1 |
M. Ibrahim and M. Muntasir, "Detecting Sink Hole Attacks in WSN using Hop Count," Computer Networks and Information Security, Vol.3, pp.50-56, 2015.
|
2 |
H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and Mitigation of Sinkhole Attacks in Wireless Sensor Networks," Journal of Computer and System Sciences, Vol.80, Issue.3, pp.644-653, 2014.
DOI
|
3 |
G. W. Kibirige and C. Sanga, "A Survey on Detection of Sinkhole Attack in Wireless Sensor Network," International Journal of Computer Science and Information Security, Vol.13, No.5, pp.1-9, 2015.
|
4 |
J. Shokeen, P. Palak, and P. Devi, "A Survey on Selective Forwarding Attacks in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.5, Issue.8, pp.45-50, 2016.
|
5 |
J. Singh and A. Gupta, "Different Approaches to Mitigate Selective Forwarding Attacks in WSN," International Journal of Innovations in Engineering and Technology, Vol.3, pp.40-46, 2014.
|
6 |
D. Boyle and T. Newe, "Securing Wireless Sensor Networks: Security Architectures," Journal Of Networks, Vol.3, No.1, pp.65-77, 2008.
|
7 |
S. Nithya, K. VijayaLakshmi, and V. PadmaPriya, "A Review of Network Layer Attacks and Countermeasures in WSN," IOSR Journal of Electronics and Communication Engineering, Vol.10, Issue.6, pp.10-15, 2015.
|
8 |
H. K. Kalita and A. Kar, "Wireless Sensor Network Security Analysis," International Journal of Computer Science & Information Technology, Vol.1, No.1, pp.1-10, 2009.
DOI
|
9 |
N. Sharma1 and U. Singh, "Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.3, Issue.2, pp.29-33, 2014.
|
10 |
A. M. Abdul and S. Umar, "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security," Indonesian Journal of Electrical Engineering and Computer Science Vol.5, No.1, pp.181-186, 2017.
DOI
|