An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol
暂无分享,去创建一个
[1] Liang Chen,et al. An Improved LEACH for Clustering Protocols in Wireless Sensor Networks , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.
[2] Hu Han-ying,et al. An Improved LEACH Protocol for Data Gathering and Aggregation in Wireless Sensor Networks , 2008, 2008 International Conference on Computer and Electrical Engineering.
[3] Soumya K. Ghosh,et al. An Approach for Security Assessment of Network Configurations Using Attack Graph , 2009, 2009 First International Conference on Networks & Communications.
[4] Liu Jun,et al. A modified LEACH algorithm in wireless sensor network based on NS2 , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).
[5] Dirk Timmermann,et al. Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.
[6] Lei Wei,et al. Improving the leach protocol for wireless sensor networks , 2010 .
[7] Jian-Feng Yan,et al. Improved LEACH routing protocol for large scale wireless sensor networks routing , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[8] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[9] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[10] Wang Sheng,et al. Performance Comparison of LEACH and LEACH-C Protocols by NS2 , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[11] Abraham O. Fapojuwo,et al. A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.
[12] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).