1 |
Z. Lai, M. Wang, and J. Yin, "Survey on wireless sensor network security," Electronic Measurement Technology, vol. 12, pp. 78-84, 2010.
|
2 |
V. C. Sekhar, and M. Sarvabhatla, "Security in wireless sensor networks with public key techniques," in Proc. of International Conference on Computer Communication & Informatics, pp. 1-16, 2012.
|
3 |
R.W. Anwar, M. Bakhtiari, A. Zainal, et al, "A survey of wireless sensor network security and routing techniques," Research Journal of Applied Sciences Engineering & Technology, vol. 9, no. 11, pp. 1016-1026, 2015.
DOI
|
4 |
Q. Shi, L. Qin, L. Song, et al, "A dynamic programming model for internal attack detection in wireless sensor networks," Discrete Dynamics in Nature and Society, vol. 2017, Article ID 5743801, 9 pages, 2017.
|
5 |
M. Zeeshan, H. Javed, A. Haider, et al, "An immunology inspired flow control attack detection using negative selection with r-contiguous bit matching for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 169654, 7 pages, 2015.
|
6 |
IEEE 802.15.4, http://standards.ieee.org/findstds/standard/802.15.4e-2012.html
|
7 |
ZigBee, http://www.zigbee.org/
|
8 |
Y. Li, C. Tang, S. Peeta, et al, "Nonlinear Consensus-Based Connected Vehicle Platoon Control Incorporating Car-Following Interactions and Heterogeneous Time Delays," IEEE Transactions on Intelligent Transportation Systems, 2018.
|
9 |
Y. Li, C. Tang, K. Li, et al, "Consensus-Based Cooperative Control for Multi-Platoon Under the Connected Vehicles Environment," IEEE Transactions on Intelligent Transportation Systems, 2018.
|
10 |
Y. Li, C. Tang, S. Peeta, et al, "Integral-Sliding-Mode Braking Control for Connected Vehicle Platoon: Theory and Application," IEEE Transactions on Industrial Electronics, 2018.
|
11 |
J. Balthrop, F. Esponda, S. Forrest, et al, "Coverage and generalization in an artificial immune system," in Proc. of he the 4th Annual Conference on Genetic and Evolutionary Computation, New York, Morgan Kaufmann Publishers Inc, pp. 3-10, 2002.
|
12 |
I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in Proc. of IEEE International Conference on Wireless & Mobile Computing, Networking & Communications, vol. 3, no. 4, pp. 587-594, 2005.
|
13 |
S. Schaust, and H. Szczerbicka, "Applying antigen-receptor degeneracy behavior for misbehavior response selection in wireless sensor networks," Artificial Immune Systems, ICARIS 2011, Lecture Notes in Computer Science, vol. 6825, Springer, Berlin, Heidelberg.
|
14 |
R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Proc. of IEEE Consumer Communications & Networking Conference, vol. 1, pp. 640-644, 2006.
|
15 |
D. Martynov, J. Roman, S. Vaidya, and H. Fu, "Design and implementation of an intrusion detection system for wireless sensor networks," in Proc. of IEEE International Conference on Electro/Information Technology, Chicago, vol. 3, no. 5, pp. 507-512, 2007.
|
16 |
M. Drozda, S. Schaust, and H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: performance and design principles," IEEE Congress on Evolutionary Computation, Singapore, pp. 3719-3726, 2007.
|
17 |
J. Kim, P. Bentley, C. Walenta, et al, "Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm," Artificial Immune Systems, ICARIS 2006, Lecture Notes in Computer Science, vol. 4163, Springer, Berlin, Heidelberg.
|
18 |
M. Wazid, and A. K. Das, "An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks," Wireless Pers Commun, vol. 90, pp. 1971-2000, 2016.
DOI
|
19 |
P. Matzinger, "The danger model: a renewed sense of self," Science, vol. 296, pp. 301-305, 2002.
DOI
|
20 |
W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, "Real-time multi-agent system for an adaptive intrusion detection system," Pattern Recognition Letters, vol. 85, pp. 56-64, 2017.
DOI
|
21 |
S. X. Wu, and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: a review," Applied Soft Computing, vol. 10, no. 1, pp. 1-35, 2010.
DOI
|
22 |
U. Aickelin, P. Bentley, S. Cayzer, et al, "Danger theory: the link between AIS and IDS?," Artificial Immune Systems, ICARIS 2003, Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg, 2003.
|
23 |
M. Gunasekaran and S. Periakaruppan, "GA-DoSLD: genetic algorithm based denial-of-sleep attack detection in WSN," Security and Communication Networks, vol. 2017, Article ID 9863032, 10 pages, 2017.
|
24 |
Y. B. Chen, C. Feng, Q. Zhang, et al, "Integrated artificial immune system for intrusion detection," Journal of Communications, vol. 33, no. 2, pp. 125-131, 2012.
|
25 |
P. Levis, N. Lee, M. Welsh, and D. Culler, "TOSSIM: accurate and scalable simulation of entire TinyOS applications," in Proc. of SenSys '03 Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ACM Press, pp.126-137, 2003.
|
26 |
V. C. Chandanashree, U. P. Bhat, P. Kanade et al, "Tinyos based WSN design for monitoring of cold storage warehouses using internet of things," in Proc. of 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017.
|
27 |
T. Ma, F. Wang, J. Cheng, et al, "A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks," Sensors, vol. 16, no. 10, pp. 1701-1724, 2016.
DOI
|
28 |
P. Kour and L. C. Panwar, "A review on security challenges and attacks in wireless sensor networks," International Journal of Science and Research, vol. 3, no. 5, pp. 1360-1364, 2014.
|
29 |
S. Biswas and S. Adhikari, "A survey of security attacks, defenses and security mechanisms in wireless sensor network," International Journal of Computer Applications, vol. 131, no. 17, pp. 28-35, 2015.
DOI
|
30 |
E. Sharifi, M. Khandan, and M. Shamsi, "MAC protocols security in wireless sensor networks: a survey," International Journal of Computer and Information Technology, vol. 3, no. 1, pp. 105-109, 2014.
|
31 |
H. Ali, A. A. Mamun, and S. Anwar, "All possible security concern and solutions of WSN: a comprehensive study," International Journal of Computer Science and Technology, vol. 6, no. 4, pp. 64-74, 2015.
|
32 |
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland: IEEE Computer Society Press, pp. 202-212, 1994.
|
33 |
D. Singla and C. Diwaker, "Analysis of security attacks in wireless sensor networks," International Journal of Software and Web Sciences, vol. 14, pp. 26-30, 2014.
|