Trans. Commun, vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
3
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
B. Xiao, B. Yu, and C. Gao, CHEMAS: Identify suspect nodes in selective forwarding attacks, J. Parallel Distrib. Comput, vol. 67, no. 11, pp. 1218-1230, 2007.
-
(2007)
J. Parallel Distrib. Comput
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
4
-
-
84978933144
-
AMD: Audit-based misbehavior detection in wireless ad hoc networks
-
Sep. to be published
-
Y. Zhang, L. Lazos, and W. Kozma, AMD: Audit-based misbehavior detection in wireless ad hoc networks, IEEE Trans. Mobile Comput., Sep. 2013, doi: 10.1109/TMC.2012.257, to be published
-
(2013)
IEEE Trans. Mobile Comput
-
-
Zhang, Y.1
Lazos, L.2
Kozma, W.3
-
5
-
-
54949103489
-
Functional reputation based reliable data aggregation, and transmission for wireless sensor networks
-
S. Ozdemir, Functional reputation based reliable data aggregation, and transmission for wireless sensor networks, Comput. Commun, vol. 31, no. 17, pp. 3941-3953, 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.17
, pp. 3941-3953
-
-
Ozdemir, S.1
-
6
-
-
84866738779
-
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks
-
D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks, Comput. Commun, vol. 35, no. 17, pp. 2125-2137, 2012.
-
(2012)
Comput. Commun
, vol.35
, Issue.17
, pp. 2125-2137
-
-
Hao, D.1
Liao, X.2
Adhikari, A.3
Sakurai, K.4
Yokoo, M.5
-
7
-
-
84891775418
-
Enabling trustworthy service evaluation in service-oriented mobile social networks
-
Feb
-
X. Liang, X. Lin, and X. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks, IEEE Trans. Parallel Distrib. Syst, vol. 25, no. 2, pp. 310-320, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.2
, pp. 310-320
-
-
Liang, X.1
Lin, X.2
Shen, X.3
-
8
-
-
84930081899
-
SACRM: Social aware crowdsourcing with reputation management in mobile sensing
-
J. Ren, Y. Zhang, K. Zhang, and X. Shen, SACRM: Social aware crowdsourcing with reputation management in mobile sensing, Comput. Commun, vol. 65, no. 15, pp. 55-65, 2015.
-
(2015)
Comput. Commun
, vol.65
, Issue.15
, pp. 55-65
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Shen, X.4
-
9
-
-
76349123136
-
Time series forecasting with multiple candidate models: Selecting or combining
-
L. Yu, S. Wang, K. Lai, and Y. Nakamori, Time series forecasting with multiple candidate models: Selecting or combining, J. Syst. Sci. Complexity, vol. 18, no. 1, pp. 1-18, 2005.
-
(2005)
J. Syst. Sci. Complexity
, vol.18
, Issue.1
, pp. 1-18
-
-
Yu, L.1
Wang, S.2
Lai, K.3
Nakamori, Y.4
-
10
-
-
84949922201
-
Exploiting channel-Aware reputation system against selective forwarding attacks in WSNs
-
J. Ren, Y. Zhang, K. Zhang, and X. Shen, Exploiting channel-Aware reputation system against selective forwarding attacks in WSNs, in Proc. IEEE GLOBECOM, 2014, pp. 330-335.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 330-335
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Shen, X.4
-
11
-
-
84857921036
-
Mitigating packet dropping problem in mobile ad hoc networks: Proposals, and challenges
-
Nov
-
S. Djahel, F. Nait-Abdesselam, and Z. Zhang, Mitigating packet dropping problem in mobile ad hoc networks: Proposals, and challenges, IEEE Commun. Surveys Tuts, vol. 13, no. 4, pp. 658-672, Nov. 2011.
-
(2011)
IEEE Commun. Surveys Tuts
, vol.13
, Issue.4
, pp. 658-672
-
-
Djahel, S.1
Nait-Abdesselam, F.2
Zhang, Z.3
-
12
-
-
33947624156
-
An acknowledgmentbased approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, An acknowledgmentbased approach for the detection of routing misbehavior in MANETs, IEEE Trans. Mobile Comput, vol. 6, no. 5, pp. 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Comput
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.3
Balakrishnan, K.4
-
13
-
-
80054815214
-
An integrated stimulation, and punishment mechanism for thwarting packet dropping attack in multihop wireless networks
-
Oct
-
E. Mahmoud, and X. Shen, An integrated stimulation, and punishment mechanism for thwarting packet dropping attack in multihop wireless networks, IEEE Trans. Veh. Technol, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
-
(2011)
IEEE Trans. Veh. Technol
, vol.60
, Issue.8
, pp. 3947-3962
-
-
Mahmoud, E.1
Shen, X.2
-
14
-
-
84868112157
-
EAACK-A secure intrusiondetection system for MANETs
-
Mar
-
E. Shakshuki, N. Kang, and T. Sheltami, EAACK-A secure intrusiondetection system for MANETs, IEEE Trans. Ind. Electron, vol. 60, no. 3, pp. 1089-1098, Mar. 2013.
