相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
Ismail Butun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Data Collection for Security Measurement in Wireless Sensor Networks: A Survey
Haomeng Xie et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Sinkhole+CloneID: A hybrid attack on RPL performance and detection method
Sayed Mohammad Hossein Mirshahjafari et al.
INFORMATION SECURITY JOURNAL (2019)
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks
Wafa Ben Jaballah et al.
COMPUTER COMMUNICATIONS (2018)
A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
Elhadj Benkhelifa et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things
Po-Yen Lee et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
SECURING CONSUMER IOT IN THE SMART HOME: ARCHITECTURE, CHALLENGES, AND COUNTERMEASURES
Yan Meng et al.
IEEE WIRELESS COMMUNICATIONS (2018)
Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs
Shiqiang Zhang et al.
PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018) (2018)
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme for Internet of Things
Mahmud Hossain et al.
2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD) (2017)
A mobility optimized SPRT based distributed security solution for replica node detection in mobile sensor networks
Venkatesh Manickavasagam et al.
AD HOC NETWORKS (2016)
LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems
Mianxiong Dong et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2016)
Continuous Answering Holistic Queries over Sensor Networks
Kebin Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
Compressed Sensing-Based Clone Identification in Sensor Networks
C. M. Yu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs
Wazir Zada Khan et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division
Wazir Zada Khan et al.
PLOS ONE (2015)
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks
Narasimha Shashidhar et al.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2015)
Clone wars: Distributed detection of clone attacks in mobile WSNs
M. Conti et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
Chia-Mu Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Distributed Detection of Clone Attacks in Wireless Sensor Networks
Mauro Conti et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
Jun-Won Ho et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2011)
On the Price of Security in Large-Scale Wireless Ad Hoc Networks
Chi Zhang et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2011)
Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks
Yingpei Zeng et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2010)
SECURITY IN SERVICE-ORIENTED VEHICULAR NETWORKS
Haojin Zhu et al.
IEEE WIRELESS COMMUNICATIONS (2009)
On the detection of clones in sensor networks using random key predistribution
Richard Brooks et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2007)