A stochastic model of malicious data packet propagation in Mobile Wireless Sensor Networks

被引:0
|
作者
Wang, Xiao-Ming [1 ]
Li, Cheng-Bo [1 ]
Li, Ying-Shu [2 ,3 ]
机构
[1] School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
[2] Department of Computer Science, Georgia State University, Atlanta 30303, United States
[3] School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China
关键词
Wireless sensor networks;
D O I
10.3724/SP.J.1146.2012.00945
中图分类号
学科分类号
摘要
引用
收藏
页码:1290 / 1297
相关论文
共 50 条
  • [1] Locating Malicious Agents in Mobile Wireless Sensor Networks
    Sei, Yuichi
    Ohsuga, Akihiko
    PRIMA 2014: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2014, 8861 : 206 - 221
  • [2] Malicious Code Propagation Model Based on Sleep Monitoring Mechanism in Wireless Sensor Networks
    Hou, Si-Yu
    Ren, Jian-Guo
    Xu, Yong-Hong
    Journal of Computers (Taiwan), 2024, 35 (02) : 17 - 36
  • [3] Gathering data with packet-in-packet in wireless sensor networks
    Ma, Xiaoyuan
    Zhang, Peilin
    Theel, Oliver
    Wei, Jianming
    COMPUTER NETWORKS, 2020, 170 (170)
  • [4] A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks
    Terence, J. Sebastian
    Purushothaman, Geethanjali
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (01): : 203 - 216
  • [5] Lifetime Optimization of Wireless Sensor Networks with Packet Propagation Table
    Li, Hailong
    Pandit, Vaibhav
    Chi, Yang
    Agrawal, Dharma P.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [6] SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks
    Guo, Longjiang
    Beyah, Raheem
    Li, Yingshu
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1611 - 1619
  • [7] Study on Automatic Positioning of Malicious Mobile Nodes in Wireless Sensor Networks
    Zheng Wen-Kui
    Liu Kun
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1495 - 1499
  • [8] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [9] Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
    Illiano, Vittorio P.
    Lupu, Emil C.
    ACM COMPUTING SURVEYS, 2015, 48 (02)
  • [10] A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks
    WANG Xiaoming
    HE Zaobo
    ZHANG Lichen
    ChineseJournalofElectronics, 2014, 23 (04) : 810 - 815