Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Comparison of Link Layer Attacks on Wireless Sensor Networks"
written by Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy,
published by Journal of Information Security, Vol.2 No.2, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] بكارگيري اتوماتاهاي يادگير در خنثي كردن حمله ارسال انتخابي در شيكه هاي حسگر بي سيم‎
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING
[2] Security in Communication for Intelligent Wireless Sensor Networks: Issues and Challenges
… Intelligence for Wireless …, 2022
[3] Battery-less IoT Devices: Energy Source Manipulation Attacks
2022
[4] Computational Intelligence for Wireless Sensor Networks: Principles and Applications
2022
[5] DATA SECURITY—THE NEXT IMPERATIVE IN HEALTHCARE SYSTEMS
Biomedical Engineering: Applications, Basis …, 2022
[6] Secure Routing Protocol for Wireless Sensor Networks: Survey
2022 8th International …, 2022
[7] Securitatea rețelelor IoT
2022
[8] WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS UNDER SINKHOLE ATTACKS.
Isawi… - International Journal of …, 2021
[9] State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions
Sustainability, 2021
[10] A robust fixed path-based routing scheme for protecting the source location privacy in WSNs
2021 17th International …, 2021
[11] Detection and classifying security attacks in wireless sensor networks
2021
[12] Comparison of Various Attacks on WSN Layers—Based on the Site of the Attacker and Access Level
2021
[13] Internet of Things 2.0: Concepts, Applications, and Future Directions
2021
[14] Cloud Network Management: An IoT Based Framework
2020
[15] Defense Against Integrity and Privacy Attacks in The Internet of Things
2020
[16] A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)
2020
[17] NB-IoT Security: A Survey
2020
[18] Khảo sát các vấn đề bảo mật trong mạng cảm biến không dây
2020
[19] Методы и алгоритмы оценки защищенности встроенного программного обеспечения на основе нечеткой логики
2020
[20] Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems
2020
[21] An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks
2019
[22] A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas
2019
[23] Privacy-aware query processing in vehicular ad-hoc networks
2019
[24] A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare
2019
[25] Sinkhole Attack Detection in A Wireless Sensor Networks using Enhanced Ant Colony Optimization to Improve Detection Rate
2019
[26] A Modified Leach Routing Algorithm for Increasing Lifetime of the Wireless Sensor Network
2018
[27] Anatomy of Threats to the Internet of Things
2018
[28] Sensor Networks Attacks Classifications and Mitigation
2018
[29] Classification of Attacks on Wireless Sensor Networks: A Survey
2018
[30] Active defense strategy against jamming attack in wireless sensor networks
2018
[31] Об одном подходе к формированию перечня мер по защите информации в беспроводных сенсорных сетях газодобывающего предприятия
2018
[32] A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach
International Journal of Information System Modeling and Design (IJISMD), 2018
[33] Wireless Sensor Network Security for Cyber-Physical Systems
Cyber Security for Cyber Physical Systems, 2018
[34] WSN Security Mechanisms for CPS
Cyber Security for Cyber Physical Systems, 2018
[35] Implementation of Multiple layer security of Cloud server
2018
[36] Proposing a Behavior-Based IDS Model for IoT Environment
Information Systems: Research, Development, Applications, Education, 2018
[37] A review on security and privacy issues in wireless sensor networks
2017
[38] AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN)
2017
[39] Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control
Electronics, 2017
[40] Recognizing Attacks in Wireless Sensor Network in View of Internet of Things
Internet of Things: Novel Advances and Envisioned Applications, 2017
[41] A Survey of Wireless Sensor Network Attacks
Communications on Applied Electronics, 2017
[42] High-level design of Wireless sensor networks for performance optimization under security hazards
ACM Transactions on Sensor Networks (TOSN), 2017
[43] Customized Hardware Crypto Engine for Wireless Sensor Networks
2017
[44] Security Issues in Wireless Sensor Networks
Journal of Multidisciplinary Engineering Science Studies (JMESS), 2017
[45] A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks
International Journal of Computer Applications, 2017
[46] Sistemas embebidos en red seguros
2017
[47] Malware propagation in Wireless Sensor Networks: global models vs Individual-based models
2017
[48] Secure data collection in wireless sensor networks.
