Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
19
Page No.
3687 - 3692
Performance of Security Algorithm Against Malicious Nodes
Based Wireless Sensor Network
Authors :
D. Hemanand
and
N. Sankar Ram
References
Biswas, K. and M.L. Ali, 2007. Security threats in mobile Ad hoc network. Master's Thesis, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.
Karlof, C., N. Sastry and D. Wagner, 2004. TinySec: A link layer security architecture for wireless sensor networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, November 3-5, 2004, Baltimore, MD., USA., pp: 162-175.
Krontiris, I., T. Dimitriou, T. and M. Mpasoukos, 2007. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks. Miroslaw, K., J. Cichon and K. Przemyslaw (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-77870-7, pp: 150-161.
Lu, S., L. Li, K.Y. Lam and L. Jia, 2009. SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of the International Conference on Computational Intelligence and Security, Volume 2, December 11-14, 2009, Beijing, China, pp: 421-425.
Mahajan, V., M. Natu and A. Sethi, 2008. Analysis of wormhole intrusion attacks in MANETS. Proceedings of the IEEE Conference on Military Communications MILCOM-2008, November 16-19, 2008, IEEE, Newark, Delaware, ISBN:978-1-4244-2676-8, pp: 1-7.
Papadimitratos, P. and Z.J. Haas, 2003. Secure message transmission in mobile ad hoc networks. Ad Hoc Netw., 1: 193-209.
Direct Link | Sheela, D., V.R. Srividhya, B. Asma, Anjali and G.M. Chidanand, 2012. Detecting black hole attack in wireless sensor network sing mobile agent. Proceedings of International Conference on Artificial Intelligence and Embedded Systems, July 15-16, 2012, AMC Engineering College, Bangalore, India, pp: 45-48.
Traynor, P., H. Choi, G. Cao, S. Zhu and T. Porta, 2006. Establishing pair-wise keys in heterogeneous sensor networks. Proceedings of the 25th IEEE International Conference on Computer Communications, April 23-29, 2006, Barcelona, Spain, pp: 1-12.
Xing, K., S.S.R. Srinivasan, M. Jose, J. Li and X. Cheng, 2010. Attacks and Countermeasures in Sensor Networks: A Survey. In: Network Security, Scott, C.H.H., D. MacCallum and Z.D. Ding (Eds.). Springer, Berlin, Germany, ISBN:978-0-387-73820-8, pp: 251-272.