Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 7 SI
Page No. 5465 - 5467

Dempster Shafer Theory Using UWSN Attack Detection

Authors : S.Parthasarathy

References

Ahmed, M.R., X. Huang and H. Cui, 2013. Mrakov chain Monte Carlo based internal attack evaluation for wireless sensor network. Intl. J. Comput. Sci. Netw. Secur., 13: 18-23.
Direct Link  |  

Cui, J.H., K. Jiejun, M. Gerla and Z. Shengli, 2006. The challenges of building mobile UWSN for aquatic applications. IEEE. Netw., 20: 12-18.
CrossRef  |  Direct Link  |  

Da Silva, A.P.R., M.T.H. Martins, B.P.S. Rocha, A.A.F. Loureiro and L.B. Ruiz et al., 2005. Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, October 13, 2005, ACM Press, Montreal, Quebec, Canada, pp: 16-23.

Ganeshkumar, K., D. Arivazhagan and S. Rajkumar, 2016. An inception of DDoS attacks for popular websites-identifying on application-layer. Indian J. Sci. Technol., Vol. 9, 10.17485/ijst/2016/v9i47/108078

Karlof, C. and D. Wagner, 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1: 293-315.
CrossRef  |  Direct Link  |  

Khatua, M. and S. Misra, 2014. CURD: Controllable reactive jamming detection in underwater sensor networks. Pervasive Mobile Comput., 13: 203-220.
Direct Link  |  

Shanthi, H.J. and E.M. Anita, 2014. Performance analysis of black hole attacks in geographical routing MANET. Intl. J. Eng. Technol., 6: 2382-2387.
Direct Link  |  

Vennila, G., D. Arivazhagan and N. Manickasankari, 2014. Prevention of co-operative black hole attack in manet on DSR protocol using cryptographic algorithm. Intl. J. Eng. Technol., 6: 2401-2405.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved