Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6286 - 6290

Quality of Service and Angle Based Adversary Detection Scheme (QADS) for Wireless Sensor Networks

Authors : K. Sudhaman, M. Anand and M. Janakirani

References

Al-Riyami, A., N. Zhang and J. Keane, 2016. An adaptive early node compromise detection scheme for hierarchical WSNS. IEEE. Access, 4: 4183-4206.
CrossRef  |  Direct Link  |  

Atakli, I.M., H. Hu, Y. Chen, W.S. Ku and Z. Su, 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation. Proceedings of the Spring Simulation Multiconference, April 14-17, 2008, Ottawa, Canada, pp: 836-834.

Fu, F., J. Liu and X. Yin, 2007. Space-time related pairwise key predistribution scheme for wireless sensor networks. Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2007), September 21-25, 2007, IEEE, Shanghai, China, ISBN:1-4244-1311-7, pp: 2692-2696.

Ho, J.W., M. Wright and S.K. Das, 2008. Fast detection of node replication attacks in mobile sensor networks. Proceedings of the 16th IEEE International Conference on Network Protocols, October 19-22, 2008, IEEE, Orlando, Florida, USA., ISBN:978-1-4244-2506-8, pp: 308-317.

Mei, A. and J. Stefa, 2008. Routing in outer space: Fair traffic load in multi-hop wireless networks. Proceedings of the 9th ACM International Symposium on Mobile Ad-Hoc Networking and Computing, May 26-30, 2008, ACM, Hong Kong, China, pp: 23-32.

Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA., USA., pp: 49-63.

Song, H., L. Xie, S. Zhu and G. Cao, 2007. Sensor node compromise detection: The location perspective. Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing, August 12-16, 2007, ACM, Honolulu, Hawaii, ISBN:978-1-59593-695-0, pp: 242-247.

Xing, K., F. Liu, X. Cheng and D.H.C. Du, 2008. Real-time detection of clone attacks in wireless sensor networks. Proceedings of the 28th International Conference on a Distributed Computing System, June 17-20, 2008, Beijing, China, pp: 3-10.

Zhang, Q., T. Yu and P. Ning, 2008. A framework for identifying compromised nodes in wireless sensor networks. ACM Trans. Inform. Syst. Secur., Vol. 11 10.1145/1341731.1341733

Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Conference on Computer Security Applications, December 10-14, 2007, IEEE, Miami Beach, Florida, ISBN:0-7695-3060-5, pp: 257-267.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved