[1]
|
W. Znaidi, M. Minier and J. P. Babau, “An Ontology for At-tacks in Wireless Sensor Networks,” Institute National de Re-cherche en Informatique et en Automatique, October 2008.
|
[2]
|
M. Saxena, “Security in Wireless Sensor Networks: A Layer-Based Classification,” 2011.
https://www.cerias.purdue.edu/apps/reports_and_papers/view/3106/
|
[3]
|
K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” In-ternational Journal of Computers and Their Applications, Spe-cial Issue on “Mobile Ad-hoc Networks”, Vol. 1, 2010, pp. 42-45.
|
[4]
|
K. Xing, S. S. R. Srinivasan, M. Rivera, J. Li and X. Z. Cheng, “Attacks and Countermeasures in Sensor Net-works: A Survey,” Network Security, Springer, Berlin, 2010, pp. 251-272. doi:10.1007/978-0-387-73821-5_11
|
[5]
|
T. A. Zia, “A Security Framework for Wireless Sensor Networks,” PhD Thesis, University of Sydney, Sydney, February 2008.
|
[6]
|
G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Net-works,” International Journal of Computer Science and Infor-mation Security, Vol. 4, No. 1-2, 2009, pp. 115-119.
|
[7]
|
T. Kavitha and D. Sridharan, “Security Vulnerabilities in Wireless Sensor Networks: A Survey,” Journal of Information Assur-ance and Security, Vol. 5, 2010, pp. 31-44.
|
[8]
|
Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” 2011.
http://www.cacr.math.uwaterloo.ca/techreports/2008/cacr2008-20.pdf
|
[9]
|
A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN,” 2011
http://ict-act.org/ICT Innovations.../ictinnovations 2009_submission_21.pdf
|
[10]
|
J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Computer Net-works, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002
|
[11]
|
C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the 1st IEEE In-ternational Workshop on Sensor Network Protocols and Ap-plications, Alaska, 11 May 2003, pp. 113-127.
|
[12]
|
Y. Wang, G. Attebury and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communication Surveys, 2006.
|
[13]
|
C. Tumrongwittayapak and R. Varakulsiripunth, “Detecting Sinkhole Attacks in Wireless Sensor Networks,” I CROS-SICE International Joint Conference, Fukuoka, 18-21 August 2009.
|
[14]
|
R. H. Khokhar, M. A. Ngadi and S. Man-dala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks,” International Journal of Computer Science and Security, Vol. 2, No. 3, 2008, pp. 18-29.
|
[15]
|
Y. Zhou, Y. Fang and Y. Zhang, “Security Wireless Sensor Networks: A Survey,” IEEE Communication Surveys, 2008.
|
[16]
|
A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Secu-rity Protocols for Sensor Networks,” Proceedings of 7th Annual International Conference on Mobile Computing and Networks, Rome, July 2001.
|
[17]
|
I. Krontiris, T. Giannetsos and T. Di-mitriou, “Launching a Sinkhole Attack in Wireless Sensor Networks, the Intruder Side,” IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Dalian, 12-14 October 2008, pp. 526-531.
|
[18]
|
A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks,” Communications of the ACM, Vol. 47, No. 6, 2004, pp. .
|
[19]
|
A. Saini and H. Kumar, “Comparison between Var-ious Black Hole Detection Techniques in MANET,” National Conference on Computational Instrumentation, Chandigarh, 19-20 March 2010, pp. 157-161.
|
[20]
|
I. Ullah and S. U. Reh-man, “Analysis of Black Hole attack On MANETs Using Dif-ferent MANET Routing Protocols,” Master Thesis, Blekinge Institute of Technology, Sweden, 2010.
|
[21]
|
R. Maheshwari, J. Gao and S. R. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” IEEE INFOCOM, Alaska, 2007.
|
[22]
|
Y-C. Hu, A. Perrig and D. B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2nd ACM Workshop on Wireless Security ACM, New York, 2003.
|
[23]
|
J. R. Douceur, “The Sybil Attack,” Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, 7-8 March 2002.
|
[24]
|
J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
|
[25]
|
L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
|
[26]
|
B. Parno, A. Perrig and V. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proceedings of the 2005 IEEE Symposium on Security and Privacy, 8-11 May, 2005, Oakland, pp. 49-63.
|
[27]
|
A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer Magazine; Vol. 35, No. 10, 2002, pp. 54-62.
|
[28]
|
Y. Hu, A. Perrig and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, Vol. 3, 30 March-3 April 2003, pp. 1976-1986.
|