Secured distributed routing technique using extended DART and table elimination (ET-DART) technique in wireless sensor networks environment
暂无分享,去创建一个
[1] Tomoyuki Ohta,et al. Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks , 2011, IEICE Trans. Inf. Syst..
[2] K. Shankar,et al. Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments , 2020, Peer-to-Peer Netw. Appl..
[3] Yoshiaki Kakuda,et al. On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing Method , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[4] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[5] Mohamed Elhoseny,et al. Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model , 2019, Studies in Systems, Decision and Control.
[6] Senthil Ragavan Valayapalayam Kittusamy,et al. An enhanced whale optimization algorithm for vehicular communication networks , 2019, Int. J. Commun. Syst..
[7] Andino Maseleno,et al. Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN) , 2019, J. Intell. Fuzzy Syst..
[8] Mohamed Elhoseny,et al. Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique , 2020, IEEE Transactions on Reliability.
[9] Mohamed Elhoseny,et al. An efficient hierarchical clustering protocol for multihop Internet of vehicles communication , 2019, Trans. Emerg. Telecommun. Technol..
[10] Tomoyuki Ohta,et al. A Multipath Routing Method with Dynamic ID for Reduction of Routing Load in Ad Hoc Networks , 2010, ADHOCNETS.
[11] An-Yeu Wu,et al. Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems , 2015, IEEE Transactions on Computers.
[12] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[13] Tomoyuki Ohta,et al. Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[14] Joel J. P. C. Rodrigues,et al. Efficient artificial fish swarm based clustering approach on mobility aware energy‐efficient for MANET , 2018, Trans. Emerg. Telecommun. Technol..
[15] Hiroki Horiuchi,et al. AODV-Based Multipath Routing Protocol for Mobile Ad Hoc Networks(Ad Hoc Network)( Networking Technologies for Mobile Internet Systems) , 2004 .
[16] Eswaran Perumal,et al. Mobility and QoS Analysis in VANET Using NMP with Salp Optimization Models , 2020 .
[17] Samir R Das,et al. Ad hoc on-demand multipath distance vector routing , 2002, MOCO.
[18] Mohsen Guizani,et al. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.
[19] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[20] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[21] Kartik Shankar,et al. Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography , 2019 .
[22] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[23] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[24] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.