Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Reference :

  1. [1] S. Chen, B. Mulgrew, and P. M. Grant, “A clustering technique for digital communications channel equalization using radial basis function networks,” IEEE Trans. on Neural Networks, vol. 4, pp. 570-578, July 1993.

    [2] Chan, Haowen, and Adrian Perrig. "Security and privacy in sensor networks." Computer 36.10 (2003): 103-105.

    [3] Mirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms." ACM SIGCOMM Computer Communication Review 34.2 (2004): 39-53.

    [4] Wood, Anthony D., and John A. Stankovic. "Denial of service in sensor networks." Computer 35.10 (2002): 54-62.

    [5] Li, Bai, and Lynn Batten. "Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks." Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. IEEE, 2007.

    [6] Xu, Wenyuan, et al. "Jamming sensor networks: attack and defensestrategies." Network, iEEE 20.3 (2006): 41-47.

    [7] Jain, Sushil Kumar, and Kumkum Garg. "A hybrid model of defense techniques against base station jamming attack in wireless sensor networks." Computational Intelligence, Communication Systems and Networks, 2009. CICSYN'09. First International Conference on. IEEE, 2009.

    [8] Badal, Tapas, and Dipti Verma. "A Modular Approach for Intrusion Detection System in Wireless Networks." (2011): 57-61. [9] Xie, Miao, et al. "Anomaly detection in wireless sensor networks: A survey." Journal of Network and Computer Applications 34.4 (2011): 1302- 1325.

    [10] M. Kaur, A. Jain and A. K. Goel, "Energy Efficient Two Level Distributed Clustering Scheme to Prolong Stability Period of Wireless Sensor Network", International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 68-73

    [11] David R. Raymond and Scott F. Midkiff,(2008) "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp. 74-81.

    [12] Deng, J., Han, R., and Mishra, S. (2005), Defending against Path-based DoS Attacks in Wireless Sensor Networks. ACM SASN’05, November 7, 2005, Alexandria, Virginia, USA, pp 89-96.

    [13] Doddapaneni.krishna chaitanya “Analysis of Denial-of-Service attacks on WSN using simulation” Middlesex University. [14] Al-sakib Khan Pathan “Denial of Service in Wireless sensor networks: issues and challenges.”Advances in communications and Media Research ISBN 978-1-60876-576-8.

    [15] A. Agah, S. K. Das, and K. Basu, “Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, ” Proceedings of 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), Washington, D.C., Nov. 2005.

    [16] Afrand Agah, Mehran Asadi and Sajal K, “Preventing of DoS Attacks using Repeated Game Theory”, May 2007.

    [17] Ouyang Xi, Tian Bin, Li Qi, Zhang Jian-yi, Hu Zheng-Ming, Xin Yang,“A Novel Framework of Defense System Agaist DoS attacks in WSN”, IEEE 2011.

    [18] S. Marti, T. Giuli, K. Lai, M. Baker,“Mitigating routing misbehaviour in mobile ad hoc networks”, In Proceedings of ACM International Conference on


Recent Article