Detection of Clone Attack in Mobile Wireless Sensor Network
暂无分享,去创建一个
[1] Usama Ahmed,et al. Energy efficient routing protocol for zone based mobile sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[2] Zhiyun Lin,et al. A geographically opportunistic routing protocol used in mobile wireless sensor networks , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.
[3] Priyanka Dubey,et al. Review of First Hop Redundancy Protocol and Their Functionalities , 2013 .
[4] Roberto Di Pietro,et al. Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..
[5] Shoujun Wang,et al. Notice of Retraction The design of wireless wave height sensor network node based on Zigbee technology , 2011 .
[6] Yan Zhang,et al. The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.
[7] N. Marriwala,et al. An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.
[8] M. P. S Bhatia,et al. Wireless sensor networks for monitoring the environmental activities , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.
[9] Prasanta K. Jana,et al. A distributed fault-tolerant clustering algorithm for wireless sensor networks , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[10] Xuhui Chen,et al. Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.
[11] P. Thiruvannamalai Sivasankar,et al. Active key management scheme to avoid clone attack in wireless sensor network , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[12] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, TCC.
[13] Pekka Nikander,et al. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.
[14] Sang-Hyun Park,et al. A study on sensor nodes attestation protocol in a Wireless Sensor Network , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[15] Adrian Segall,et al. A multipath routing algorithm for mobile Wireless Sensor Networks , 2010, WMNC2010.