Survey on Sensor Holes: A Cause-Effect-Solution Perspective
暂无分享,去创建一个
[1] Shih-Chang Huang. Ion-6: A Positionless Self-Deploying Method for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[2] Donghun Lee,et al. A modeling for hole problem in wireless sensor networks , 2007, IWCMC.
[3] Yongping Zhang,et al. SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[4] Krishna M. Sivalingam,et al. Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications , 2003 .
[5] Minyi Guo,et al. Hole Avoiding in Advance Routing in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[6] G. Mahadevan,et al. A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[7] Abdelhamid Mellouk,et al. Oriented Void Avoidance Scheme for Real-Time Routing Protocols in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[8] Nafaâ Jabeur,et al. A knowledge-oriented meta-framework for integrating sensor network infrastructures , 2009, Comput. Geosci..
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] Leonidas J. Guibas,et al. Locating and Bypassing Holes in Sensor Networks , 2006, Mob. Networks Appl..
[11] Martin Vetterli,et al. Proceedings of the 4th international symposium on Information processing in sensor networks , 2005 .
[12] Leonidas J. Guibas,et al. Locating and bypassing routing holes in sensor networks , 2004, IEEE INFOCOM 2004.
[13] Satyajayant Misra,et al. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[14] Stefan Funke,et al. Topological hole detection in wireless sensor networks and its applications , 2005, DIALM-POMC '05.
[15] Abubakr Muhammad,et al. Coverage and hole-detection in sensor networks via homology , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[16] Abderrahmane Baadache,et al. Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.
[17] Erik D. Demaine,et al. Deploying sensor networks with guaranteed capacity and fault tolerance , 2005, MobiHoc '05.
[18] Yskandar Hamam,et al. Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network , 2012, ANT/MobiWIS.
[19] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[20] Peter Corke,et al. Finding Holes in Sensor Networks , 2022 .
[21] Liu An-Feng,et al. Research on Energy Hole Problem for Wireless Sensor Networks Based on Alternation between Dormancy and Work , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[22] Ruttikorn Varakulsiripunth,et al. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] Stéphane Devismes,et al. Analysis of Random Walks Using Tabu Lists , 2012, SIROCCO.
[25] Gianluca Dini,et al. An Algorithm for Reconnecting Wireless Sensor Network Partitions , 2008, EWSN.
[26] C. Siva Ram Murthy,et al. Dynamic Coverage Maintenance Algorithms for Sensor Networks with Limited Mobility , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[27] Neeraj Suri,et al. LEHP: Localized energy hole profiling in Wireless Sensor Networks , 2010, The IEEE symposium on Computers and Communications.
[28] Yu-Chee Tseng,et al. The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.
[29] Suman Banerjee,et al. Proceedings of the 2005 joint workshop on Foundations of mobile computing , 2005 .
[30] Ivan Stojmenovic,et al. Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[31] Roberto Verdone. Proceedings of the 5th European conference on Wireless sensor networks , 2008 .
[32] Kuei-Ping Shih,et al. PALM: A Partition Avoidance Lazy Movement Protocol for Mobile Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.