References
- S. Hadim and N. Mohamed, "Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks," IEEE Computer Society, vol. 7, no. 3, pp. 1-23, Mar. 2006.
- C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sep. 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
- L. Akyyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002. https://doi.org/10.1109/MCOM.2002.1024422
- Y. Wang, G. Attebury and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.
- W. Xu, W. Trappe, Y. Zhang and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," in Proc. MobiHoc, pp. 46-57, 2005.
- D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive Computing, pp. 74-81, 2008.
- R. Kravets and P. Krishnan, "Power Management Techniques for Mobile Communication," in Proc. IEEE MOBICOM, pp. 157-168, 1998.
- T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers," in Proc. PerCom, pp. 309-318, 2004.
- D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols," in Proc. Workshop on Information Assurance, pp. 297-304, 2006.
- Anthony D. Wood and John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Society Press, vol. 35, no. 10, pp. 48-56, 2002.
- C. L. Schuba, I. V. Krsul, M. g. Kuhn, E. H. Spafford, A. Sundaram and D. Zamboni, "Analysis of a Denial of Service Attack on TCP," in Proc. IEEE Symposium on Security and Privacy, pp. 208-223, 1997.
- T. Aura, P. Nikander and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," in Proc. Security Protocols Workshop, pp. 170-177, 2000.
- L. Zhao, X. Zhao, Q. Long and Z. Yan, "A type system for the relational calculus of object systems," 11th IEEE International Conference on ICECCS 2006, pp.10. Sep. 2006.
- S.K. Jain and K. Garg, "A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks," Computational Intelligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on, pp.102-107, Jul. 23-25, 2009.
- S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection", in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94 - 106, 1997.
- Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., "IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks," Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001.
- Yih-Chun Hu; Perrig, A. and Johnson, D.B., "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861394
Cited by
- Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons vol.8, pp.6, 2011, https://doi.org/10.1155/2012/972101
- Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach vol.66, pp.2, 2013, https://doi.org/10.1007/s11227-013-0965-0
- Research on Security Model and Requirements for Fog Computing: Survey vol.9, pp.5, 2011, https://doi.org/10.15207/jkcs.2018.9.5.027
- Fuzzy logic–based jamming detection algorithm for cluster‐based wireless sensor network vol.31, pp.10, 2011, https://doi.org/10.1002/dac.3567
- Private information protection method and countermeasures in Big-data environment: Survey vol.9, pp.10, 2011, https://doi.org/10.15207/jkcs.2018.9.10.055
- An adaptive neuro-fuzzy logic based jamming detection system in WSN vol.23, pp.8, 2011, https://doi.org/10.1007/s00500-018-3636-5
- Data-Centric UML Profile for Wireless Sensors : Application to Smart Farming vol.10, pp.2, 2011, https://doi.org/10.4018/ijaeis.2019040102