An optimized algorithm for a secured Wireless Sensor Networks integration into Enterprise Information System
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[3] Ricardo Simon Carbajo,et al. Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes , 2009, PM2HW2N '09.
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[6] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[7] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[8] G. H. Raisoni,et al. Secure and Efficient Sink Node Location Privacy Technique in WSN , 2014 .
[9] S. Shanawaz Basha,et al. Secure Routing in Wireless Sensor Networks using WEAP Protocol , 2013 .
[10] Madhusudana Rao Kothari,et al. 6LoWPAN Based Wireless Sensor Network to Monitor Temperature , 2014 .
[11] Torsten Braun,et al. Integration of WSNs into enterprise systems based on semantic physical business entities , 2013, 2013 IFIP Wireless Days (WD).
[12] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[13] Moumita Ghosh,et al. Enhancement the security of WSN using ALARM protocol to Prevention from Reply Attack , 2014 .
[14] Muhammad Bilal,et al. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) , 2012, ArXiv.
[15] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[16] Miguel Garcia,et al. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification , 2009, Sensors.
[17] Winston Khoon Guan Seah,et al. Reliability in wireless sensor networks: A survey and challenges ahead , 2015, Comput. Networks.
[18] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[19] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[20] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[21] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[22] Yan Sun,et al. WSN14-4: Energy-efficient Reliable Transmission Protocol with Outsourcing in WSNs , 2006, IEEE Globecom 2006.
[23] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .