DOI:10.20894/IJBI. Periodicity: Bi Annual. Impact Factor: SJIF:5.065 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Paul Klint , Chris Verhoef, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", In ICISC, Springer-Verlag ,2002 View Artical
F. Stajano, R. Anderson, "An Energy- Efficient MAC Protocol for Wireless Sensor Networks", IEEE INFOCOM, New York ,2000 View Artical
Ye. Wei, J. Heidemann, and D. Estrin, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense", International Journal of Distributed Sensor Networ ,Vol.2 ,Issue 3 ,2002 View Artical
M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, and M. Kandemir, "A Synchronization Attack and Defense in Energy- Efficient Listen-Sleep Slotted MAC Protocols", SECURWARE '08. Second International Conference on ,2006 View Artical
L. Xiaoming, M. Spear, K. Levitt, N.S. Matloff, and S.F. Wu, "Wireless sensor network denial of sleep attack", In Proc. 6th Annu. IEEE SMC Inf. Assurance Worksho ,2008 View Artical
M. Brownfield, Y. Gupta, and N. Davis, "Link-layer Jamming Attacks on SMAC ,2005 View Artical
Y.l. Law,, "Radio Jamming attacks against two popular mobile networks", Helsinki University of Tech. Seminar on Network Se ,2005 View Artical
M. Stahlberg, "An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks", Fifth International Conference on Information Assu ,2000 View Artical
C.C. Li, H.Q. Pei, and L. P. Ning, Qingquan, "Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols", IEEE transactions on vehicular technology ,Vol.58 ,Issue 1 ,2009 View Artical