Author:
Patel Manish,Aggarwal Akshai,Chaubey Nirbhay
Reference11 articles.
1. Y. C. Hu, A. Perrig and D. B. Johnson; “Packet leashes: a defense against wormhole attacks in wireless networks” IEEE Computer and Communications Societies, IEEE, vol. 3, pp. 1976–1986, 2003.
2. Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal; “Wireless sensor network survey” International Journal of Computer and Telecommunications Networking, volume 52, Issue 12, August 2008, pp 2292–2330.
3. Padmavathi, G., Shanmugapriya, D.; “A survey of attacks, security mechanisms and challenges in wireless sensor networks” International Journal of Computer Science and Information Security (IJCSIS) 2009, 4, 117–125.
4. Ayaz Hassan Moon, N.A. Shah, Ummer Iqbal, Adil Ayub; “Simulating and Analysing Basic Security Attacks in Wireless Sensor Networks using QualNet” IEEE International Conference on Machine Intelligence Research and Advancement 2013.
5. Li Lu, Muhammad Jawad Hussain, Guoxing Luo and Zhigang Han; “Pworm: passive and Real-Time Wormhole Detection Scheme for WSNs”, International Journal of Distributed Sensor networks, Volume 2015, Article ID 356382, 16 pages.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT and Cyber Security;Quantum Cryptography and the Future of Cyber Security;2020
2. Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks;Wireless Personal Communications;2019-02-08