Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 19
Page No. 3687 - 3692

Performance of Security Algorithm Against Malicious Nodes Based Wireless Sensor Network

Authors : D. Hemanand and N. Sankar Ram

References

Biswas, K. and M.L. Ali, 2007. Security threats in mobile Ad hoc network. Master's Thesis, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.

Karlof, C., N. Sastry and D. Wagner, 2004. TinySec: A link layer security architecture for wireless sensor networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, November 3-5, 2004, Baltimore, MD., USA., pp: 162-175.

Krontiris, I., T. Dimitriou, T. and M. Mpasoukos, 2007. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks. Miroslaw, K., J. Cichon and K. Przemyslaw (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-77870-7, pp: 150-161.

Lu, S., L. Li, K.Y. Lam and L. Jia, 2009. SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of the International Conference on Computational Intelligence and Security, Volume 2, December 11-14, 2009, Beijing, China, pp: 421-425.

Mahajan, V., M. Natu and A. Sethi, 2008. Analysis of wormhole intrusion attacks in MANETS. Proceedings of the IEEE Conference on Military Communications MILCOM-2008, November 16-19, 2008, IEEE, Newark, Delaware, ISBN:978-1-4244-2676-8, pp: 1-7.

Papadimitratos, P. and Z.J. Haas, 2003. Secure message transmission in mobile ad hoc networks. Ad Hoc Netw., 1: 193-209.
Direct Link  |  

Sheela, D., V.R. Srividhya, B. Asma, Anjali and G.M. Chidanand, 2012. Detecting black hole attack in wireless sensor network sing mobile agent. Proceedings of International Conference on Artificial Intelligence and Embedded Systems, July 15-16, 2012, AMC Engineering College, Bangalore, India, pp: 45-48.

Traynor, P., H. Choi, G. Cao, S. Zhu and T. Porta, 2006. Establishing pair-wise keys in heterogeneous sensor networks. Proceedings of the 25th IEEE International Conference on Computer Communications, April 23-29, 2006, Barcelona, Spain, pp: 1-12.

Xing, K., S.S.R. Srinivasan, M. Jose, J. Li and X. Cheng, 2010. Attacks and Countermeasures in Sensor Networks: A Survey. In: Network Security, Scott, C.H.H., D. MacCallum and Z.D. Ding (Eds.). Springer, Berlin, Germany, ISBN:978-0-387-73820-8, pp: 251-272.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved