1 |
F. Stajano, "Security for Ubiquitous Computing," International Conference on I nformation Security and Cryptology. Springer, Berlin, Heidelberg, pp. 2-2, Dec. 2004.
|
2 |
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in AdHoc Wireless Networks," International workshop on security protocols, pp. 172-194, Apr. 1999.
|
3 |
D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Network s: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 2, pp. 74-81, 2008.
DOI
|
4 |
M. Rirretti, S.Zhu, N. Vijaykrishnan, P. Mcdaniel and M. Kandemir, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense," International Journal of Distributed Sensor Networks. vol. 2, no. 3, pp. 267-87, Jul. 2006.
DOI
|
5 |
Seong-hwan Jeong, Woo-jin. Jang and Chang-hun Lee, "Modeling and Performan ce Analysis of S-MAC Protocol in Tandem Sensor Networks," Korean Institute Of Industrial Engineers, pp. 436-442, May. 2007.
|
6 |
D.R Raymond, R.C. Marchany, M.I. Brownfield and S.F. Midkiff, "Effects of Den ial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," IEEE Transactions on vehicular technology, vol. 58, no. 1, pp. 367-380, Jan. 2009.
DOI
|
7 |
T. Bhattasali, R. Chaki and S. Sanyal, "Sleep Deprivation Attack Detection in Wireless Sensor Network," arXiv preprint arXiv:1203.0231, 2012.
DOI
|
8 |
Chan-young Yun, "Energy efficient S-MAC Protocol in Wireless Sensor Network." The Journal of Korean Institute of Communications and Information Sciences, 33(2), pp. 20-26, Feb. 2008.
|
9 |
A. Gallais, T.H. Hedli, V. Loscri and N. Mitton, "Denial-of-Sleep Attacks against IoT Networks," 2019 6th International Conference on Control, Decision and Information Technologies(CoDIT). IEEE, p p. 1025-1030, Apr. 2019.
|
10 |
Jae-hong Park, Kyeung-seek Lew and Yong-deak Kim, "Energy Efficient MAC Pr otocols based on S-MAC for Wireless Sensor Networks," Journal of the Institute of Electronics Engineers of Korea CI, 44(2), pp. 19-24, Mar. 2007.
|
11 |
S. Naik and N. Shekokar, "Conservation of energy in wireless sensor network by preventing denial of sleep attack," Procedia Computer Science 45. pp. 370-379, Mar. 2015.
DOI
|
12 |
G. Mahalakshmi and P. Subathra, "A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 1, pp. 106-110, 2014.
|
13 |
C. T. Hsueh, C. Y. Wen and Y. C. Ouyang, "A secure scheme against power exhausting attacks in hierarchical wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 6, pp. 3590-3602, 2015.
DOI
|
14 |
W. Ye, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1567-1576, 2002.
|
15 |
J. Granjal, E. Monteiro and J. S. Silva, "Security for the internet of things: A survey of existing protocols and open research issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.
DOI
|
16 |
E. Gelenbe and Y. M. Kadioglu, "Energy Life-Time of Wireless Nodes with Network Attack and Mitigation," 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, pp. 1-6, 2018.
|
17 |
S. Bandyopadhyay and E. J. Coyle, "An Energy-Efficient Hierarchical Clusterin g Algorithm for Wireless Sensor Networks," IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), vol. 3, pp. 1713-1723, 2003.
|
18 |
M. Brownfield, Y. Gupta and N. Davis, "Wireless Sensor Network Denial of Sleep Attack," Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. IEEE, pp. 356-364, Jun. 2005.
|
19 |
D. R. Raymond and S. F. Midkiff, "Clustered Adaptive Rate Limiting: Defeating Denial-Of-Sleep Attacks In Wireless Sensor Networks," MILCOM 2007-IEEE military communications conference. IEEE, pp. 1-7, Oct. 2007.
|
20 |
C. Chen, L. Hui, Q. Pei, L. Ning and P. Qingquan, "An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks," 2009 Fifth International Conference on Information Assurance and Security. Vol. 2. IEEE, vol. 2, pp. 446-449, 2009.
|
21 |
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks," Proceedings of the 33rd Hawaii international conference on system sciences, vol. 8, pp. 3005-3014, Jan. 2000.
|
22 |
D. E. Boubiche and A. Bilami, "A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks," Journal Of Emerging Technologies In Web Intelligence, vol. 5, no. 1, Feb. 2013.
|
23 |
R.Fotohi, S.F. Bari and M. Yusefi, "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol," International Journal of Communication Systems. vol 33, no. 4, 2020.
|
24 |
C. T. Hsueh, C. Y. Wen and Y. C. Ouyang, "A secure scheme against power exhausting attacks in hierarchical wireless sensor networks," IEEE Sensors journal, vol. 15, no. 6, pp. 3590-3602, 2015.
DOI
|
25 |
W. Ye, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1567-1576, Jun. 2002.
|
26 |
M. Gunasekaran and S. Periakaruppan, "GA‐DoSLD: genetic algorithm based denial‐of‐sleep attack detection in WSN," Security and Communication Networks, 2017.
|
27 |
D. G. Zhang, S. Zhou and T.M. Tang, "A low duty cycle efficient MAC protocol based on self‐adaption and predictive strategy," Mobile Networks and Applications. vol. 23, no. 4, pp. 828-839, 2018.
DOI
|
28 |
D. G. Zhang, H. L. Niu and S. Liu, "Novel PEECR‐based clustering routing approach," Soft Computing, vol 21, no. 24, pp. 7313-7323, 2017.
DOI
|
29 |
D. G. Zhang, C. Chen, Y.Y. Cui and T. Zhang, "New method of energy efficient subcarrier allocation based on evolutionary game theory," Mobile Networks and Applications, pp. 1-14, 2018.
|
30 |
T. V. Dam and K. Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks," Proceedings of the 1st international conference on Emb edded networked sensor systems, pp. 171-180, Nov. 2003.
|
31 |
J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 95-107, Nov. 2004.
|
32 |
F. Adebayo, "Detecting Denial of Service attack in Wireless Sensor Networks," PhD Thesis, 2014.
|
33 |
D. Popescu, C. Dragana, F. stoican, L. Ichim and G. Stamatescu, "A Collaborative UAV-WSN Network for Monitoring Large Areas," Sensors, vol. 18. no. 12, 2018.
|