4.4 Article

A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

Ashok Kumar Das

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Information Systems

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

Ashok Kumar Das

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks

Soochang Park et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

Santanu Chatterjee et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Hardware & Architecture

Detection and mitigation of sinkhole attacks in wireless sensor networks

H. Shafiei et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)

Article Computer Science, Information Systems

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

Wenchao Li et al.

JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2014)

Article Computer Science, Information Systems

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks

Abror Abduvaliyev et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Theory & Methods

Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks

Yun Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks

Miao Xie et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Towards reducing false alarms in network intrusion detection systems with data summarization technique

Neminath Hubballi et al.

SECURITY AND COMMUNICATION NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures

Yanli Yu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Hardware & Architecture

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Ashok Kumar Das et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Information Systems

Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches

Feng Wang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Computer Science, Hardware & Architecture

Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks

Dezun Dong et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2011)

Article Computer Science, Hardware & Architecture

Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification

Ming-Yang Su

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Information Systems

Network specific false alarm reduction in intrusion detection system

Neminath Hubballi et al.

SECURITY AND COMMUNICATION NETWORKS (2011)

Article Automation & Control Systems

An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks

Sooyeon Shin et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2010)

Article Computer Science, Theory & Methods

Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks

Sutharshan Rajasegarar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Information Systems

Intrusion detection in homogeneous and heterogeneous Wireless Sensor Networks

Yun Wang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2008)

Article Computer Science, Information Systems

An improved key distribution mechanism for large-scale hierarchical wireless sensor networks

Yi Cheng et al.

AD HOC NETWORKS (2007)

Article Computer Science, Hardware & Architecture

Wireless sensor networks: a survey

IF Akyildiz et al.

COMPUTER NETWORKS (2002)