RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
出版年份 2019 全文链接
标题
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
作者
关键词
-
出版物
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Volume -, Issue -, Pages e4024
出版商
Wiley
发表日期
2019-08-09
DOI
10.1002/dac.4024
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Edge Computing Architecture for Mobile Crowdsensing
- (2018) Martina Marjanovic et al. IEEE Access
- Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
- (2017) Sravani Challa et al. IEEE Access
- Cloud Security Engineering: Theory, Practice and Future Research
- (2017) Kim-Kwang Raymond Choo et al. IEEE Transactions on Cloud Computing
- Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective
- (2017) Christian Esposito et al. IEEE Cloud Computing
- Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing
- (2016) Amit Sheth IEEE INTELLIGENT SYSTEMS
- Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
- (2016) Mohammad Wazid et al. Security and Communication Networks
- A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
- (2016) Mohammad Wazid et al. WIRELESS PERSONAL COMMUNICATIONS
- An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
- (2016) Mohammad Wazid et al. WIRELESS PERSONAL COMMUNICATIONS
- Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks
- (2015) Soochang Park et al. Computer Networks
- On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
- (2015) Jiliang Wang et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
- (2015) Ashok Kumar Das INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
- (2015) Ashok Kumar Das WIRELESS PERSONAL COMMUNICATIONS
- An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
- (2014) Santanu Chatterjee et al. Security and Communication Networks
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
- (2014) Ashok Kumar Das Peer-to-Peer Networking and Applications
- Sybil Attacks and Their Defenses in the Internet of Things
- (2014) Kuan Zhang et al. IEEE Internet of Things Journal
- A novel agent-based approach to detect sinkhole attacks in wireless sensor networks
- (2013) Sina Hamedheidari et al. COMPUTERS & SECURITY
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Abror Abduvaliyev et al. IEEE Communications Surveys and Tutorials
- Detection and mitigation of sinkhole attacks in wireless sensor networks
- (2013) H. Shafiei et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
- (2013) Sutharshan Rajasegarar et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks
- (2012) Yun Wang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Detecting node replication attacks in wireless sensor networks: A survey
- (2012) Wen Tao Zhu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
- (2012) Ashok Kumar Das et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
- (2011) Shun-Sheng Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
- (2011) Guoxing Zhan et al. IEEE Transactions on Dependable and Secure Computing
- Topological detection on wormholes in wireless ad hoc and sensor networks
- (2011) Dezun Dong et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks
- (2010) Sooyeon Shin et al. IEEE Transactions on Industrial Informatics
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- An efficient random key distribution scheme for large-scale distributed sensor networks
- (2009) Ashok Kumar Das Security and Communication Networks
- Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods
- (2008) JeongChoon Ryoo et al. IEEE SIGNAL PROCESSING LETTERS
- Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
- (2008) Yun Wang et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started