[1]
|
Townsend, C. and Arms, S. (2002) Wireless Sensor Networks: Principles and Applications. Sensor Technology Handbook, 11, 575589.
|
[2]
|
Pathan, A.-S.K., Lee, H.-W. and Hong, C.S. (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proceedings of 8th IEEE ICACT 2006, Volume II, Seon Hong, 20-22 February 2006, 1043-1048.
|
[3]
|
Bhatnagar, R. and Shankar, U. (2012) The Proposal of Hybrid Intrusion Detection for Defence of Sync Flood Attack in Wireless Sensor Network. International Journal of Computer Science & Engineering Survey, 3, 31-38.
http://dx.doi.org/10.5121/ijcses.2012.3204
|
[4]
|
Wu, J. and Li, H. (1999) On Calculating Connected Dominating Set for Efficient Routing in Ad-hoc Wireless Networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication (DIAL’M), Seattle, August 1999, 7-14.
|
[5]
|
Haggar, B. (2009) Self-Stabilizing Clustering Algorithm for Ad-hoc Networks. Proceedings of the 5th International Conference on Wireless and Mobile Communications, ICWMC 2009, French Riviera, August 2009, 24-29.
|
[6]
|
Theoleyre, F. and Valois, F. (2005) Virtual Structure Routing in Ad-hoc Networks. IEEE ICC’2005, Seoul, May 2005, 78-82.
|
[7]
|
Ali, K., Sara, M., Belbachir, R., Maaza, Z.M. and Senouci, S.M. (2012) Self-Organization Framework for Mobile Ad-hoc Networks. Proceedings of 8th International conference on Wireless Communications and Mobile Computing, August 2012, 14-22.
|
[8]
|
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. and Dimitriou, T. (2009) Cooperative Intrusion Detection in Wireless Sensor Networks. Wireless Sensor Networks, 5, 263-278.
http://dx.doi.org/10.1007/978-3-642-00224-3_17
|
[9]
|
Stetsko, A., Folkman, L. and Matyas, V. (2010) Neighbor-Based Intrusion Detection for Wireless Sensor Networks. Proceedings of International Conference on Wireless and Mobile Communications, Los Alamitos, 420-425.
|
[10]
|
Giannetsos, A. (2008) Intrusion Detection in Wireless Sensor Networks. Master’s Thesis, Carnegie Mellon University, Pittsburgh.
|
[11]
|
nShield Project (2012) New Embedded Systems Architecture for Multi-Layer Dependable Solutions. Project No: 269317, Selex Elsag, SE Europe.
|
[12]
|
Krontiris, I., Dimitriou, T. and Freiling, F.C. (2007) Towards Intrusion Detection in Wireless Sensor Networks. Proceedings of the 13th European Wireless Conference, Paris, April 2007, 166-173.
|
[13]
|
Krontiris, I., Dimitriou, T., Giannetsos, T. and Mpasoukos, M. (2008) Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks, Springer, Sophia Antipolis, 150-161.
|
[14]
|
Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U. and Arenaza, I. (2012) Reputation-Based Intrusion Detection System for Wireless Sensor Networks. Complexity in Engineering (COMPENG), Aachen, 11-13 June 2012, 1-5.
|
[15]
|
Krontiris, I., Giantsos, T. and Dimitriou, T. (2008) LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ACM, Istanbul, 22-25 September 2008, 1-10.
|
[16]
|
Buchegger, S. and Boudec, J.Y.L. (2003) A Robust Reputation System for Mobile Ad-hoc Networks. Proceedings of P2PEcon, EPFL IC Technical Report IC/2003/50.
|
[17]
|
Jsang, A. and Ismail, R. (2002) The Beta Reputation System. Proceedings of the 15th Bled Electronic Commerce Conference, Bled, 17-19 June 2002, 41-55.
|
[18]
|
Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 4, 1-7.
http://dx.doi.org/10.1145/1362542.1362546
|
[19]
|
Bidgoly, A.J. and Ladani, B.T. (2013) Quantitative Verification of Beta Reputation System Using PRISM Probabilistic Model Checker. Proceedings of 10th International ISC Conference on Information Security and Cryptology (ISCISC), Yazd, 29-30 August 2013, 1-6.
|
[20]
|
Roman, R., Zhou, J.Y. and Lopez, J. (2006) Applying Intrusion Detection Systems to Wireless Sensor Networks. 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, 1, 640-644.
|
[21]
|
Patwardhan, A., Parker, J., Joshi, A., Iorga, M. and Karygiannis, T. (2005) Secure Routing and Intrusion Detection in Ad Hoc Networks. 3rd IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, Kauai Island, 8-12 March 2005, 191-199.
|
[22]
|
Network Simulator NS-2, 2002. http://www.isi.edu/nsnam/ns/index.html
|
[23]
|
Hai, T.H., Huh, E.N. and Jo, M. (2009) A Lightweight Intrusion Detection Framework for Wireless Sensor Networks. Wireless Communications and Mobile Computing, 10, 559-572.
|