real services eavesdropping attack scanning attack and SYN DoS attack to verify

Real services eavesdropping attack scanning attack

This preview shows page 12 - 13 out of 13 pages.

real services, eavesdropping attack, scanning attack and SYN DoS attack to verify the system prototype. REFERENCES [1] H. Chen, G. Xue, and Z. Wang, ‘‘Efficient and reliable missing tag identi- fication for large-scale RFID systems with unknown tags,’’ IEEE Internet Things J. , vol. 4, no. 3, p. 736– 748, Jun. 2017. [2] H. Chen, G. Ma, Z. Wang, Q. Wang, and J. Yu, ‘‘MAC: Missing tag iceberg queries for multi-category RFID systems,’’ IEEE Trans. Veh. Technol. , vol. 67, no. 10, pp. 9947–9958, Oct. 2018. [3] H. Chen, G. Ma, Z. Wang, F. Xia, and J. Yu, ‘‘Probabilistic detection of missing tags for anonymous multicategory RFID systems,’’ IEEE Trans. Veh. Technol. , vol. 66, no. 12, pp. 11295–11305, Dec. 2017. [4] H. Chen, Z. Wang, F. Xia, Y. Li, and L. Shi, ‘‘Efficiently and completely identifying missing key tags for anonymous RFID systems,’’ IEEE Internet Things J. , vol. 5, no. 4, pp. 2915–2926, Aug. 2018. [5] H. Chen, W. Lou, Z. Wang, and F. Xia, ‘‘On achieving asynchronous energy-efficient neighbor discovery for mobile sensor networks,’’ IEEE Trans. Emerg. Topics Comput. , vol. 6, no. 4, pp. 553–565, Oct./Dec. 2018. [6] X. Zhang, H. Chen, K. Lin, Z. Wang, J. Yu, and L. Shi, ‘‘Rmts: A robust clock synchronization scheme for wireless sensor networks,’’ J. Netw. Comput. Appl. , vol. 139, p. 1– 10, Jun. 2019. [7] H. Chen, W. Lou, Z. Wang, and Q. Wang, ‘‘A secure credit-based incentive mechanism for message forwarding in noncooperative dtns,’’ IEEE Trans. Veh. Technol. , vol. 65, no. 8, pp. 6377–6388, Aug. 2016. [8] I. Kuwatly, M. Sraj, Z. Al. Masri, and H. Artail, ‘‘A dynamic honeypot design for intrusion detection,’’ in Proc. IEEE/ACS Int. Conf. Pervas. Services , Jul. 2004, pp. 95–104. [9] S. Anjali and J. Ramesh, ‘‘An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked net- works,’’ Comput. Commun. , vol. 32, no. 12, pp. 1384–1399, Jul. 2009. [10] W. Fan, D. Fernńdez, and Z. Du, ‘‘Versatile virtual honeynet management framework,’’ IET Inf. Secur. , vol. 11, no. 1, pp. 38–45, 2016. [11] U. Joni, R. Sampsa, L. Samuel, and L. Ville, ‘‘A survey on anti-honeypot and anti-introspection methods,’’ in Proc. World Conf. Inf. Syst. Technol. , 2017. [12] P. K. Sharma, S. Rathore, and J. H. Park, ‘‘DistArch-SCNet: Blockchain- based distributed architecture with Li-Fi communication for a scalable smart city network,’’ IEEE Consum. Electron. Mag. , vol. 7, no. 4, pp. 55–64, Jul. 2018. VOLUME 7, 2019 72245
Image of page 12

Subscribe to view the full document.

L. Shi et al. : Dynamic Distributed Honeypot Based on Blockchain [13] H. Wafi, A. Fiade, N. Hakiem, and R. B. Bahaweres, ‘‘Implementation of a modern security systems honeypot honey network on wireless networks,’’ in Proc. Int. Young Eng. Forum (YEF-ECE) , May 2017, pp. 91–96. [14] E. B. El Idrissi Younes, E. M. Fatna, and M. Nisrine, ‘‘A security approach for social networks based on honeypots,’’ in Proc. 4th IEEE Int. Colloq. Inf. Sci. Technol. (CiSt) , Oct. 2016, pp. 638–643. [15] S. Vlad, O. Sebastian, and Y. Der-Yeuan, ‘‘Ascalable honeynet architecture for industrial control systems,’’ in Proc. Int. Joint Conf. E-Bus. Telecom- mun. , 2016, pp. 179–200.
Image of page 13
  • Fall '19
  • sir kashif

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes