- Home
- Publications
- Publication Search
- Publication Details
Title
Detecting Malicious Data Injections in Wireless Sensor Networks
Authors
Keywords
-
Journal
ACM COMPUTING SURVEYS
Volume 48, Issue 2, Pages 1-33
Publisher
Association for Computing Machinery (ACM)
Online
2015-10-14
DOI
10.1145/2818184
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
- (2015) Mohsen Rezvani et al. IEEE Transactions on Dependable and Secure Computing
- Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
- (2014) Sankardas Roy et al. IEEE Transactions on Information Forensics and Security
- Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues
- (2013) Murad Rassam et al. SENSORS
- Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
- (2012) Bo Sun et al. IEEE Systems Journal
- A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks
- (2012) Yan Sun et al. IEEE Transactions on Dependable and Secure Computing
- Statistics-based outlier detection for wireless sensor networks
- (2012) Y. Zhang et al. INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE
- Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
- (2012) Fenye Bao et al. IEEE Transactions on Network and Service Management
- Anomaly detection in wireless sensor networks: A survey
- (2011) Miao Xie et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Elliptical anomalies in wireless sensor networks
- (2010) Sutharshan Rajasegarar et al. ACM Transactions on Sensor Networks
- Sensor faults
- (2010) Abhishek B. Sharma et al. ACM Transactions on Sensor Networks
- Trust management systems for wireless sensor networks: Best practices
- (2010) Javier Lopez et al. COMPUTER COMMUNICATIONS
- Trust management in wireless sensor networks
- (2010) Theodore Zahariadis et al. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- Secure data aggregation in wireless sensor networks: A comprehensive overview
- (2009) Suat Ozdemir et al. Computer Networks
- Reputation-Enabled Self-Modification for Target Sensing in Wireless Sensor Networks
- (2009) Xue Wang et al. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
- Secure localization algorithms for wireless sensor networks
- (2008) A. Boukerche et al. IEEE COMMUNICATIONS MAGAZINE
- Anomaly detection in wireless sensor networks
- (2008) S. Rajasegarar et al. IEEE WIRELESS COMMUNICATIONS
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started