Wireless Sensor Network

Wireless Sensor Network

ISSN Print: 1945-3078
ISSN Online: 1945-3086
www.scirp.org/journal/wsn
E-mail: wsn@scirp.org
"Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN"
written by Yu Hu, Yuanming Wu, Hongshuai Wang,
published by Wireless Sensor Network, Vol.6 No.11, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm
IEEE Access, 2022
[2] Secure IoT routing: Selective forwarding attacks and trust-based defenses in RPL network
arXiv preprint arXiv:2201.06937, 2022
[3] Threats and Challenges for Security Measures on the Internet of Things
Law, State and Telecommunications Review, 2022
[4] Survey of Attack Detection and Defense Technologies in Wireless Sensor Networks
2021
[5] Energy Efficient Multi-hop Routing Techniques for Cluster Head Selection in Wireless Sensor Networks
2021
[6] The DPC-Based Scheme for Detecting Selective Forwarding in Clustered Wireless Sensor Networks
2021
[7] A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things
2021
[8] Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
2020
[9] Secure Health Care Data Transmission and Prevention Based on Hybrid Robin Public Key Signature Algorithm
2020
[10] Intrusion Detection Algorithm Based on Change Rates of Multiple Attributes for WSN
2020
[11] A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks
2020
[12] Combine Clustering With Game to Resist Selective Forwarding in Wireless Sensor Networks
2020
[13] DSLA: Defending against Selective Forwarding Attack in Wireless Sensor Networks using Learning Automaton
2020
[14] A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks
2019
[15] Malicious nodes detection algorithm based on triangle module fusion operator in wireless sensor networks
2019
[16] Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
2019
[17] An Enhanced RSSI-Based Detection Scheme for Sybil Attack in Wireless Sensor Networks
2019
[18] Miracles of Healthcare With Internet of Things
2019
[19] A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks
Wireless Personal Communications, 2018
[20] Trust-based protocols for secure collaborative routing in wireless mobile networks
2018
[21] Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review
2018
[22] 传感云中的信任评价机制研究进展
2018
[23] 面向 IPv6 移动 WSNs 的选择性转发攻击检测算法
2018
[24] Survey on trust evaluation mechanism in sensor-cloud
2018
[25] Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues
Journal of Sensors, 2017
[26] Secure data collection in wireless sensor networks.
2017
[27] A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks
2017
[28] An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
International Journal on Semantic Web and Information Systems (IJSWIS), 2017
[29] Sybil Attack Detection Scheme Based on Data Flow Monitoring and RSSI ranging in WSN
2017
[30] An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs
2017
[31] Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs
Conference: Hawaii International Conference on System Sciences, 2016
[32] Fuzzy based Response and Avoidance Technique for DDoS Attacks in WLAN
International Journal of Applied Engineering Research, 2016
[33] A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks
2016
[34] A Security Mechanism for Cluster-Based WSN against Selective Forwarding
Sensors, 2016
[35] Fuzzy-based DDoS attack mitigation for reducing false positives in WLAN
International Journal of Mobile Network Design and Innovation, 2016
[36] A Benchmarking Algorithm for Maximum Bottleneck Node Trust Score-based Data Gathering Trees in Wireless Sensor Networks
International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 2015
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top