The MCD protocol for securing wireless sensor networks against nodes replication attacks

被引:0
|
作者
20145200357829
机构
来源
(1) Department of Electrical and Electronic Engineering, Laboratory STIC, University of Tlemcen, Tlemcen, Algeria | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
109492
引用
收藏
相关论文
共 50 条
  • [41] Secure positioning of wireless sensor networks against wormhole attacks
    Yu, Xiuwu
    Wang, Xun
    Liu, Yong
    TELECOMMUNICATION SYSTEMS, 2024, 87 (03) : 835 - 843
  • [42] Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks
    Ghasem Farjamnia
    Yusif Gasimov
    Cavanshir Kazimov
    Wireless Personal Communications, 2019, 105 : 1561 - 1584
  • [43] Countermeasures against traffic analysis attacks in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 113 - 124
  • [44] Countermeasures against radio jamming attacks in wireless sensor networks
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Networks and Quantum Computing, 2011, : 1 - 18
  • [45] A Path Authenticating Method Using Bloom Filters Against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks
    Tanabe, Noriaki
    Kohno, Eitaro
    Kakuda, Yoshiaki
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 357 - 361
  • [46] SECURING WIRELESS SENSOR NETWORKS: A SURVEY
    Zhou, Yun
    Fang, Yuguang
    Zhang, Yanchao
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (03): : 6 - 28
  • [47] Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol
    Kaur, Taranpreet
    Kumar, Rajeev
    2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 288 - 292
  • [48] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [49] A KEY MANAGEMENT PROTOCOL FOR SECURING STABILITY OF AN INTERMEDIATE NODE IN WIRELESS SENSOR NETWORKS
    Jeong, Yoon-Su
    Kim, Ki-Soo
    Kim, Yong-Tae
    Park, Gil-Cheol
    Lee, Sang-Ho
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 471 - +
  • [50] On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
    Del-Valle-Soto, Carolina
    Mex-Perera, Carlos
    Monroy, Raul
    Arturo Nolazco-Flores, Juan
    SENSORS, 2015, 15 (04) : 7619 - 7649