1 |
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proc. First IEEE Int'l Workshop on Sensor Network Protocols and Applications, May 2003
|
2 |
Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos, "Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks," ALGOSENSORS 2007, LNCS 4837, pp. 150-161, 2008
|
3 |
Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim, and Seung-Woo Seo, "WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks," ICUCT 2006, LNCS 4412, pp. 200-209, 2007
|
4 |
B. Yu, B. Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), pp. 1-8, 2006
|
5 |
K. Kim, S. Daniel Park, G. Montenegro, N. Kushalnagar, "6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD)," Internet-Draft (Expired), June 19, 2007
|
6 |
Edith C. H. Ngai, Jiangchuan Liu, Michael R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications, Sept. 2007
|
7 |
C. Perkins, E. Belding-Royer, S. Das, "Ad hoc On-Demand Distance Vector Routing," RFC 3561, July 2003
|
8 |
IEEE Computer Society, "Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)," IEEE 802.15.4 Standard, 2006
|