Energy trust system for detecting sybil attacks in clustered wireless sensor network
Recently, much more attention has been attracted in the wireless sensor networks.It consists of a large number of small sensing self-powered nodes with resource constraints such as limited computing capability, memory, and energy. Hencesensor nodes generally are deployed in the remote and hostile en...
| Main Author: | Hussein, Noor Sabeeh |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/70403/ http://psasir.upm.edu.my/id/eprint/70403/1/FK%202016%2069%20-%20IR.pdf |
Similar Items
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network
by: Jasim, Al-Haddad Zaid Ali
Published: (2017)
by: Jasim, Al-Haddad Zaid Ali
Published: (2017)
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
by: Mustafa, Mayada Salih Abdalla
Published: (2019)
by: Mustafa, Mayada Salih Abdalla
Published: (2019)
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
by: Abd, Wamidh Jwdat
Published: (2019)
by: Abd, Wamidh Jwdat
Published: (2019)
Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks
by: Farhan, Husam Kareem
Published: (2014)
by: Farhan, Husam Kareem
Published: (2014)
Secure geographic forwarding protocols for wireless sensor networks
by: Adnan, Ali Idarous
Published: (2017)
by: Adnan, Ali Idarous
Published: (2017)
Search algorithms for path planning problems in harsh wireless sensor network environment
by: Hong, Siaw Swin
Published: (2017)
by: Hong, Siaw Swin
Published: (2017)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
Efficient node cooperation stimulation mechanism in wireless multihop networks
by: Samian, Normalia
Published: (2017)
by: Samian, Normalia
Published: (2017)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Industrial IT revolution through wireless sensor network technologies
by: Petersen, S., et al.
Published: (2008)
by: Petersen, S., et al.
Published: (2008)
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
by: Mustapha, Ibrahim
Published: (2016)
by: Mustapha, Ibrahim
Published: (2016)
Watermarking technique for wireless multimedia sensor networks: A state of the art
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Energy-efficient medium access control strategy for cooperative wireless networks
by: Sami, Mahmoud
Published: (2016)
by: Sami, Mahmoud
Published: (2016)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Fuzzy logic system and mediation device node with grids for energy saving in wireless sensor network
by: Salameh, Emad Mohammed Ibbini
Published: (2019)
by: Salameh, Emad Mohammed Ibbini
Published: (2019)
Firefly-inspired time synchronization mechanism for self-organizing energy efficient wireless sensor networks
by: Al-Mekhlafi, Zeyad Ghaleb Aqlan
Published: (2017)
by: Al-Mekhlafi, Zeyad Ghaleb Aqlan
Published: (2017)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
by: Ceesay, Omar M.
Published: (2011)
by: Ceesay, Omar M.
Published: (2011)
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
by: Hamdi, Ayman Majid
Published: (2019)
by: Hamdi, Ayman Majid
Published: (2019)
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
by: Nokhanji, Nooshin
Published: (2014)
by: Nokhanji, Nooshin
Published: (2014)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
by: Jiang, Cailing
Published: (2019)
by: Jiang, Cailing
Published: (2019)
Hexagonal grid-based dynamic routing adjustment for optimising network lifetime in wireless sensor network
by: Jarallah, Zaid Fawaz
Published: (2017)
by: Jarallah, Zaid Fawaz
Published: (2017)
An Energy Efficient Mac Layer Design for Wireless Sensor Network
by: Ghazvini, Mohammad Hossein Fotouhi
Published: (2008)
by: Ghazvini, Mohammad Hossein Fotouhi
Published: (2008)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
Similar Items
-
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019) -
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018) -
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014) -
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015) -
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)