"A Comparison of Link Layer Attacks on Wireless Sensor Networks"
written by Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy,
published by Journal of Information Security, Vol.2 No.2, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] بكارگيري اتوماتاهاي يادگير در خنثي كردن حمله ارسال انتخابي در شيكه هاي حسگر بي سيم‎
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING
[2] Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems
2020
[3] Privacy-aware query processing in vehicular ad-hoc networks
2019
[4] A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare
2019
[5] An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks
2019
[6] A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas
2019
[7] Implementation of Multiple layer security of Cloud server
2018
[8] Proposing a Behavior-Based IDS Model for IoT Environment
Information Systems: Research, Development, Applications, Education, 2018
[9] Classification of Attacks on Wireless Sensor Networks: A Survey
2018
[10] Anatomy of Threats to the Internet of Things
2018
[11] Sensor Networks Attacks Classifications and Mitigation
2018
[12] Об одном подходе к формированию перечня мер по защите информации в беспроводных сенсорных сетях газодобывающего предприятия
2018
[13] A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach
International Journal of Information System Modeling and Design (IJISMD), 2018
[14] Wireless Sensor Network Security for Cyber-Physical Systems
Cyber Security for Cyber Physical Systems, 2018
[15] WSN Security Mechanisms for CPS
Cyber Security for Cyber Physical Systems, 2018
[16] Active defense strategy against jamming attack in wireless sensor networks
2018
[17] A REVIEW OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
2017
[18] A review on security and privacy issues in wireless sensor networks
2017
[19] AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN)
2017
[20] Recognizing Attacks in Wireless Sensor Network in View of Internet of Things
Internet of Things: Novel Advances and Envisioned Applications, 2017
[21] A Survey of Wireless Sensor Network Attacks
Communications on Applied Electronics, 2017
[22] Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control
Electronics, 2017
[23] High-level design of Wireless sensor networks for performance optimization under security hazards
ACM Transactions on Sensor Networks (TOSN), 2017
[24] Customized Hardware Crypto Engine for Wireless Sensor Networks
2017
[25] Security Issues in Wireless Sensor Networks
Journal of Multidisciplinary Engineering Science Studies (JMESS), 2017
[26] A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks
International Journal of Computer Applications, 2017
[27] Sistemas embebidos en red seguros
2017
[28] Malware propagation in Wireless Sensor Networks: global models vs Individual-based models
2017
[29] Secure data collection in wireless sensor networks.
2017
[30] PROTECTION ISSUES IN WORMHOLE ATTACK
International Journal of Scientific Development and Research, 2017
[31] Security Attacks and Defense Mechanisms in Wireless Sensor Network: A Survey
2016
[32] Impact van publieke sleutel cryptografie op draadloze sensornetwerken
2016
[33] Review on Security Issues in Wireless Sensor Networks
2016
[34] Security in Wireless Sensor Networks: Attacks and Solutions
environment, 2016
[35] Light Weight Authentication framework for WSN
International Conference on El ectrical, Electronics, and Optimization Techni ques (ICEEOT) , 2016
[36] Simulation of Attacks for Security in Wireless Sensor Network
Sensors, 2016
[37] Security issues in wireless networks: An overview
2016
[38] A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16, 2016
[39] A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks
2016
[40] Wireless Sensor Networks: Virtual Platform for Performance Analysis and Attack Simulation
Trusted Computing for Embedded Systems, 2015
[41] Efficient Power Utilization with Reactive Routing Protocols in Mobile Ad-Hoc Networks under the influence of Application layer Attack
International Journal of Software & Hardware Research in Engineering, 2015
[42] a Security ScheMe for video StreaMing in wireleSS MultiMedia SenSor networkS
2015
[43] A Review: DoS and DDoS Attacks
2015
[44] Secure Data Collection Using Randomized Multipath Routing
International Journal on Recent and Innovation Trends in Computing and Communication, 2015
[45] Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs
International Journal of Distributed Sensor Networks, 2015
[46] A survey of security attacks, defenses and security mechanisms in wireless sensor network
2015
[47] Security Attacks, challenges and Mechanisms for security in Wireless Sensor Network: A survey
2015
[48] Comparative Analysis of WSN MAC Protocols and Node Clone Attack
2015
[49] Attacks in wireless sensor networks
2014
[50] An efficient and optimal clustering algorithm for real-time forest fire prediction with
Communications and Signal Processing (ICCSP), 2014 International Conference on, 2014
[51] A Novel Clustering Algorithm for Homogenous and Large-Scale Wireless Sensor Networks: Based on Sensor Nodes Deployment Location Coordinates
IJCSNS, 2014
[52] Attacks And Counterattacks On Wireless Sensor Networks
arXiv preprint arXiv:1401.4443, 2014
[53] A Comprehensive Comparison of Attacks in Wireless Sensor Networks
2014
[54] Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
The Computer Journal, 2014
[55] Detection of DOS attack and Sink hole In WSN
2014
[56] Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes
IJ Information Technology and Computer Science, 2014
[57] Routing Attacks in Wireless Sensor Networks: A Survey
2014
[58] Randomised multipath routing for secure data collection
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on, 2014
[59] SCHEDULING ALGORITHMS OF REAL TIME SYSTEM AN OVERVIEW
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, 2014
[60] Detection of Sinkhole attack in Wireless Sensor Networks using Mobile agent and multiple Base stations
2014
[61] ANALYSIS OF AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST NODE MISBEHAVIOR ATTACKS IN WIRELESS SENSOR NETWORKS
2014
[62] Plataforma virtual para el análisis del rendimiento y la seguridad en redes de sensores inalámbricos
2014
[63] Détection d'attaques dans un système WBAN de surveillance médicale à distance
Thesis, 2014
[64] INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS
2014
[65] An ECC-Based Secure Routing Protocol for Wireless Sensor Network
Sensors & Transducers, 2014
[66] Agent-based intrusion detection and self-recovery system for wireless sensor networks
Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on, 2013
[67] Plug–and–play mechanism for plain transducers with wired digital interfaces attached to wireless sensor network nodes
International Journal of Sensor Networks, 2013
[68] Data link layer security protocols in wireless sensor networks: A survey
Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on, 2013
[69] Detection of Wormhole Attacks in Wireless Sensor Networks
Thesis, 2013
[70] An Introduction to Various Basic Concepts of Clustering Techniques on Wireless Sensor Networks
International Journal of Computational Engineering Research (IJCER), 2013
[71] Investigation of Application Attack on MANET
IJCA June, 2013
[72] HCERHSW: A Hierarchical, Clustering-based and Energy-aware Routing Algorithm for Homogenous and Static Wireless Sensor Networks
2013
[73] A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks
Wireless Communication, 2013
[74] Review of main security threats in Smart Home networks
2012
[75] Attacks and Countermeasures in Wireless Sensor Network
International Journal of Computer Science and Communication Engineering, IJCSCE Special issue on “Emerging Trends in Engineering” ICETIE, 2012
[76] A Secure Energy Mechanism for WSN and Its Implementation in NS-2
Wireless Communication, 2012
[77] WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
2012
[78] A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
Wireless Sensor Network, 2011
[79] A hierarchical intrusion detection architecture for wireless sensor networks
International Journal of Network Security and its Applications (IJNSA), 2011
[80] Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
Int'l J. of Communications, Network and System Sciences, 2011