Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Mobile ad hoc networking: imperatives and challenges

I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

P Michiardi, R Molva - … Communications and Multimedia Security: IFIP TC6 …, 2002 - Springer
Countermeasures for node misbehavior and selfishness are mandatory requirements in
MANET. Selfishness that causes lack of node activity cannot be solved by classical security …

TWOACK: preventing selfishness in mobile ad hoc networks

K Balakrishnan, J Deng… - IEEE Wireless …, 2005 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) operate on the basic underlying assumption that all
participating nodes fully collaborate in self-organizing functions. However, performing …

[图书][B] Ad hoc and sensor networks: theory and applications

CDM Cordeiro, DP Agrawal - 2011 - books.google.com
This book provides a comprehensive yet easy coverage of ad hoc and sensor networks and
fills the gap of existing literature in this growing field. It emphasizes that there is a major …

Reputation-based trust systems for wireless sensor networks: A comprehensive review

H Alzaid, M Alfaraj, S Ries, A Jøsang… - Trust Management VII …, 2013 - Springer
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks
(WSNs), because sensors are deployed for long periods in hostile environments where it is …

Unified real-time tracking and recognition with rotation-invariant fast features

G Takacs, V Chandrasekhar, S Tsai… - 2010 IEEE Computer …, 2010 - ieeexplore.ieee.org
We present a method that unifies tracking and video content recognition with applications to
Mobile Augmented Reality (MAR). We introduce the Radial Gradient Transform (RGT) and …

Wireless sensor network reliability and security in factory automation: A survey

K Islam, W Shen, X Wang - IEEE Transactions on Systems …, 2012 - ieeexplore.ieee.org
Industries can benefit a lot from integrating sensors in industrial plants, structures,
machinery, shop floors, and other critical places and utilizing their sensing and monitoring …

[PDF][PDF] Preventing DoS attacks in wireless sensor networks: A repeated game theory approach.

A Agah, SK Das - Int. J. Netw. Secur., 2007 - Citeseer
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless
sensor networks as a repeated game between an intrusion detector and nodes of a sensor …

A trust model based on fuzzy recommendation for mobile ad-hoc networks

J Luo, X Liu, M Fan - Computer networks, 2009 - Elsevier
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication
path are expected to forward packets of other nodes so that the mobile nodes can …