2017
[49] A REVIEW OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
2017
[50] PROTECTION ISSUES IN WORMHOLE ATTACK
International Journal of Scientific Development and Research, 2017
[51] La primera edición expurgada de una letrilla de Juan Meléndez Valdés
La primera edición expurgada de una letrilla de Juan …, 2017
[52] Keamanan Jaringan Sensor Nirkabel: Serangan dan Solusinya
2016
[53] Keamanan dalam Jaringan Sensor Nirkabel: Serangan dan Solusi
2016
[54] Security Attacks and Defense Mechanisms in Wireless Sensor Network: A Survey
2016
[55] Review on Security Issues in Wireless Sensor Networks
2016
[56] Impact van publieke sleutel cryptografie op draadloze sensornetwerken
2016
[57] Security in Wireless Sensor Networks: Attacks and Solutions
environment, 2016
[58] Light Weight Authentication framework for WSN
International Conference on El ectrical, Electronics, and Optimization Techni ques (ICEEOT) , 2016
[59] Simulation of Attacks for Security in Wireless Sensor Network
Sensors, 2016
[60] Security issues in wireless networks: An overview
2016
[61] A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16, 2016
[62] A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks
2016
[63] A Review: DoS and DDoS Attacks
2015
[64] Secure Data Collection Using Randomized Multipath Routing
International Journal on Recent and Innovation Trends in Computing and Communication, 2015
[65] Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs
International Journal of Distributed Sensor Networks, 2015
[66] Wireless Sensor Networks: Virtual Platform for Performance Analysis and Attack Simulation
Trusted Computing for Embedded Systems, 2015
[67] Efficient Power Utilization with Reactive Routing Protocols in Mobile Ad-Hoc Networks under the influence of Application layer Attack
International Journal of Software & Hardware Research in Engineering, 2015
[68] a Security ScheMe for video StreaMing in wireleSS MultiMedia SenSor networkS
2015
[69] A survey of security attacks, defenses and security mechanisms in wireless sensor network
2015
[70] Security Attacks, challenges and Mechanisms for security in Wireless Sensor Network: A survey
2015
[71] Comparative Analysis of WSN MAC Protocols and Node Clone Attack
2015
[72] ASecurity SCHEME FOR VIDEO STREAMING IN WIRELESS MULTIMEDIA SENSOR NETWORKS
2015
[73] Attacks in wireless sensor networks
2014
[74] An efficient and optimal clustering algorithm for real-time forest fire prediction with
Communications and Signal Processing (ICCSP), 2014 International Conference on, 2014
[75] A Novel Clustering Algorithm for Homogenous and Large-Scale Wireless Sensor Networks: Based on Sensor Nodes Deployment Location Coordinates
IJCSNS, 2014
[76] Attacks And Counterattacks On Wireless Sensor Networks
arXiv preprint arXiv:1401.4443, 2014
[77] A Comprehensive Comparison of Attacks in Wireless Sensor Networks
2014
[78] Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
The Computer Journal, 2014
[79] Detection of DOS attack and Sink hole In WSN
2014
[80] Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes
IJ Information Technology and Computer Science, 2014
[81] Routing Attacks in Wireless Sensor Networks: A Survey
2014
[82] Randomised multipath routing for secure data collection
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on, 2014
[83] SCHEDULING ALGORITHMS OF REAL TIME SYSTEM AN OVERVIEW
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, 2014
[84] Detection of Sinkhole attack in Wireless Sensor Networks using Mobile agent and multiple Base stations
2014
[85] ANALYSIS OF AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST NODE MISBEHAVIOR ATTACKS IN WIRELESS SENSOR NETWORKS
2014
[86] Plataforma virtual para el análisis del rendimiento y la seguridad en redes de sensores inalámbricos
2014
[87] Détection d'attaques dans un système WBAN de surveillance médicale à distance
Thesis, 2014
[88] An ECC-Based Secure Routing Protocol for Wireless Sensor Network
Sensors & Transducers, 2014
[89] Agent-based intrusion detection and self-recovery system for wireless sensor networks
Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on, 2013
[90] Plug–and–play mechanism for plain transducers with wired digital interfaces attached to wireless sensor network nodes
International Journal of Sensor Networks, 2013
[91] Data link layer security protocols in wireless sensor networks: A survey
Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on, 2013
[92] Detection of Wormhole Attacks in Wireless Sensor Networks
Thesis, 2013
[93] An Introduction to Various Basic Concepts of Clustering Techniques on Wireless Sensor Networks
International Journal of Computational Engineering Research (IJCER), 2013
[94] Investigation of Application Attack on MANET
IJCA June, 2013
[95] HCERHSW: A Hierarchical, Clustering-based and Energy-aware Routing Algorithm for Homogenous and Static Wireless Sensor Networks
2013
[96] A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks
Wireless Communication, 2013
[97] Review of main security threats in Smart Home networks
2012
[98] Attacks and Countermeasures in Wireless Sensor Network
International Journal of Computer Science and Communication Engineering, IJCSCE Special issue on “Emerging Trends in Engineering” ICETIE, 2012
[99] A Secure Energy Mechanism for WSN and Its Implementation in NS-2
Wireless Communication, 2012
[100] WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
2012
[101] Attacks and Countermeasures in Wireless Sensor Networks
2012
[102] A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
Wireless Sensor Network, 2011
[103] A hierarchical intrusion detection architecture for wireless sensor networks
International Journal of Network Security and its Applications (IJNSA), 2011
[104] Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
Int'l J. of Communications, Network and System Sciences, 2011
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top