|
Reference
|
|
Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K. (2013) Lightweight Sybil Attack Detection in MANETs. IEEE Systems Journal, Vol. 7, No. 2, June, pp. 236 - 248
|
|
Akourmis, S., Fakhri, Y., Rahmani, M.D. (2018) Reducing Blackhole Effect in WSN. u: The International Conference on Innovations in Bio-Inspired Computing and Applications, Kochi, India, December, Proceedings of, 13-24
|
8
|
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E. (2002) Wireless sensor networks: A survey. Computer Networks, Vol. 38, No. 4, March, pp. 393 - 422
|
1
|
Alam, S., De, D. (2014) Analysis of Security Threats in Wireless Sensor Network. International Journal of Wireless & Mobile Networks, Vol. 6, No. 2, April, pp. 35 - 46
|
|
Alsaedi, N., Hashim, F., Sali, A., Rokhani, F.Z. (2017) Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Computer Communications, Vol. 110, September, pp. 75 - 82
|
|
Douceur, J.R. (2002) The Sybil Attack. u: The International Workshop on Peer-to-Peer Systems (IPTPS) (1st), Cambridge, USA, March, Proceedings of, 251-260
|
|
Elhoseny, M., Hassanien, A.E. (2019) Secure Data Transmission in WSN: An Overview. u: Dynamic Wireless Sensor Networks (Studies in Systems, Decision and Control), Cham: Springer International Publishing, Ch. 6, Vol. 165, pp. 115 - 43, 1 st Edition
|
|
Gao, H., Wu, R., Cao, M., Zhang, C. (2014) Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network. u: The International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) (14th), Dalian, China, August, Proceedings of, 601-610
|
|
Hemanth, K.T., Kowshik, K.V.K., Revathi, M. (2019) Detection of Blackhole Attacks in Wireless Sensor Networks. International Journal of Innovative Technology and Exploring Engineering, Vol. 8, No. 11s, September, pp. 1203 - 1205
|
|
Issariyakul, T., Hossain, E. (2009) Introduction to Network Simulator 2 (NS2). New York-London: Springer, Ch. 2, 2 nd Edition
|
|
Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A.M., Meybodi, M.R. (2019) A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. Wireless Personal Communications, Vol. 105, No. 1, March, pp. 145 - 173
|
|
Jan, M.A., Nanda, P., He, X., Liu, R.P. (2018) A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, Vol. 80, March, pp. 613 - 626
|
|
Jayashree, S., Mohanraj, T. (2015) Vampire Attack Detection in Wireless Sensor Networks. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No. 2, February, pp. 751 - 756
|
|
Kardi, A., Zagrouba, R. (2019) Attacks classification and security mechanisms in Wireless Sensor Networks. Advances in Science, Technology and Engineering Systems Journal, Vol. 4, No. 6, November, pp. 229 - 243
|
|
Karlof, C., Wagner, D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. u: The IEEE International Workshop on Sensor Network Protocols and Applications (1st), Anchorage, USA, May, Proceedings of, 113-127
|
|
Keerthika, M., Shanmugapriya, D. (2021) Wireless Sensor Networks: Active and Passive attacks-Vulnerabilities and Countermeasures. Global Transitions Proceedings, Vol. 2, No. 2, November, pp. 362 - 367
|
|
Kowsalya, R., Roseline, J.B. (2021) Cluster based data-aggregation using lightweight cryptographic algortihm for wireless sensor networks. Materials Today: Proceedings, February, pp. 1 - 8
|
|
Kumar, D.U.S.R., Vayanaperumal, R. (2015) Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. Scientific World Journal, Vol. 2015, July, p. 841267
|
|
Kumari, D., Singh, K., Manjul, M. (2020) Performance Evaluation of Sybil Attack in Cyber Physical System. Procedia Computer Science, Vol. 167, pp. 1013 - 1027
|
|
Mi, W., Hui, L., Yan-Fei, Z., Ke-Fei, Ch. (2008) TDOA-Based Sybil Attack Detection Scheme for Wireless Sensor Networks. Journal of Shanghai University, Vol. 12, No. 1, February, pp. 66 - 70
|
|
Newsome, J., Shi, E., Song, D., Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis & Defenses. u: The International Symposium on Information Processing in Sensor Networks (IPSN) (3rd), Berkeley, USA, April, Proceedings of, 259-268
|
|
Portillo, C., Martinez-Bauset, J., Pla, V. (2018) Modelling of S-MAC for Heterogeneous WSN. u: The IFIP International Conference on New Technologies, Mobility and Security (NTMS) (9th), Paris, France, February, Proceedings of, pp. 1 - 6
|
|
Raja, N.K., Beno, M.M. (2017) Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto (FO) Authentication Scheme Against Sybil Attack. Journal of Medical Systems, Vol. 41, No. 7, July, pp. 107
|
|
Rehman, A., Rehman, S.U., Raheem, H. (2018) Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Personal Communications, Vol. 106, No. 4, June, pp. 2291 - 2313
|
|
Santhi, G., Sowmiya, R. (2017) A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks. International Journal of Computer Applications, Vol. 159, No. 7, February, pp. 7 - 11
|
|
Sarma, H.K., Kar, A. (2006) Security Threats in Wireless Sensor Networks. u: The Annual International Carnahan Conference on Security Technology (40th), Lexington, USA, October, Proceedings of, 243-251
|
|
Saud, K.M., Khan, N.M. (2016) Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks. Journal of Sensors, Vol. 2016, August, pp. 9783072
|
|
Shi, W., Liu, S.Y., Zhang, Z. (2015) A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. KSII Transactions on Internet and Information Systems, Vol. 9, No. 9, September, pp. 3738 - 3750
|
|
Sujatha, V., Mary, A.E.A. (2019) Identity based Scheme A gainst Sybil Attacks in Wireless Sensor Networks. International Journal of Engineering and Advanced Technology, Vol. 9, No. 1, October, pp. 5350 - 5355
|
|
Vinet, L., Zhedanov, A. (2011) A 'missing' family of classical orthogonal polynomials. Journal of Physics A: Mathematical and Theoretical, Vol. 44, No. 8, February, pp. 1 - 16
|
|
Wadii, J., Rim, H., Ridha, B. (2019) Detecting and preventing Sybil attacks in wireless sensor networks. u: The IEEE Mediterranean Microwave Symposium (MMS) (19th), Hammamet, Tunisia, October, Proceedings of, October, pp. 1 - 5
|
|
Yousefpoor, M.S., Yousefpoor, E.S., Barati, H., Barati, A., Movaghar, A., Hosseinzadeh, M. (2021) Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, Vol. 190, September, pp. 103118
|
|
|
|