2017
DOI: 10.1109/access.2017.2648853
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Authors in [26] presented a technique based on a graph approach where if the assumptions of the proposed solution parameters are not valid in a real deployment, that would result in wormhole detection failure. Also, some other recent solutions presented in [27]- [29] use nodes connectivity considering ideal parameter presumptions that won't be applicable in real networks. Authors in [30]- [32] presented useful solutions that use neighboring approach, however, their wormhole detection methods are not comprehensive and hard to implement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authors in [26] presented a technique based on a graph approach where if the assumptions of the proposed solution parameters are not valid in a real deployment, that would result in wormhole detection failure. Also, some other recent solutions presented in [27]- [29] use nodes connectivity considering ideal parameter presumptions that won't be applicable in real networks. Authors in [30]- [32] presented useful solutions that use neighboring approach, however, their wormhole detection methods are not comprehensive and hard to implement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…J.Ho et al [4] show that in sensor networks the remote certification is used for detection of self-propagating network worms by sequentially infecting nodes using traffic detection methods.…”
Section: Related Workmentioning
confidence: 99%
“…In 2017, Wang et al [16] proposed an active P2P worm dynamic isolation strategy and constructed the corresponding propagation model based on which the stability of worm propagation was analysed. Ho et al [17] considered network topology, node configuration, counterattack measures, defence strategy and infection time when modelling, and proposed P2P active topology worm propagation model. Wang et al [18] proposed the P2P active worm propagation model based on the ternary logic matrix.…”
Section: Related Workmentioning
confidence: 99%