共 75 条
- [1] Conti M(2014)Clone wars: Distributed detection of clone attacks in mobile WSNs Journal of Computer and System Sciences 80 654-669
- [2] Pietro DR(2014)Detection and mitigation of sinkhole attacks in wireless sensor networks Journal of Computer and System Sciences 80 644-653
- [3] Spognardi A(2003)Secure routing in wireless sensor networks: Attacks and countermeasures AdHoc Networks 1 299-302
- [4] Shafiei H(2018)Data collection for attack detection and security measurement in mobile ad hoc networks: A survey Journal of Network and Computer Applications 105 105-122
- [5] Khonsari A(2012)Sybil attack on lowest id clustering algorithm in the mobile ad hoc network International Journal of Network Security & Its Applications 4 135-147
- [6] Derakhshi H(2009)Detecting Sybil attacks in wireless sensor networks using neighboring information Computer Networks 53 3042-3056
- [7] Mousavi P(2011)Impact of Sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks Journal of Computer Science 7 973-979
- [8] And KC(2008)TDOA-based Sybil attack detection scheme for wireless sensor Journal of Shanghai University 12 66-70
- [9] Wagner D(2010)AOA based trust evaluation scheme for Sybil attack detection in WSN Journal on Application Research of Computers 27 1847-1849
- [10] Liu G(2007)Leveraging identity-based cryptography for node ID assignment in structured P2P systems Advanced Information Networking and Application Workshops 20 1803-1815