Mobile Network Security and Privacy in WSN
暂无分享,去创建一个
Wanbin Tang | Yuan Gao | Su Hu | Weigui Zhou | Zenghui Feng | Hong Ao
[1] A. Praveena. Achieving data security in wireless sensor networks using ultra encryption standard version — IV algorithm , 2017, 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT).
[2] Shanta Chowdhury,et al. An efficient security architecture for Wireless Sensor Networks using pseudo-inverse matrix , 2015, 2015 18th International Conference on Computer and Information Technology (ICCIT).
[3] S. Anbuchelian,et al. Improving security in Wireless Sensor Network using trust and metaheuristic algorithms , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[4] Sanjeet Kumar,et al. A survey of security in wireless sensor networks , 2015, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).
[5] Bo Cheng,et al. Public key cryptography: Feasible for security in modern personal area sensor networks? , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[6] E. Brumancia,et al. A profile based scheme for security in clustered wireless sensor networks , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[7] Aiqun Hu,et al. Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[8] Ausif Mahmood,et al. A specialized event-driven network simulator for security and anonymity applications of Wireless Sensor Networks , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[9] Benfilali Mostefa,et al. A survey of wireless sensor network security in the context of Internet of Things , 2017, 2017 4th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).
[10] Alan F. Smeaton,et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..
[11] Babak D. Beheshti. A framework for Wireless Sensor Network security , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[12] Daniel D. Anita,et al. A review on existing security frameworks with efficient energy preservation techniques in Wireless Sensor Networks , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[13] L. Hunt,et al. Energy Demand and Energy Efficiency in the OECD Countries: A Stochastic Demand Frontier Approach , 2011 .
[14] Yang Xiaomei,et al. Evolution of wireless sensor network security , 2016, 2016 World Automation Congress (WAC).
[15] Christos G. Cassandras,et al. Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Models , 2017, IEEE Transactions on Control of Network Systems.