Evaluating energy cost of route diversity for security in wireless sensor networks
暂无分享,去创建一个
[1] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Vishal Misra,et al. Distributed algorithms for secure multipath routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Wendi B. Heinzelman,et al. General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies , 2008, IEEE Transactions on Mobile Computing.
[4] Shervin Erfani,et al. Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..
[5] Jagannathan Sarangapani. Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control , 2017 .
[6] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[7] Xin Ma,et al. Energy-efficient multipath routing in wireless sensor network considering wireless interference , 2011 .
[8] Boleslaw K. Szymanski,et al. Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[9] Bülent Tavli,et al. Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks , 2013, EURASIP Journal on Wireless Communications and Networking.
[10] Jagannathan Sarangapani. Wireless ad hoc and sensor networks : protocols, performance, and control/ Jagannathan Sarangapani , 2007 .
[11] Andreas Pitsillides,et al. A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.
[12] Deborah Estrin,et al. Cyclops: in situ image sensing and interpretation in wireless sensor networks , 2005, SenSys '05.
[13] Bülent Tavli,et al. The impact of one-time energy costs on network lifetime in wireless sensor networks , 2009, IEEE Communications Letters.
[14] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[15] Xiaojing Huang,et al. A Survey of low duty cycle MAC protocols in wireless sensor networks , 2011 .
[16] Lin Cai,et al. Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks , 2009, IEEE Transactions on Wireless Communications.
[17] Jalel Ben-Othman,et al. REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[18] Lin Chen,et al. On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..
[19] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[20] Wenjing Lou,et al. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.
[21] Bülent Tavli,et al. Energy and Spatial Reuse Efficient Network-Wide Real-Time Data Broadcasting in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[22] Huei-Wen Ferng,et al. Design of Novel Node Distribution Strategies in Corona-Based Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[23] Anantha Chandrakasan,et al. Upper bounds on the lifetime of sensor networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[24] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[25] Anantha Chandrakasan,et al. Bounding the lifetime of sensor networks via optimal role assignments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[26] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[27] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[28] Panayiotis Kotzanikolaou,et al. SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.
[29] Bev Littlewood,et al. Redundancy and Diversity in Security , 2004, ESORICS.
[30] Hanoch Levy,et al. Session Privacy Enhancement by Traffic Dispersion , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[31] Yuan Xue,et al. Optimal Wireless Network Restoration under Jamming Attack , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[32] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[33] Luigi Palopoli,et al. Scalable Offline Optimization of Industrial Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.
[34] Bülent Tavli,et al. Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks , 2010, IEEE Communications Letters.
[35] Gregory J. Pottie,et al. Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[36] Jalel Ben-Othman,et al. Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..
[37] Joongseok Park,et al. Maximum Lifetime Routing In Wireless Sensor Networks ∗ , 2005 .
[38] Pravin Varaiya,et al. On multi-hop routing for energy efficiency , 2005, IEEE Communications Letters.