

Node Clone Detection with Maximum Throughput and PDR in Wireless Sensor Network
Abstract
Keywords
References
Anis Koubâa1,2, Ricardo Severino1, Mário Alves1,Eduardo Tovar1,” Improving Quality-of-Service in Wireless Sensor Networks by mitigating “hidden-node collisions”,IEEE,2010
B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security Privacy, 2005, pp. 49–63.
C.Bekara And M.L.Maknavicius,”A new protocol for securing wsn against node replication attacks,”in third IEEE International Conference on wireless and mobile computing, networking and communications,2007,pp59-59
Chih-Jen Tseng Chyou-Hwa Chen(2012), “Multicastextensions to QOSPF”,in proc NSC 93-2213 e Volume 23,no.8 pp. 149-005.
H.Wen,J.Luo,L.Zhou,”Light weight and effective detection scheme for node clone attacks in wsn”, in proc IET wsn,2011.
.Stoica,R.Morris,,D.L.Nowell,D,R.Karger,M.F.Kaashoek,Hari Balakrishnan,”Chord:a scalable peer to peer look up protocol for internetapplications,‟IEEE/ACMTrans.Netw.,vol.11,no.1,pp,17-32,Feb.2003.
Kai Xing, X.Chen,D.H.C Du,F.Liu,”Real time detection of clone attacks in wireless sensor networks”, IEEE infocom,2008.
Mark A. Perillo and Wendi BHeinzelman“Wireless Sensor Network Protocols”,in IEEE info,2009
Peng Zhang, Raimo Kantola, Zhansong Ma (2009),”DesignAnd Implementation Of a NewRouting Simulator”,in proc. IEEE IPANA.communication Volume 45.no.9 pp 345-354.
Zhijun Li And Guang Gong, ”Randomly directed exploration: an efficient node clone detection protocol in wireless sensor network” ,in proc 5 th IEEE Trans.Volume 11,pp34-4..2009
Zhijun Li, Member, IEEE, and Guang Gong,,“.On the Node Clone Detection in Wireless Sensor Networks”, in proc 5th IEEE transactions,Volume 40,no.11,pp 17-23,2013.
www.wikipedia.com
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.