Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
- 1 March 2009
- journal article
- Published by Elsevier BV in Journal of Network and Computer Applications
- Vol. 32 (2), 377-387
- https://doi.org/10.1016/j.jnca.2008.02.017
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Defence against packet injection in ad hoc networksInternational Journal of Security and Networks, 2007
- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor NetworksLecture Notes in Computer Science, 2006
- Recovery in the mobile wireless environment using mobile agentsIEEE Transactions on Mobile Computing, 2004
- Mica: a wireless platform for deeply embedded networksIEEE Micro, 2002
- Trusted recoveryCommunications of the ACM, 1999
- Parsec: a parallel simulation environment for complex systemsComputer, 1998
- An architecture for adaptive intelligent systemsArtificial Intelligence, 1995
- Recovery in distributed systems using optimistic message logging and checkpointingJournal of Algorithms, 1990
- The Byzantine Generals ProblemACM Transactions on Programming Languages and Systems, 1982