Computer Science ›› 2017, Vol. 44 ›› Issue (8): 129-133.doi: 10.11896/j.issn.1002-137X.2017.08.023
Previous Articles Next Articles
LIU Zhi-feng, CHEN Kai, LI Lei and ZHOU Cong-hua
[1] MAHMOOD M A,SEAH W K G,WELCH I.Reliability inwireless sensor networks:A survey and challenges ahead[J].Computer Networks,2015,79:166-187. [2] DENG X,ZHANG L J.Overview of WSNs survivability enhancing technology[J].Transducer and Microsystem Technologies,2014,3(1):1-4.(in Chinese) 邓鑫,张乐君.无线传感器网络可生存性增强技术研究概述[J].传感器与微系统,2014,33(1):1-4. [3] ZHANG H,CHENG P,SHI L,et al.Optimal DoS Attack Sche- duling in Wireless Networked Control System[J].IEEE Tran-sactions on Control Systems Technology,2015,24(3):843-852. [4] BHISE A M,KAMBLE S D.Review on Detection and Mitigation of Sybil Attack in the Network[J].Procedia Computer Science,2016,78:395-401. [5] GUI M Q,LIU Y B,ZHOU L Y.Intrusion detection based on game theory in wireless sensor network[J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2016,28(3):414-420.(in Chinese) 桂明倩,刘宴兵,周瞭永.WSN中基于博弈理论的入侵检测研究[J].重庆邮电大学学报(自然科学版),2016,28(3):414-420. [6] JI G Y.Tolerate Invasion Ability Evaluation Modeling Wireless Network Simulation Analysis[J].Computer Simulation,2016,33(7):273-276.(in Chinese) 姬广永.无线网络中容忍入侵能力评估模型仿真分析[J].计算机仿真,2016,33(7):273-276. [7] FU X W,LI W F,DUAN Y.Invulner-Ability of ClusteringWireless Sensor Networks Towards Cascading Failures[J].Journal of Computer Research and Development,2016,53(12):2882-2892.(in Chinese) 符修文,李文锋,段莹.分簇无线传感器网络级联失效抗毁性研究[J].计算机研究与发展,2016,53(12):2882-2892. [8] ZHU S C,WANG H T,WU L C,et al.Survivability Estimation Model for Clustered Wireless Sensor Network Based on SMP[J].Chinese Journal of Sensors & Actuators,2014,27(3):383-387.(in Chinese)朱世才,王海涛,吴连才,等.基于SMP的分簇WSN生存性评估模型[J].传感技术学报,2014,27(3):383-387. [9] YI Z,DOHI T,OKAMURA H.Survivability modeling and ana-lysis for a power-aware wireless ad hoc network[C]∥International Congress on Ultra Modern Telecommunications and Control Systems and Workshops.IEEE,2012:813-819. [10] XIONG S M,WANG L M,ZHAN Y Z.Quantitative evaluation of topology intrusion tolerance in wireless sensor networks based on semi-Markov process[J].Journal on Communications,2010, 31(7):24-32.(in Chinese) 熊书明,王良民,詹永照.基于SMP的无线传感器网络拓扑容侵定量评估[J].通信学报,2010,31(7):24-32. [11] SHEN S G,HUANG L J,FAN E.Survivability evaluation for WSNs under malware infection[J].Chinese Journal of Sensors and Actuators,2016,29(7):1083-1089.(in Chinese) 沈士根,黄龙军,范恩.受恶意程序传染的WSNs可生存性评估[J].传感技术学报,2016,29(7):1083-1089. [12] LI J P,WANG X K.WSN reliability evaluation based on fuzzy neural network[J].Journal of Computer Applications,2016,36(A02):69-72.(in Chinese) 李建平,王晓凯.基于模糊神经网络的无线传感器网络可靠性评估[J].计算机应用,2016,36(A02):69-72. [13] YUE Y,LI J,FAN H,et al.An efficient reliability evaluation method for industrial wireless sensor networks[J].Journal of Southeast University,2016,32(2):195-200. [14] YI Z,DOHI T.Survivability Analysis for a Wireless Ad HocNetwork Based on Semi-Markov Model[J].IEICE Transactions on Information&Systems,2012,E95.D (12):2844-2851. [15] CHANG C J,ZHU C H,WANG H G,et al.Survivability Evalua-tion of Cluster-Based Wireless Sensor Network under DoS Attacks[C]∥Wireless Communications,Networking and Mobile Computing.2009. [16] STAVROU E,PITSLLIDES A.Situation aware intrusion reco-very policy in WSNs[C]∥International Conference on Cyber Si-tuational Awareness,Data Analytics and Assessment.2016:1-8. [17] VIRMANI D,KAUR S,JAIN S.Secure and Fault Tolerant Dynamic Cluster Head Selection Method for Wireless Sensor Net- works [J].Procedia Computer Science,2015,46(2):989-996. [18] NEWELL A,YAO H,RYKER A,et al.Node-Capture Resilient Key Establishment in Sensor Networks:Design Space and New Protocols [J].Acm Computing Surveys,2015,47(2):1-34. [19] HAMMOUDEH M,NEWMAN R.Adaptive routing in wireless sensor networks:QoS optimisation for enhanced application performance [J].Information Fusion,2015,22(71):3-15. [20] WARD J R,YOUNIS M.Base Station anonymity distributedSelf-assessment in Wireless Sensor Networks[C]∥IEEE International Conference on Intelligence and Security Informatics.IEEE,2015. [21] KIM T Y,LEED R.Communication method,base station,communication system,and mobile terminal [J].Journal of Organizational Behavior,2015,30(7):1001-1018. [22] ZHANG Q,YU T,NING P.A Framework for Identifying Com- promised Nodes in Wireless Sensor Networks [J].ACM Tran-sactions on Information & System Security,2008,11(3):1-10. [23] SINGH V P,JAIN S,SINGHAI J.Hello Flood Attack and its Countermeasures in Wireless Sensor Networks [J].InternationalJournal of Computer Science Issues,2010,7(3):23-24. [24] KARLOF C,WAGNER D.Secure routing in wireless sensor net-works:attacks and countermeasures[C]∥IEEE International Workshop on Sensor Network Protocols and Applications,2003.IEEE,2003:293-315. [25] GOYAL S,BHATIA T,VERMA A K.Wormhole and Sybil attack in WSN:A review[C]∥International Conference on Computing for Sustainable Global Development.IEEE,2015. [26] ZHANG Y,FAN K F,ZHANG S B.AOA based trust evaluation scheme for Sybil attack detection in WSN[J].Application Research of Computers,2010,27(5):1847-1844.(in Chinese) 张艳,范科峰,张素兵.一种基于AOA信任评估的无线传感器网络Sybil攻击检测新方法[J].计算机应用研究,2010,27(5):1847-1849. |
No related articles found! |
|