-
(2013)
IEEE Trans. Ind. Electron
, vol.60
, Issue.3
, pp. 1089-1098
-
-
Shakshuki, E.1
Kang, N.2
Sheltami, T.3
-
15
-
-
84860678494
-
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing
-
T. Shu, and M. Krunz, Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing, in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec), 2012, pp. 87-98.
-
(2012)
Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec
, pp. 87-98
-
-
Shu, T.1
Krunz, M.2
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. ACM MobiCom, 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
17
-
-
80052176023
-
Side channel monitoring: Packet drop attack detection in wireless ad hoc networks
-
X. Li, R. Lu, X. Liang, and X. Shen, Side channel monitoring: Packet drop attack detection in wireless ad hoc networks, in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC
, pp. 1-5
-
-
Li, X.1
Lu, R.2
Liang, X.3
Shen, X.4
-
18
-
-
77952986444
-
Secure data collection in wireless sensor networks using randomized dispersive routes
-
Jul
-
T. Shu, M. Krunz, and S. Liu, Secure data collection in wireless sensor networks using randomized dispersive routes, IEEE Trans. Mobile Comput, vol. 9, no. 7, pp. 941-954, Jul. 2010.
-
(2010)
IEEE Trans. Mobile Comput
, vol.9
, Issue.7
, pp. 941-954
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
19
-
-
84866503616
-
Secure, and energyefficient disjoint multipath routing for WSNs
-
Sep
-
A. Liu, Z. Zheng, C. Zhang, Z. Chen, and X. Shen, Secure, and energyefficient disjoint multipath routing for WSNs, IEEE Trans. Veh. Technol, vol. 61, no. 7, pp. 3255-3265, Sep. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.7
, pp. 3255-3265
-
-
Liu, A.1
Zheng, Z.2
Zhang, C.3
Chen, Z.4
Shen, X.5
-
20
-
-
84907599734
-
Adaptive, and secure load-balancing routing protocol for service-oriented wireless sensor networks
-
Sep
-
S. Li, S. Zhao, X. Wang, K. Zhang, and L. Li, Adaptive, and secure load-balancing routing protocol for service-oriented wireless sensor networks, IEEE Syst. J, vol. 8, no. 3, pp. 858-867, Sep. 2014.
-
(2014)
IEEE Syst. J
, vol.8
, Issue.3
, pp. 858-867
-
-
Li, S.1
Zhao, S.2
Wang, X.3
Zhang, K.4
Li, L.5
-
21
-
-
77952255404
-
Mitigating selective forwarding attacks with a channel-Aware approach in WMNs
-
May
-
D. M. Shila, Y. Cheng, and T. Anjali, Mitigating selective forwarding attacks with a channel-Aware approach in WMNs, IEEE Trans. Wireless Commun, vol. 9, no. 5, pp. 1661-1675, May 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.5
, pp. 1661-1675
-
-
Shila, D.M.1
Cheng, Y.2
Anjali, T.3
-
22
-
-
84890127638
-
FADE: Forwarding assessment based detection of collaborative grey hole attacks inWMNs
-
Oct
-
Q. Liu, J. Yin, V. Leung, and Z. Cai, FADE: Forwarding assessment based detection of collaborative grey hole attacks inWMNs, IEEE Trans. Wireless Commun, vol. 12, no. 10, pp. 5124-5137, Oct. 2013.
-
(2013)
IEEE Trans. Wireless Commun
, vol.12
, Issue.10
, pp. 5124-5137
-
-
Liu, Q.1
Yin, J.2
Leung, V.3
Cai, Z.4
-
23
-
-
84925880386
-
Exploiting mobile crowdsourcing for pervasive cloud services: Challenges, and solutions
-
Mar
-
J. Ren, Y. Zhang, K. Zhang, and X. Shen, Exploiting mobile crowdsourcing for pervasive cloud services: Challenges, and solutions, IEEE Commun. Mag, vol. 53, no. 3, pp. 98-105, Mar. 2015.
-
(2015)
IEEE Commun. Mag
, vol.53
, Issue.3
, pp. 98-105
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Shen, X.4
-
24
-
-
84888341461
-
A survey of MANET intrusion detection & prevention approaches for network layer attacks
-
Mar
-
A. Nadeem, and M. P. Howarth, A survey of MANET intrusion detection & prevention approaches for network layer attacks, IEEE Commun. Surveys Tuts, vol. 15, no. 4, pp. 2027-2045, Mar. 2013.
