Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
暂无分享,去创建一个
[1] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[2] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[3] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[4] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[5] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[6] Xiaoyan Hong,et al. Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..
[7] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[8] Aura Ganz,et al. Runtime security composition for sensor networks (SecureSense) , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[9] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[10] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[12] Deborah Estrin,et al. A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.
[13] Mingyan Liu,et al. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[14] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[15] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[16] Michael C. Laskowski,et al. Vapnik-Chervonenkis classes of definable sets , 1992 .
[17] Catherine Rosenberg,et al. A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.
[18] Xiaoyan Hong,et al. An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[19] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[20] Baltasar Beferull-Lozano,et al. Lossy network correlated data gathering with high-resolution coding , 2005, IEEE Transactions on Information Theory.
[21] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[22] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] Xiaojiang Du,et al. QoS routing based on multi-class nodes for mobile ad hoc networks , 2004, Ad Hoc Networks.
[25] Xiaojiang Du,et al. Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks , 2006, Int. J. Wirel. Mob. Comput..
[26] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[27] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.