References
- Rehana, J. (2009). Security of wireless sensor network. Seminar on Internetworking (TKK T-110.5190). Helsinki University of Technology
- Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS): Vol.4, No.1 & 2
- Hanapi,. Z.M. Ismail,. M,. Jumari,. K. & Mahdavi,. M. (2009). Dynamic window secured implicit geographic forwarding routing for wireless sensor network. World Academy of Science, Engineering and Technology
- Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks, IEEE Communications Magazine (p 70-75) https://doi.org/10.1109/MCOM.2002.1039859
- Karlof, C., & Wagner,. D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols. Vol.1, (p293-315), Elsevier Publications https://doi.org/10.1016/S1570-8705(03)00008-8
- Naeem,. T & Loo,. K. K. (2009). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications: Volume 3, Number 1. (p 89-90)
- Lee , J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications, (p76-84) https://doi.org/10.1109/MWC.2007.4396946
- Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: a survey. Journal of Information Assurance and Security 5, (p31-44)
- Bojkovic,. Z. S., Bakmaz,. B. M,. & Bakmaz,. M. R. (2008). Security issues in wireless sensor networks. International Journal of Communications: Issue 1, Volume 2
- Raj,. P. N. & Swadas,. P. B,. (2009). DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI): Vol.2
- Venkatraman, L., Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. In Journal for Parallel Distributed Computing. 63 (p 214-227) https://doi.org/10.1016/S0743-7315(02)00065-5
- Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN)
- Kaissi, R. E., Kayssi, A., Chehab, A., & Dawy, Z. (2005). DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks. The Second International Conference on Innovations in Information Technology (IIT’05). American University of Beirut. Beirut, Lebanon.
- Karlof, C., & Wagner,. D. (2005). Summary of “secure routing in wireless sensor networks: attacks and countermeasures”. In Seminar on Theoretical Computer Science
- Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. In Proceedings of Third International Symposium on Information Processing in Sensor Networks. (p259-268). (ACM 1-58113-846-6) https://doi.org/10.1145/984622.984660
- Jen, S. M., Laih,. C.S., and KuoW,. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors
- Kumar, H., Sarma, D., & Kar, K. (2006). Security threats in wireless sensor networks. IEEE https://doi.org/10.1109/CCST.2006.313457
- Zhou, Y., Fang, Y. & Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials. Vol:10, Issue 3, (p 6-28) https://doi.org/10.1109/COMST.2008.4625802
- Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: a survey. Security in Distributed, Grid and Pervasive Computing. (p 3-5, 10-15)
- Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. Chichester, England: John Wiley & Sons
- Hanapi, Z. M., Ismail, M., Jumari, K., & Mirvaziri, H. (2008). Analysis of routing attacks in wireless sensor network. In Proceedings of International Cryptology Workshop and Conference (Cryptology2008). (p 202-214). ISBN 978-983-4069
- Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks. Computer Networks. Vol 51(15)
- Hu, Y. C., Perrig, A. & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE Infocom
- Law, Y. W., & Havinga, P. (2005). How to secure a wireless sensor network. (p 89-95)
- Wood, A. & Stankovic, J. (2002). Denial of service in sensor networks. In Computer. Vol 35, (p 54 - 62) https://doi.org/10.1109/MC.2002.1039518
- Znaidi, W., Minier, M., & Babau, J. P. (2008). An ontology for attacks in wireless sensor networks. Institut National De Recherche En Informatique Et En Automatique
Cited by
- Exploiting SIMD parallelism on dynamically partitioned parallel network coding for P2P systems vol.39, pp.1, 2013, https://doi.org/10.1016/j.compeleceng.2012.02.009