-
(2013)
IEEE Commun. Surveys Tuts
, vol.15
, Issue.4
, pp. 2027-2045
-
-
Nadeem, A.1
Howarth, M.P.2
-
25
-
-
84930504473
-
Efficient trust based information sharing schemes over distributed collaborative networks
-
Sep
-
H. Lin, X. Zhu, Y. Fang, D. Xing, C. Zhang, and Z. Cao, Efficient trust based information sharing schemes over distributed collaborative networks, IEEE J. Sel. Areas Commun, vol. 31, no. 9, pp. 279-290, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 279-290
-
-
Lin, H.1
Zhu, X.2
Fang, Y.3
Xing, D.4
Zhang, C.5
Cao, Z.6
-
26
-
-
84894446893
-
Real-Time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach
-
Jan
-
J. Tang, Y. Cheng, and W. Zhuang, Real-Time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach, IEEE Trans. Mobile Comput, vol. 13, no. 1, pp. 146-158, Jan. 2014.
-
(2014)
IEEE Trans. Mobile Comput
, vol.13
, Issue.1
, pp. 146-158
-
-
Tang, J.1
Cheng, Y.2
Zhuang, W.3
-
27
-
-
84865016804
-
Radio link quality estimation in wireless sensor networks: A survey
-
N. Baccour, et al., Radio link quality estimation in wireless sensor networks: A survey, ACM Trans. Sens. Netw, vol. 8, no. 4, pp. 1-34, 2012.
-
(2012)
ACM Trans. Sens. Netw
, vol.8
, Issue.4
, pp. 1-34
-
-
Baccour, N.1
-
28
-
-
84893367596
-
Data-driven link quality prediction using link features
-
T. Liu, and A. E. Cerpa, Data-driven link quality prediction using link features, ACM Trans. Sensor Netw. (TOSN), vol. 10, no. 2, p. 37, 2014.
-
(2014)
ACM Trans. Sensor Netw. (TOSN
, vol.10
, Issue.2
, pp. 37
-
-
Liu, T.1
Cerpa, A.E.2
-
29
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Mar
-
G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Sel. Areas Commun, vol. 18, no. 3, pp. 535-547, Mar. 2000.
-
(2000)
IEEE J. Sel. Areas Commun
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
30
-
-
77952997379
-
-
IEEE Standard 802
-
IEEE Standard for Information Technology-Telecommunications, and Information Exchange between Systems-Local, and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC), and Physical Layer (PHY) Specifications, IEEE Standard 802, 2010, pp. 1-51.
-
(2010)
IEEE Standard for Information Technology-Telecommunications, and Information Exchange between Systems-Local, and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC), and Physical Layer (PHY) Specifications
, pp. 1-51
-
-
-
31
-
-
84861334371
-
Trust computations, and trust dynamics in mobile ad hoc networks: A survey
-
May
-
K. Govindan, and P. Mohapatra, Trust computations, and trust dynamics in mobile ad hoc networks: A survey, IEEE Commun. Surveys Tuts, vol. 14, no. 2, pp. 279-298, May 2012.
-
(2012)
IEEE Commun. Surveys Tuts
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
32
-
-
70350070568
-
Group-based trust management scheme for clustered wireless sensor networks
-
Nov
-
R. Shaikh, H. Jameel, B. d?Auriol, H. Lee, S. Lee, and Y.-J. Song, Group-based trust management scheme for clustered wireless sensor networks, IEEE Trans. Parallel Distrib. Syst, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst
, vol.20
, Issue.11
, pp. 1698-1712
-
-
Shaikh, R.1
Jameel, B.2
Dauriol, H.3
Lee, S.4
Lee, Y.-J.5
Song, H.6
-
33
-
-
84877297429
-
An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks
-
J. Ren, Y. Zhang, and K. Liu, An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks, Int. J. Distrib. Sensor Netw, vol. 2013, pp. 1-15, 2013.
-
(2013)
Int. J. Distrib. Sensor Netw
, vol.2013
, pp. 1-15
-
-
Ren, J.1
Zhang, Y.2
Liu, K.3
-
34
-
-
84963811324
-
Lifetime, and energy hole evolution analysis in data-gathering wireless sensor networks
-
to be published
-
J. Ren, Y. Zhang, K. Zhang, A. Liu, J. Chen, and X. Shen, Lifetime, and energy hole evolution analysis in data-gathering wireless sensor networks, IEEE Trans. Ind. Inf., doi: 10.1109/TII.2015.2411231, to be published
-
IEEE Trans. Ind. Inf
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Liu, A.4
Chen, J.5
Shen, X.6
|