4.8 Article

Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Data Collection for Security Measurement in Wireless Sensor Networks: A Survey

Haomeng Xie et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Sinkhole+CloneID: A hybrid attack on RPL performance and detection method

Sayed Mohammad Hossein Mirshahjafari et al.

INFORMATION SECURITY JOURNAL (2019)

Article Computer Science, Information Systems

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks

Wafa Ben Jaballah et al.

COMPUTER COMMUNICATIONS (2018)

Review Computer Science, Information Systems

A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems

Elhadj Benkhelifa et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Theory & Methods

MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things

Po-Yen Lee et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

SECURING CONSUMER IOT IN THE SMART HOME: ARCHITECTURE, CHALLENGES, AND COUNTERMEASURES

Yan Meng et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs

Shiqiang Zhang et al.

PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018) (2018)

Proceedings Paper Computer Science, Theory & Methods

HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme for Internet of Things

Mahmud Hossain et al.

2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD) (2017)

Article Computer Science, Information Systems

A mobility optimized SPRT based distributed security solution for replica node detection in mobile sensor networks

Venkatesh Manickavasagam et al.

AD HOC NETWORKS (2016)

Article Computer Science, Hardware & Architecture

LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems

Mianxiong Dong et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2016)

Article Computer Science, Theory & Methods

Continuous Answering Holistic Queries over Sensor Networks

Kebin Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Engineering, Electrical & Electronic

Compressed Sensing-Based Clone Identification in Sensor Networks

C. M. Yu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs

Wazir Zada Khan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Telecommunications

The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks

Narasimha Shashidhar et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2015)

Article Computer Science, Hardware & Architecture

Clone wars: Distributed detection of clone attacks in mobile WSNs

M. Conti et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)

Article Computer Science, Theory & Methods

Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks

Chia-Mu Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Hardware & Architecture

Distributed Detection of Clone Attacks in Wireless Sensor Networks

Mauro Conti et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Computer Science, Information Systems

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing

Jun-Won Ho et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2011)

Article Computer Science, Hardware & Architecture

On the Price of Security in Large-Scale Wireless Ad Hoc Networks

Chi Zhang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2011)

Article Engineering, Electrical & Electronic

Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks

Yingpei Zeng et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

SECURITY IN SERVICE-ORIENTED VEHICULAR NETWORKS

Haojin Zhu et al.

IEEE WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Artificial Intelligence

On the detection of clones in sensor networks using random key predistribution

Richard Brooks et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2007)