-
1
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor network
-
Butun I, Morgera S D and Sankar R 2013 A survey of intrusion detection systems in wireless sensor network. IEEE Commun. Surv. Tutor. 16(1): 266–282
-
(2013)
IEEE Commun. Surv. Tut.
, vol.16
, Issue.1
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
2
-
-
84880080728
-
An intrusion detection system for cluster based wireless sensor networks
-
Deng X, Wu R, Wang W and Bu R 2013 An intrusion detection system for cluster based wireless sensor networks. Inf. Technol. J. 12(9): 1764–1771
-
(2013)
Inf. Technol. J.
, vol.12
, Issue.9
, pp. 1764-1771
-
-
Deng, X.1
Wu, R.2
Wang, W.3
Bu, R.4
-
3
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Theodorakopoulos G and Baras J S 2006 On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 318–332
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 318-332
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
5
-
-
77955109536
-
A survey of attacks, security mechanisms, and challenges in wireless sensor networks
-
Padmavathi G and Shanmugapriya D 2009 A survey of attacks, security mechanisms, and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 4(1–2): 117–125
-
(2009)
Int. J. Comput. Sci. Inf. Technol.
, vol.4
, Issue.1-2
, pp. 117-125
-
-
Padmavathi, G.1
Shanmugapriya, D.2
-
6
-
-
27644509266
-
Intrusion detection systems and intrusion prevention systems
-
Fuchsberger A 2005 Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3): 134–139
-
(2005)
Inf. Secur. Tech. Rep.
, vol.10
, Issue.3
, pp. 134-139
-
-
Fuchsberger, A.1
-
7
-
-
84909606246
-
Security enhancements for mobile adhoc networks with trust management using uncertain reasoning
-
Wei Z, Tang H, Yu F R, Wang M and Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9): 4647–4658
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.9
, pp. 4647-4658
-
-
Wei, Z.1
Tang, H.2
Yu, F.R.3
Wang, M.4
Mason, P.5
-
8
-
-
84903954065
-
Strategy to reduce false alarms in intrusion detection and prevention systems
-
Qassim Q, Patel A and Mahd-Zin A 2014 Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500–506
-
(2014)
Int. Arab J. Inf. Technol.
, vol.11
, Issue.5
, pp. 500-506
-
-
Qassim, Q.1
Patel, A.2
Mahd-Zin, A.3
-
9
-
-
34548043694
-
Trust-based security for wireless ad-hoc and sensor networks
-
Boukerch A, Xu L and El-Khatib K 2007 Trust-based security for wireless ad-hoc and sensor networks. Comput. Commun. 30(11–12): 2413–2427
-
(2007)
Comput. Commun.
, vol.30
, Issue.11-12
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
11
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: attack analysis and countermeasures
-
Yu Y, Li K, Zhou W and Li P 2012 Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3): 867–880
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
12
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington
-
Ganeriwal S and Srivastava M B 2004 Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, USA, pp. 66–77
-
(2004)
USA
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
14
-
-
84863363838
-
Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering
-
Xiang G, Jianlin Q and Jin W 2012 Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering. Proc. Eng. 29: 909–913
-
(2012)
Proc. Eng.
, vol.29
, pp. 909-913
-
-
Xiang, G.1
Jianlin, Q.2
Jin, W.3
-
15
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
Bao F, Chen I R, Chang M and Cho J H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169–183
-
(2012)
IEEE Trans. Network Service Manage.
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
16
-
-
84905725635
-
Game theory model for intrusion detection in WSN using hierarchical trust management
-
Ram Prabha V and Latha P 2014 Game theory model for intrusion detection in WSN using hierarchical trust management. Int. Rev. Comput. Softw. 9(6): 1055–1064
-
(2014)
Int. Rev. Comput. Software
, vol.9
, Issue.6
, pp. 1055-1064
-
-
Ram Prabha, V.1
Latha, P.2
-
18
-
-
70349742570
-
Weighted trust calculation based malicious node detection for wireless sensor networks
-
Hu H and Chen Y 2009 Weighted trust calculation based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Secur. 3(2): 132–149
-
(2009)
Int. J. Inf. Comput. Security
, vol.3
, Issue.2
, pp. 132-149
-
-
Hu, H.1
Chen, Y.2
-
19
-
-
33845715578
-
Location verification and trust management for resilient geographic routing
-
Liu K, Abu-Ghazaleh N and Kang K D 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distrib. Comput. 67(2): 215–228
-
(2007)
J. Parallel Distributed Comput.
, vol.67
, Issue.2
, pp. 215-228
-
-
Liu, K.1
Abu-Ghazaleh, N.2
Kang, K.D.3
-
21
-
-
85014816886
-
-
Network Simulator
-
Network Simulator: http://www.isi.edu/nsnam
-
-
-
|