The MCD protocol for securing wireless sensor networks against nodes replication attacks

被引:0
|
作者
20145200357829
机构
来源
(1) Department of Electrical and Electronic Engineering, Laboratory STIC, University of Tlemcen, Tlemcen, Algeria | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
109492
引用
收藏
相关论文
共 50 条
  • [21] Securing wireless sensor networks against aggregator compromises
    Claveirole, Thomas
    de Amorim, Marcelo Dias
    Abdalla, Michel
    Viniotis, Yannis
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 134 - 141
  • [22] Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques
    Ahmed, Khawaja Masood
    Shams, Rehan
    Khan, Fozia Hanif
    Luque-Nieto, Miguel-Angel
    IEEE ACCESS, 2024, 12 : 161096 - 161133
  • [23] Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
    Znaidi, Wassim
    Minier, Marine
    Ubeda, Stephane
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [24] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [25] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [26] A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks
    Meng, Xiangshan
    Lin, Kai
    Li, Keqiu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 1, PROCEEDINGS, 2010, 6081 : 559 - 570
  • [27] PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
    Stelte, Bjoern
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 53 - 58
  • [28] Defense against outside attacks in wireless sensor networks
    Tripathy, Somanath
    Nandi, Sukumar
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 818 - 826
  • [29] Defenses Against Wormhole Attacks in Wireless Sensor Networks
    Ma, Rui
    Chen, Siyu
    Ma, Ke
    Hu, Changzhen
    Wang, Xiajing
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 413 - 426
  • [30] Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
    Bankovic, Zorana
    Fraga, David
    Moya, Jose M.
    Carlos Vallejo, Juan
    SENSORS, 2012, 12 (08) : 10834 - 10850