1 |
Zhou, Y., Fang, Y. & Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials. Vol:10, Issue 3, (p 6-28)
DOI
|
2 |
Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: a survey. Security in Distributed, Grid and Pervasive Computing. (p 3-5, 10-15)
|
3 |
Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. Chichester, England: John Wiley & Sons
|
4 |
Hanapi, Z. M., Ismail, M., Jumari, K., & Mirvaziri, H. (2008). Analysis of routing attacks in wireless sensor network. In Proceedings of International Cryptology Workshop and Conference (Cryptology2008). (p 202-214). ISBN 978-983-4069
|
5 |
Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks. Computer Networks. Vol 51(15)
|
6 |
Hu, Y. C., Perrig, A. & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE Infocom
|
7 |
Law, Y. W., & Havinga, P. (2005). How to secure a wireless sensor network. (p 89-95)
|
8 |
Wood, A. & Stankovic, J. (2002). Denial of service in sensor networks. In Computer. Vol 35, (p 54 - 62)
DOI
ScienceOn
|
9 |
Znaidi, W., Minier, M., & Babau, J. P. (2008). An ontology for attacks in wireless sensor networks. Institut National De Recherche En Informatique Et En Automatique
|
10 |
Bojkovic,. Z. S., Bakmaz,. B. M,. & Bakmaz,. M. R. (2008). Security issues in wireless sensor networks. International Journal of Communications: Issue 1, Volume 2
|
11 |
Raj,. P. N. & Swadas,. P. B,. (2009). DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI): Vol.2
|
12 |
Venkatraman, L., Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. In Journal for Parallel Distributed Computing. 63 (p 214-227)
DOI
ScienceOn
|
13 |
Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN)
|
14 |
Kaissi, R. E., Kayssi, A., Chehab, A., & Dawy, Z. (2005). DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks. The Second International Conference on Innovations in Information Technology (IIT’05). American University of Beirut. Beirut, Lebanon.
|
15 |
Karlof, C., & Wagner,. D. (2005). Summary of “secure routing in wireless sensor networks: attacks and countermeasures”. In Seminar on Theoretical Computer Science
|
16 |
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. In Proceedings of Third International Symposium on Information Processing in Sensor Networks. (p259-268). (ACM 1-58113-846-6)
DOI
|
17 |
Jen, S. M., Laih,. C.S., and KuoW,. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors
|
18 |
Kumar, H., Sarma, D., & Kar, K. (2006). Security threats in wireless sensor networks. IEEE
DOI
|
19 |
Rehana, J. (2009). Security of wireless sensor network. Seminar on Internetworking (TKK T-110.5190). Helsinki University of Technology
|
20 |
Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS): Vol.4, No.1 & 2
|
21 |
Hanapi,. Z.M. Ismail,. M,. Jumari,. K. & Mahdavi,. M. (2009). Dynamic window secured implicit geographic forwarding routing for wireless sensor network. World Academy of Science, Engineering and Technology
|
22 |
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks, IEEE Communications Magazine (p 70-75)
DOI
ScienceOn
|
23 |
Karlof, C., & Wagner,. D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols. Vol.1, (p293-315), Elsevier Publications
DOI
ScienceOn
|
24 |
Naeem,. T & Loo,. K. K. (2009). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications: Volume 3, Number 1. (p 89-90)
|
25 |
Lee , J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications, (p76-84)
DOI
ScienceOn
|
26 |
Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: a survey. Journal of Information Assurance and Security 5, (p31-44)
|