Wireless Sensor Network in Agriculture: Model of Cyber Security
暂无分享,去创建一个
Dejan Rančić | Radomir Prodanović | Ivan Vulić | Gordana Ostojić | Dušan Bogićević | Sohail Sarang | Nenad Zorić | Stevan Stankovski | D. Rancic | Ivan Vulic | S. Stankovski | G. Ostojić | Sohail Sarang | Radomir Prodanović | N. Zoric | Dušan Bogićević
[1] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[2] Mauro Conti,et al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..
[3] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Goran Stojanovic,et al. COST-EFFECTIVE SENSORS AND SENSOR NODES FOR MONITORING ENVIRONMENTAL PARAMETERS , 2018 .
[6] Kien Nguyen,et al. A Path-Length Efficient, Low-Overhead, Load-Balanced Routing Protocol for Maximum Network Lifetime in Wireless Sensor Networks with Holes † , 2020, Sensors.
[7] S. F. Di Gennaro,et al. A wireless sensor network for precision viticulture: The NAV system , 2009 .
[8] Jean-Jacques Chaillout,et al. Energy Consumption Model for Sensor Nodes Based on LoRa and LoRaWAN , 2018, Sensors.
[9] Annu Joshi. Denial of service in wireless sensor network attacks and defenses , 2018 .
[10] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[11] Leandro Alves Neves,et al. Influence of Mobility Models in Precision Spray Aided by Wireless Sensor Networks , 2015 .
[12] N. Raghuwanshi,et al. A combined bottom-up and top-down approach for assessment of climate change adaptation options , 2014 .
[13] D. J. Greenwood,et al. Opportunities for improving irrigation efficiency with quantitative models, soil water sensors and wireless technology , 2009, The Journal of Agricultural Science.
[14] Leila Azouz Saidane,et al. Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[15] Goran Stojanovic,et al. Flexible sensors platform for determination of cadmium concentration in soil samples , 2019, Comput. Electron. Agric..
[16] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[17] Peter I. Corke,et al. Environmental Wireless Sensor Networks , 2010, Proceedings of the IEEE.
[18] F. Cua. Business Case Analytics , 2014 .
[19] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[20] Dongkyun Kim,et al. On the design of beacon based wireless sensor network for agricultural emergency monitoring systems , 2014, Comput. Stand. Interfaces.
[21] JaeHyu Kim,et al. A Dual Key-Based Activation Scheme for Secure LoRaWAN , 2017, Wirel. Commun. Mob. Comput..
[22] Álvaro Araujo,et al. Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.
[23] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[24] Xinxing Li,et al. Nutritional Quality and Safety Traceability System for China’s Leafy Vegetable Supply Chain Based on Fault Tree Analysis and QR Code , 2020, IEEE Access.
[25] Subir Biswas,et al. AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications , 2017, J. Sensors.
[26] Goran Panic,et al. An Embedded Sensor Node Microcontroller with Crypto-Processors , 2016, Sensors.
[27] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[28] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[29] Maria-Cristina Marinescu,et al. Original papers: A novel methodology for the monitoring of the agricultural production process based on wireless sensor networks , 2011 .
[30] Carles Gomez,et al. Modeling the Energy Performance of LoRaWAN , 2017, Sensors.
[31] H. S. Ng,et al. Security issues of wireless sensor networks in healthcare applications , 2006 .
[32] Srinivasa Rao,et al. An Overview of Wireless Sensor Networks Applications and Security , 2012 .
[33] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[34] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[35] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[36] Hari Om,et al. Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.
[37] Xavier Fernando,et al. Cognitive Wireless Sensor Networks: Emerging topics and recent challenges , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[38] Masayuki Hirafuji,et al. A web-based sensor network system with distributed data processing approach via web application , 2011, Comput. Stand. Interfaces.
[39] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[40] G. Radosavljevic,et al. Micro force sensor fabricated in the LTCC technology , 2010, 2010 27th International Conference on Microelectronics Proceedings.
[41] Michael J. Delwiche,et al. Wireless sensor network with irrigation valve control , 2013 .
[42] Sudip Misra,et al. Localized policy-based target tracking using wireless sensor networks , 2012, TOSN.
[43] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[44] Rodrigo da Rosa Righi,et al. AgriPrediction: A proactive internet of things model to anticipate problems and improve production in agricultural crops , 2019, Comput. Electron. Agric..
[45] Tian-Fu Lee,et al. An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring , 2019, Sensors.
[46] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[47] Abhijit Belapurkar,et al. Distributed Systems Security: Issues, Processes and Solutions , 2009 .
[48] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[49] Wenyuan Xu,et al. Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.