Denial of Sleeping: Performance Analysis and Counteracting Strategy
APCHI '08 Proceedings of the 8th Asia-Pacific conference on Computer-Human Interaction
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments
Multidimensional Systems and Signal Processing
A Cluster-Based Framework for the Security of Medical Sensor Environments
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Securing wireless implantable devices for healthcare: ideas and challenges
IEEE Communications Magazine
RADON: reputation-assisted data forwarding in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
Wireless mesh network security: A traffic engineering management approach
Journal of Network and Computer Applications
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Flooding attack in energy harvesting wireless sensor networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks
Journal of Network and Systems Management
DEMO: An IDS framework for internet of things empowered by 6LoWPAN
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
POSTER: Signal anomaly based attack detection in wireless sensor networks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Protecting wireless sensor networks from energy exhausting attacks
ICCSA'13 Proceedings of the 13th international conference on Computational Science and Its Applications - Volume 1
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Hi-index | 0.00 |
Increased interest in wireless sensor networks reinforces the importance of developing robust security mechanisms to protect them from malicious attack. If sensor networks are to meet current expectations, they must be robust in the face of network attacks, including denial of service.